2008 | ||
---|---|---|
85 | Masayuki Abe, Virgil D. Gligor: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008 ACM 2008 | |
84 | Virgil D. Gligor, Jean-Pierre Hubaux, Radha Poovendran: Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008 ACM 2008 | |
83 | EE | Virgil D. Gligor: Position Statement: On the Evolution of Adversary Models in Computer Systems and Networks. COMPSAC 2008: 10 |
82 | EE | Gelareh Taban, Virgil D. Gligor: Efficient Handling of Adversary Attacks in Aggregation Applications. ESORICS 2008: 66-81 |
81 | EE | Maxim Raya, Panagiotis Papadimitratos, Virgil D. Gligor, Jean-Pierre Hubaux: On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks. INFOCOM 2008: 1238-1246 |
2007 | ||
80 | Peng Ning, Vijay Atluri, Virgil D. Gligor, Heiko Mantel: Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007 ACM 2007 | |
79 | EE | Virgil D. Gligor: On the evolution of adversary models in security protocols: from the beginning to sensor networks. ASIACCS 2007: 3 |
78 | EE | Mark Luk, Ghita Mezzour, Adrian Perrig, Virgil D. Gligor: MiniSec: a secure sensor network communication architecture. IPSN 2007: 479-488 |
77 | EE | Farooq Anjum, S. Choi, Virgil D. Gligor, Ralf Guido Herrtwich, Jean-Pierre Hubaux, P. R. Kumar, Rajeev Shorey, Chin-Tau Lea: Guest Editorial Vehicular Networks. IEEE Journal on Selected Areas in Communications 25(8): 1497-1500 (2007) |
2006 | ||
76 | Levente Buttyán, Virgil D. Gligor, Dirk Westhoff: Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers Springer 2006 | |
75 | EE | Virgil D. Gligor: Emergent properties in ad-hoc networks: a security perspective. ASIACCS 2006: 1 |
74 | EE | Gelareh Taban, Alvaro A. Cárdenas, Virgil D. Gligor: Towards a secure and interoperable DRM architecture. Digital Rights Management Workshop 2006: 69-78 |
73 | EE | Virgil D. Gligor, Thomas Haigh, Dick Kemmerer, Carl E. Landwehr, Steven B. Lipner, John D. McLean: Information Assurance Technology Forecast 2005. IEEE Security & Privacy 4(1): 62-69 (2006) |
2005 | ||
72 | EE | Jonathan Katz, Philip D. MacKenzie, Gelareh Taban, Virgil D. Gligor: Two-Server Password-Only Authenticated Key Exchange. ACNS 2005: 1-16 |
71 | EE | Bryan Parno, Adrian Perrig, Virgil D. Gligor: Distributed Detection of Node Replication Attacks in Sensor Networks. IEEE Symposium on Security and Privacy 2005: 49-63 |
70 | EE | Rakeshbabu Bobba, Serban I. Gavrila, Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva: Administering Access Control in Dynamic Coalitions. LISA 2005: 249-261 |
69 | EE | Virgil D. Gligor: Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks. MADNES 2005: 1 |
68 | EE | Mike Burmester, Virgil D. Gligor, Evangelos Kranakis, J. D. Tygar, Yuliang Zheng: Panel: Authentication in Constrained Environments. MADNES 2005: 186-191 |
67 | EE | Virgil D. Gligor: Advances in sensor and ad-hoc network security: perspective and status. SASN 2005: 68 |
66 | EE | Virgil D. Gligor: On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike). Security Protocols Workshop 2005: 276-283 |
65 | EE | Virgil D. Gligor: Emergent properties in ad-hoc networks: a security perspective. Workshop on Wireless Security 2005: 55 |
64 | EE | Haowen Chan, Virgil D. Gligor, Adrian Perrig, Gautam Muralidharan: On the Distribution and Revocation of Cryptographic Keys in Sensor Networks. IEEE Trans. Dependable Sec. Comput. 2(3): 233-247 (2005) |
