dblp.uni-trier.dewww.uni-trier.de

Virgil D. Gligor

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
85 Masayuki Abe, Virgil D. Gligor: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008 ACM 2008
84 Virgil D. Gligor, Jean-Pierre Hubaux, Radha Poovendran: Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008 ACM 2008
83EEVirgil D. Gligor: Position Statement: On the Evolution of Adversary Models in Computer Systems and Networks. COMPSAC 2008: 10
82EEGelareh Taban, Virgil D. Gligor: Efficient Handling of Adversary Attacks in Aggregation Applications. ESORICS 2008: 66-81
81EEMaxim Raya, Panagiotis Papadimitratos, Virgil D. Gligor, Jean-Pierre Hubaux: On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks. INFOCOM 2008: 1238-1246
2007
80 Peng Ning, Vijay Atluri, Virgil D. Gligor, Heiko Mantel: Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007 ACM 2007
79EEVirgil D. Gligor: On the evolution of adversary models in security protocols: from the beginning to sensor networks. ASIACCS 2007: 3
78EEMark Luk, Ghita Mezzour, Adrian Perrig, Virgil D. Gligor: MiniSec: a secure sensor network communication architecture. IPSN 2007: 479-488
77EEFarooq Anjum, S. Choi, Virgil D. Gligor, Ralf Guido Herrtwich, Jean-Pierre Hubaux, P. R. Kumar, Rajeev Shorey, Chin-Tau Lea: Guest Editorial Vehicular Networks. IEEE Journal on Selected Areas in Communications 25(8): 1497-1500 (2007)
2006
76 Levente Buttyán, Virgil D. Gligor, Dirk Westhoff: Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers Springer 2006
75EEVirgil D. Gligor: Emergent properties in ad-hoc networks: a security perspective. ASIACCS 2006: 1
74EEGelareh Taban, Alvaro A. Cárdenas, Virgil D. Gligor: Towards a secure and interoperable DRM architecture. Digital Rights Management Workshop 2006: 69-78
73EEVirgil D. Gligor, Thomas Haigh, Dick Kemmerer, Carl E. Landwehr, Steven B. Lipner, John D. McLean: Information Assurance Technology Forecast 2005. IEEE Security & Privacy 4(1): 62-69 (2006)
2005
72EEJonathan Katz, Philip D. MacKenzie, Gelareh Taban, Virgil D. Gligor: Two-Server Password-Only Authenticated Key Exchange. ACNS 2005: 1-16
71EEBryan Parno, Adrian Perrig, Virgil D. Gligor: Distributed Detection of Node Replication Attacks in Sensor Networks. IEEE Symposium on Security and Privacy 2005: 49-63
70EERakeshbabu Bobba, Serban I. Gavrila, Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva: Administering Access Control in Dynamic Coalitions. LISA 2005: 249-261
69EEVirgil D. Gligor: Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks. MADNES 2005: 1
68EEMike Burmester, Virgil D. Gligor, Evangelos Kranakis, J. D. Tygar, Yuliang Zheng: Panel: Authentication in Constrained Environments. MADNES 2005: 186-191
67EEVirgil D. Gligor: Advances in sensor and ad-hoc network security: perspective and status. SASN 2005: 68
66EEVirgil D. Gligor: On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike). Security Protocols Workshop 2005: 276-283
65EEVirgil D. Gligor: Emergent properties in ad-hoc networks: a security perspective. Workshop on Wireless Security 2005: 55
64EEHaowen Chan, Virgil D. Gligor, Adrian Perrig, Gautam Muralidharan: On the Distribution and Revocation of Cryptographic Keys in Sensor Networks. IEEE Trans. Dependable Sec. Comput. 2(3): 233-247 (2005)
2004
63EEVirgil D. Gligor: Security of Emergent Properties in Ad-Hoc Networks (Transcript of Discussion). Security Protocols Workshop 2004: 256-266
62EEHimanshu Khurana, Virgil D. Gligor: A Model for Access Negotiations in Dynamic Coalitions. WETICE 2004: 205-210
2003
61EEOmer Horvitz, Virgil D. Gligor: Weak Key Authenticity and the Computational Completeness of Formal Encryption. CRYPTO 2003: 530-547
60EEHimanshu Khurana, Serban I. Gavrila, Rakeshbabu Bobba, Radostina K. Koleva, Anuja Sonalker, Emilian Dinu, Virgil D. Gligor, John S. Baras: Integrated Security Services for Dynamic Coalitions. DISCEX (2) 2003: 38-40
59EEVirgil D. Gligor: Guaranteeing Access in Spite of Distributed Service-Flooding Attacks. Security Protocols Workshop 2003: 80-96
58EEVirgil D. Gligor: Guaranteeing Access in Spite of Distributed Service-Flooding Attacks (Discussion). Security Protocols Workshop 2003: 97-105
2002
57 Agnes Hui Chan, Virgil D. Gligor: Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings Springer 2002
56EELaurent Eschenauer, Virgil D. Gligor: A key-management scheme for distributed sensor networks. ACM Conference on Computer and Communications Security 2002: 41-47
55EEHimanshu Khurana, Virgil D. Gligor, John Linn: Reasoning about Joint Administration of Access Policies for Coalition Resources. ICDCS 2002: 429-
54EELaurent Eschenauer, Virgil D. Gligor, John S. Baras: On Trust Establishment in Mobile Ad-Hoc Networks. Security Protocols Workshop 2002: 47-66
2001
53EEPeter Ryan, John D. McLean, Jonathan K. Millen, Virgil D. Gligor: Non-Interference: Who Needs It? CSFW 2001: 237-
52EEVirgil D. Gligor, Pompiliu Donescu: Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes. FSE 2001: 92-108
51EEVirgil D. Gligor, Himanshu Khurana, Radostina K. Koleva, Vijay G. Bharadwaj, John S. Baras: On the Negotiation of Access Control Policies. Security Protocols Workshop 2001: 188-201
50EEVirgil D. Gligor: Negotiation of Access Control Policies (Transcript of Discussion). Security Protocols Workshop 2001: 202-212
2000
49EECrispin Cowan, Steve Beattie, Greg Kroah-Hartman, Calton Pu, Perry Wagle, Virgil D. Gligor: SubDomain: Parsimonious Server Security. LISA 2000: 355-368
48EEHimanshu Khurana, Virgil D. Gligor: Review and Revocation of Access Privileges Distributed with PKI Certificates. Security Protocols Workshop 2000: 100-112
47EEVirgil D. Gligor: Review and Revocation of Access Privileges Distributed with PKI Certificates (Transcript of Discussion). Security Protocols Workshop 2000: 113-124
46EEVirgil D. Gligor, Matt Blaze, John Ioannidis: Denial of Service - Panel Discussion. Security Protocols Workshop 2000: 194-203
1999
45EEVirgil D. Gligor: 20 Years of Operating Systems Security. IEEE Symposium on Security and Privacy 1999: 108-110
44 Virgil D. Gligor, Pompiliu Donescu: Integrity-Aware PCBC Encryption Schemes. Security Protocols Workshop 1999: 153-171
1998
43EEVirgil D. Gligor, Serban I. Gavrila, David F. Ferraiolo: On the Formal Definition of Separation-of-Duty Policies and their Composition. IEEE Symposium on Security and Privacy 1998: 172-183
42EEVirgil D. Gligor, Peter Landrock, T. Mark A. Lomas, Raphael Yahalom, John P. Warne: Discussion Session: Differences Between Academic and Commercial Security. Security Protocols Workshop 1998: 177-192
41EERoger M. Needham, E. Stewart Lee, Joan Feigenbaum, Virgil D. Gligor, Bruce Christianson: Panel Session - Future Directions. Security Protocols Workshop 1998: 227-239
40EEVirgil D. Gligor, Serban I. Gavrila: Application-Oriented Security Policies and Their Composition (Position Paper). Security Protocols Workshop 1998: 67-74
39EEVirgil D. Gligor: Application-Oriented Security Policies and Their Composition (Transcript of Discussion). Security Protocols Workshop 1998: 75-82
1997
38EEShiuh-Pyng Shieh, Virgil D. Gligor: On a Pattern-Oriented Model for Intrusion Detection. IEEE Trans. Knowl. Data Eng. 9(4): 661-667 (1997)
1996
37 Shiuh-Pyng Shieh, Virgil D. Gligor: Detecting Illicit Leakage of Information in Operating Systems. Journal of Computer Security 4(2/3): 123-148 (1996)
1995
36EEVirgil D. Gligor: Characteristics of role-based access control. ACM Workshop on Role-Based Access Control 1995
1993