2004 | ||
63 | EE | Virgil D. Gligor: Security of Emergent Properties in Ad-Hoc Networks (Transcript of Discussion). Security Protocols Workshop 2004: 256-266 |
62 | EE | Himanshu Khurana, Virgil D. Gligor: A Model for Access Negotiations in Dynamic Coalitions. WETICE 2004: 205-210 |
2003 | ||
61 | EE | Omer Horvitz, Virgil D. Gligor: Weak Key Authenticity and the Computational Completeness of Formal Encryption. CRYPTO 2003: 530-547 |
60 | EE | Himanshu Khurana, Serban I. Gavrila, Rakeshbabu Bobba, Radostina K. Koleva, Anuja Sonalker, Emilian Dinu, Virgil D. Gligor, John S. Baras: Integrated Security Services for Dynamic Coalitions. DISCEX (2) 2003: 38-40 |
59 | EE | Virgil D. Gligor: Guaranteeing Access in Spite of Distributed Service-Flooding Attacks. Security Protocols Workshop 2003: 80-96 |
58 | EE | Virgil D. Gligor: Guaranteeing Access in Spite of Distributed Service-Flooding Attacks (Discussion). Security Protocols Workshop 2003: 97-105 |
2002 | ||
57 | Agnes Hui Chan, Virgil D. Gligor: Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings Springer 2002 | |
56 | EE | Laurent Eschenauer, Virgil D. Gligor: A key-management scheme for distributed sensor networks. ACM Conference on Computer and Communications Security 2002: 41-47 |
55 | EE | Himanshu Khurana, Virgil D. Gligor, John Linn: Reasoning about Joint Administration of Access Policies for Coalition Resources. ICDCS 2002: 429- |
54 | EE | Laurent Eschenauer, Virgil D. Gligor, John S. Baras: On Trust Establishment in Mobile Ad-Hoc Networks. Security Protocols Workshop 2002: 47-66 |
2001 | ||
53 | EE | Peter Ryan, John D. McLean, Jonathan K. Millen, Virgil D. Gligor: Non-Interference: Who Needs It? CSFW 2001: 237- |
52 | EE | Virgil D. Gligor, Pompiliu Donescu: Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes. FSE 2001: 92-108 |
51 | EE | Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva, Vijay G. Bharadwaj, John S. Baras: On the Negotiation of Access Control Policies. Security Protocols Workshop 2001: 188-201 |
50 | EE | Virgil D. Gligor: Negotiation of Access Control Policies (Transcript of Discussion). Security Protocols Workshop 2001: 202-212 |
2000 | ||
49 | EE | Crispin Cowan, Steve Beattie, Greg Kroah-Hartman, Calton Pu, Perry Wagle, Virgil D. Gligor: SubDomain: Parsimonious Server Security. LISA 2000: 355-368 |
48 | EE | Himanshu Khurana, Virgil D. Gligor: Review and Revocation of Access Privileges Distributed with PKI Certificates. Security Protocols Workshop 2000: 100-112 |
47 | EE | Virgil D. Gligor: Review and Revocation of Access Privileges Distributed with PKI Certificates (Transcript of Discussion). Security Protocols Workshop 2000: 113-124 |
46 | EE | Virgil D. Gligor, Matt Blaze, John Ioannidis: Denial of Service - Panel Discussion. Security Protocols Workshop 2000: 194-203 |
1999 | ||
45 | EE | Virgil D. Gligor: 20 Years of Operating Systems Security. IEEE Symposium on Security and Privacy 1999: 108-110 |
44 | Virgil D. Gligor, Pompiliu Donescu: Integrity-Aware PCBC Encryption Schemes. Security Protocols Workshop 1999: 153-171 | |
1998 | ||
43 | EE | Virgil D. Gligor, Serban I. Gavrila, David F. Ferraiolo: On the Formal Definition of Separation-of-Duty Policies and their Composition. IEEE Symposium on Security and Privacy 1998: 172-183 |
42 | EE | Virgil D. Gligor, Peter Landrock, T. Mark A. Lomas, Raphael Yahalom, John P. Warne: Discussion Session: Differences Between Academic and Commercial Security. Security Protocols Workshop 1998: 177-192 |
41 | EE | Roger M. Needham, E. Stewart Lee, Joan Feigenbaum, Virgil D. Gligor, Bruce Christianson: Panel Session - Future Directions. Security Protocols Workshop 1998: 227-239 |
40 | EE | Virgil D. Gligor, Serban I. Gavrila: Application-Oriented Security Policies and Their Composition (Position Paper). Security Protocols Workshop 1998: 67-74 |
39 | EE | Virgil D. Gligor: Application-Oriented Security Policies and Their Composition (Transcript of Discussion). Security Protocols Workshop 1998: 75-82 |
1997 | ||
38 | EE | Shiuh-Pyng Shieh, Virgil D. Gligor: On a Pattern-Oriented Model for Intrusion Detection. IEEE Trans. Knowl. Data Eng. 9(4): 661-667 (1997) |
1996 | ||
37 | Shiuh-Pyng Shieh, Virgil D. Gligor: Detecting Illicit Leakage of Information in Operating Systems. Journal of Computer Security 4(2/3): 123-148 (1996) | |
1995 | ||
36 | EE | Virgil D. Gligor: Characteristics of role-based access control. ACM Workshop on Role-Based Access Control 1995 |
1993 | ||
35 | Virgil D. Gligor, Shyh-Wei Luan, Joe Pato: On Inter-Realm Authentication in Large Distributed Systems. Journal of Computer Security 2(2-3): 137-158 (1993) | |
1992 | ||
34 | EE | Jingsha He, Virgil D. Gligor: Formal Methods and Automated Tool for Timing-Channel Identification in TCB Source Code. ESORICS 1992: 57-76 |
33 | Sarbari Gupta, Virgil D. Gligor: Towards a Theory of Penetration-Resistant Systems and its Applications. Journal of Computer Security 1(2): 133-158 (1992) | |
1991 | ||
32 | Rajashekar Kailar, Virgil D. Gligor: On Belief Evolution in Authentication Protocols. CSFW 1991: 103-116 | |
31 | Virgil D. Gligor, Rajashekar Kailar, Stuart G. Stubblebine, Li Gong: Logics for Cryptographic Protocols - Virtues and Limitations. CSFW 1991: 219-226 | |
30 | Sarbari Gupta, Virgil D. Gligor: Towards a Theory of Penetration-Resistant Systems and its Applications. CSFW 1991: 62-78 | |
29 | Shiuh-Pyng Shieh, Virgil D. Gligor: A Pattern-Oriented Intrusion-Detection Model and Its Applications. IEEE Symposium on Security and Privacy 1991: 327-342 | |
1990 | ||
28 | Jingsha He, Virgil D. Gligor: Information-Flow Analysis for Covert-Channel Identification in Multilevel Secure Operating Systems. CSFW 1990: 139-149 | |
27 | Shyh-Wei Luan, Virgil D. Gligor: On Replay Detection in Distributed Systems. ICDCS 1990: 188-195 | |
26 | P.-C. Cheng, Virgil D. Gligor: On the Formal Specification and Verification of a Multiparty Session Protocol. IEEE Symposium on Security and Privacy 1990: 216-233 | |
25 | Shiuh-Pyng Shieh, Virgil D. Gligor: Auditing the Use of Covert Storage Channels in Secure Systems. IEEE Symposium on Security and Privacy 1990: 285-295 | |
24 | EE | Shyh-Wei Luan, Virgil D. Gligor: A Fault-Tolerant Protocol for Atomic Broadcast. IEEE Trans. Parallel Distrib. Syst. 1(3): 271-285 (1990) |
23 | EE | Chii-Ren Tsai, Virgil D. Gligor, C. Sekar Chandersekaran: On the Identification of Covert Storage Channels in Secure Systems. IEEE Trans. Software Eng. 16(6): 569-580 (1990) |