35 Virgil D. Gligor, Shyh-Wei Luan, Joe Pato: On Inter-Realm Authentication in Large Distributed Systems. Journal of Computer Security 2(2-3): 137-158 (1993)
1992
34EEJingsha He, Virgil D. Gligor: Formal Methods and Automated Tool for Timing-Channel Identification in TCB Source Code. ESORICS 1992: 57-76
33 Sarbari Gupta, Virgil D. Gligor: Towards a Theory of Penetration-Resistant Systems and its Applications. Journal of Computer Security 1(2): 133-158 (1992)
1991
32 Rajashekar Kailar, Virgil D. Gligor: On Belief Evolution in Authentication Protocols. CSFW 1991: 103-116
31 Virgil D. Gligor, Rajashekar Kailar, Stuart G. Stubblebine, Li Gong: Logics for Cryptographic Protocols - Virtues and Limitations. CSFW 1991: 219-226
30 Sarbari Gupta, Virgil D. Gligor: Towards a Theory of Penetration-Resistant Systems and its Applications. CSFW 1991: 62-78
29 Shiuh-Pyng Shieh, Virgil D. Gligor: A Pattern-Oriented Intrusion-Detection Model and Its Applications. IEEE Symposium on Security and Privacy 1991: 327-342
1990
28 Jingsha He, Virgil D. Gligor: Information-Flow Analysis for Covert-Channel Identification in Multilevel Secure Operating Systems. CSFW 1990: 139-149
27 Shyh-Wei Luan, Virgil D. Gligor: On Replay Detection in Distributed Systems. ICDCS 1990: 188-195
26 P.-C. Cheng, Virgil D. Gligor: On the Formal Specification and Verification of a Multiparty Session Protocol. IEEE Symposium on Security and Privacy 1990: 216-233
25 Shiuh-Pyng Shieh, Virgil D. Gligor: Auditing the Use of Covert Storage Channels in Secure Systems. IEEE Symposium on Security and Privacy 1990: 285-295
24EEShyh-Wei Luan, Virgil D. Gligor: A Fault-Tolerant Protocol for Atomic Broadcast. IEEE Trans. Parallel Distrib. Syst. 1(3): 271-285 (1990)
23EEChii-Ren Tsai, Virgil D. Gligor, C. Sekar Chandersekaran: On the Identification of Covert Storage Channels in Secure Systems. IEEE Trans. Software Eng. 16(6): 569-580 (1990)
22EEChe-Fn Yu, Virgil D. Gligor: A Specification and Verification Method for Preventing Denial of Service. IEEE Trans. Software Eng. 16(6): 581-592 (1990)
1988
21 Shyh-Wei Luan, Virgil D. Gligor: A Fault-Tolerant Protocol for Atomic Broadcast. SRDS 1988: 112-126
1987
20 Shau-Ping Lo, Virgil D. Gligor: A Comparative Analysis of Multiprocessor Scheduling Algorithms. ICDCS 1987: 356-363
19 Shau-Ping Lo, Virgil D. Gligor: Properties of Multiprocessor Scheduling Algorithms. ICPP 1987: 867-870
18 Chii-Ren Tsai, Virgil D. Gligor, C. Sekar Chandersekaran: A Formal Method for the Identification of Covert Storage Channels in Source Code. IEEE Symposium on Security and Privacy 1987: 74-87
17 Virgil D. Gligor, C. Sekar Chandersekaran, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, L. Edward Reich: A New Security Testing Method and Its Application to the Secure Xenix Kernel. IEEE Trans. Software Eng. 13(2): 169-183 (1987)
16 Virgil D. Gligor, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, N. Vasudevan: Design and Implementation of Secure Xenix. IEEE Trans. Software Eng. 13(2): 208-221 (1987)
1986
15EEVirgil D. Gligor: On Denial-of-Service in Computer Networks. ICDE 1986: 608-617
14 Virgil D. Gligor, E. L. Burch, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Gary L. Luckenbaugh, N. Vasudevan: On the Design and the Implementation of Secure Xenix Workstations. IEEE Symposium on Security and Privacy 1986: 102-117
13 Virgil D. Gligor, C. Sekar Chandersekaran, W. Cheng, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, L. Edward Reich: A New Security Testing Method and Its Application to the Secure Xenix Kernel. IEEE Symposium on Security and Privacy 1986: 40-59
12 Virgil D. Gligor, Radu Popescu-Zeletin: Transaction management in distributed heterogeneous database management systems. Inf. Syst. 11(4): 287-297 (1986)
1985
11 Virgil D. Gligor, Peter A. Ng: Foreword. IEEE Trans. Software Eng. 11(6): 497-501 (1985)
1984
10 Virgil D. Gligor, Radu Popescu-Zeletin: Concurrency Control Issues in Distributed Heterogeneous Database Management Systems. DDSS 1984: 43-56
9 Virgil D. Gligor, Gary L. Luckenbaugh: Inteconnecting Heterogeneous Database Management Systems. IEEE Computer 17(1): 33-43 (1984)
8 Virgil D. Gligor: A Note on Denial-of-Service in Operating Systems. IEEE Trans. Software Eng. 10(3): 320-324 (1984)
1983
7 Virgil D. Gligor: A Note on the Denial-of-Service Problem. IEEE Symposium on Security and Privacy 1983: 139-149
1982
6 Virgil D. Gligor, David Maier: Finding Augmented-Set Bases. SIAM J. Comput. 11(3): 602-609 (1982)
1980
5 Virgil D. Gligor, Susan H. Shattuck: On Deadlock Detection in Distributed Systems. IEEE Trans. Software Eng. 6(5): 435-440 (1980)
1979
4 Virgil D. Gligor: Architectural Implementations of Abstract Data Type Implementation. ISCA 1979: 20-30
3 Virgil D. Gligor: Review and Revocation of Access Privileges Distributed Through Capabilities. IEEE Trans. Software Eng. 5(6): 575-586 (1979)
2 Virgil D. Gligor, Bruce G. Lindsay: Object Migration and Authentication. IEEE Trans. Software Eng. 5(6): 607-611 (1979)
1978
1 Virgil D. Gligor, David Maier: Representing Data Bases in Segmented Name Spaces. JCDKB 1978: 295-

Coauthor Index

1Masayuki Abe [85]
2Farooq Anjum [77]
3Vijayalakshmi Atluri (Vijay Atluri) [80]
4John S. Baras [51] [54] [60]
5Steve Beattie [49]
6Vijay G. Bharadwaj [51]
7Matt Blaze [46]
8Rakeshbabu Bobba [60] [70]
9E. L. Burch [14]
10Mike Burmester [68]
11Levente Buttyán [76]
12Alvaro A. Cárdenas [74]
13Agnes Hui Chan [57]
14Haowen Chan [64]
15C. Sekar Chandersekaran [13] [14] [16] [17] [18] [23]
16Robert S. Chapman [14] [16]
17P.-C. Cheng [26]
18W. Cheng [13]
19S. Choi [77]
20Bruce Christianson [41]
21Crispin Cowan [49]
22Emilian Dinu [60]
23Pompiliu Donescu [44] [52]
24Leslie J. Dotterer [14] [16]
25Laurent Eschenauer [54] [56]
26Joan Feigenbaum [41]
27David F. Ferraiolo [43]
28Serban I. Gavrila [40] [43] [60] [70]
29Li Gong [31]
30Sarbari Gupta [30] [33]
31Thomas Haigh [73]
32Jingsha He [28] [34]
33Matthew S. Hecht [14] [16]
34Ralf Guido Herrtwich [77]
35Omer Horvitz [61]
36Jean-Pierre Hubaux [77] [81] [84]
37John Ioannidis [46]
38Wen-Der Jiang [13] [14] [16] [17]
39Abhai Johri [13] [16] [17]
40Rajashekar Kailar [31] [32]
41Jonathan Katz [72]
42Dick Kemmerer [73]
43Himanshu Khurana [48] [51] [55] [60] [62] [70]
44Radostina K. Koleva [51] [60] [70]
45Evangelos Kranakis [68]
46Greg Kroah-Hartman [49]
47P. R. Kumar [77]
48Peter Landrock [42]
49Carl E. Landwehr [73]
50Chin-Tau Lea [77]
51E. Stewart Lee [41]
52Bruce G. Lindsay [2]
53John Linn [55]
54Steven B. Lipner [73]
55Shau-Ping Lo [19] [20]
56T. Mark A. Lomas [42]
57Shyh-Wei Luan [21] [24] [27] [35]
58Gary L. Luckenbaugh [9] [13] [14] [16] [17]
59Mark Luk [78]
60Philip D. MacKenzie [72]
61David Maier [1] [6]
62Heiko Mantel [80]
63John D. McLean [53] [73]
64Ghita Mezzour [78]
65Jonathan K. Millen [53]
66Gautam Muralidharan [64]
67Roger M. Needham [41]
68Peter A. Ng [11]
69Peng Ning [80]
70Panagiotis Papadimitratos (Panos Papadimitratos) [81]
71Bryan Parno [71]
72Joe Pato [35]
73Adrian Perrig [64] [71] [78]
74Radha Poovendran [84]
75Radu Popescu-Zeletin [10] [12]
76Calton Pu [49]
77Maxim Raya [81]
78L. Edward Reich [13] [17]
79Peter Y. A. Ryan (Peter Ryan) [53]
80Susan H. Shattuck [5]
81Shiuh-Pyng Shieh (Shiuh-Pyng Winston Shieh) [25] [29] [37] [38]
82Rajeev Shorey [77]
83Anuja Sonalker [60]
84Stuart G. Stubblebine [31]
85Gelareh Taban [72] [74] [82]
86Chii-Ren Tsai [18] [23]
87J. Doug Tygar (J. D. Tygar) [68]
88N. Vasudevan [14] [16]
89Perry Wagle [49]
90John P. Warne [42]
91Dirk Westhoff [76]
92Raphael Yahalom [42]
93Che-Fn Yu [22]
94Yuliang Zheng [68]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)