22 | EE | Che-Fn Yu, Virgil D. Gligor: A Specification and Verification Method for Preventing Denial of Service. IEEE Trans. Software Eng. 16(6): 581-592 (1990) |
1988 | ||
21 | Shyh-Wei Luan, Virgil D. Gligor: A Fault-Tolerant Protocol for Atomic Broadcast. SRDS 1988: 112-126 | |
1987 | ||
20 | Shau-Ping Lo, Virgil D. Gligor: A Comparative Analysis of Multiprocessor Scheduling Algorithms. ICDCS 1987: 356-363 | |
19 | Shau-Ping Lo, Virgil D. Gligor: Properties of Multiprocessor Scheduling Algorithms. ICPP 1987: 867-870 | |
18 | Chii-Ren Tsai, Virgil D. Gligor, C. Sekar Chandersekaran: A Formal Method for the Identification of Covert Storage Channels in Source Code. IEEE Symposium on Security and Privacy 1987: 74-87 | |
17 | Virgil D. Gligor, C. Sekar Chandersekaran, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, L. Edward Reich: A New Security Testing Method and Its Application to the Secure Xenix Kernel. IEEE Trans. Software Eng. 13(2): 169-183 (1987) | |
16 | Virgil D. Gligor, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, N. Vasudevan: Design and Implementation of Secure Xenix. IEEE Trans. Software Eng. 13(2): 208-221 (1987) | |
1986 | ||
15 | EE | Virgil D. Gligor: On Denial-of-Service in Computer Networks. ICDE 1986: 608-617 |
14 | Virgil D. Gligor, E. L. Burch, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Gary L. Luckenbaugh, N. Vasudevan: On the Design and the Implementation of Secure Xenix Workstations. IEEE Symposium on Security and Privacy 1986: 102-117 | |
13 | Virgil D. Gligor, C. Sekar Chandersekaran, W. Cheng, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, L. Edward Reich: A New Security Testing Method and Its Application to the Secure Xenix Kernel. IEEE Symposium on Security and Privacy 1986: 40-59 | |
12 | Virgil D. Gligor, Radu Popescu-Zeletin: Transaction management in distributed heterogeneous database management systems. Inf. Syst. 11(4): 287-297 (1986) | |
1985 | ||
11 | Virgil D. Gligor, Peter A. Ng: Foreword. IEEE Trans. Software Eng. 11(6): 497-501 (1985) | |
1984 | ||
10 | Virgil D. Gligor, Radu Popescu-Zeletin: Concurrency Control Issues in Distributed Heterogeneous Database Management Systems. DDSS 1984: 43-56 | |
9 | Virgil D. Gligor, Gary L. Luckenbaugh: Inteconnecting Heterogeneous Database Management Systems. IEEE Computer 17(1): 33-43 (1984) | |
8 | Virgil D. Gligor: A Note on Denial-of-Service in Operating Systems. IEEE Trans. Software Eng. 10(3): 320-324 (1984) | |
1983 | ||
7 | Virgil D. Gligor: A Note on the Denial-of-Service Problem. IEEE Symposium on Security and Privacy 1983: 139-149 | |
1982 | ||
6 | Virgil D. Gligor, David Maier: Finding Augmented-Set Bases. SIAM J. Comput. 11(3): 602-609 (1982) | |
1980 | ||
5 | Virgil D. Gligor, Susan H. Shattuck: On Deadlock Detection in Distributed Systems. IEEE Trans. Software Eng. 6(5): 435-440 (1980) | |
1979 | ||
4 | Virgil D. Gligor: Architectural Implementations of Abstract Data Type Implementation. ISCA 1979: 20-30 | |
3 | Virgil D. Gligor: Review and Revocation of Access Privileges Distributed Through Capabilities. IEEE Trans. Software Eng. 5(6): 575-586 (1979) | |
2 | Virgil D. Gligor, Bruce G. Lindsay: Object Migration and Authentication. IEEE Trans. Software Eng. 5(6): 607-611 (1979) | |
1978 | ||
1 | Virgil D. Gligor, David Maier: Representing Data Bases in Segmented Name Spaces. JCDKB 1978: 295- |