2008 |
85 | | Masayuki Abe,
Virgil D. Gligor:
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008
ACM 2008 |
84 | | Virgil D. Gligor,
Jean-Pierre Hubaux,
Radha Poovendran:
Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008
ACM 2008 |
83 | EE | Virgil D. Gligor:
Position Statement: On the Evolution of Adversary Models in Computer Systems and Networks.
COMPSAC 2008: 10 |
82 | EE | Gelareh Taban,
Virgil D. Gligor:
Efficient Handling of Adversary Attacks in Aggregation Applications.
ESORICS 2008: 66-81 |
81 | EE | Maxim Raya,
Panagiotis Papadimitratos,
Virgil D. Gligor,
Jean-Pierre Hubaux:
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks.
INFOCOM 2008: 1238-1246 |
2007 |
80 | | Peng Ning,
Vijay Atluri,
Virgil D. Gligor,
Heiko Mantel:
Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007
ACM 2007 |
79 | EE | Virgil D. Gligor:
On the evolution of adversary models in security protocols: from the beginning to sensor networks.
ASIACCS 2007: 3 |
78 | EE | Mark Luk,
Ghita Mezzour,
Adrian Perrig,
Virgil D. Gligor:
MiniSec: a secure sensor network communication architecture.
IPSN 2007: 479-488 |
77 | EE | Farooq Anjum,
S. Choi,
Virgil D. Gligor,
Ralf Guido Herrtwich,
Jean-Pierre Hubaux,
P. R. Kumar,
Rajeev Shorey,
Chin-Tau Lea:
Guest Editorial Vehicular Networks.
IEEE Journal on Selected Areas in Communications 25(8): 1497-1500 (2007) |
2006 |
76 | | Levente Buttyán,
Virgil D. Gligor,
Dirk Westhoff:
Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers
Springer 2006 |
75 | EE | Virgil D. Gligor:
Emergent properties in ad-hoc networks: a security perspective.
ASIACCS 2006: 1 |
74 | EE | Gelareh Taban,
Alvaro A. Cárdenas,
Virgil D. Gligor:
Towards a secure and interoperable DRM architecture.
Digital Rights Management Workshop 2006: 69-78 |
73 | EE | Virgil D. Gligor,
Thomas Haigh,
Dick Kemmerer,
Carl E. Landwehr,
Steven B. Lipner,
John D. McLean:
Information Assurance Technology Forecast 2005.
IEEE Security & Privacy 4(1): 62-69 (2006) |
2005 |
72 | EE | Jonathan Katz,
Philip D. MacKenzie,
Gelareh Taban,
Virgil D. Gligor:
Two-Server Password-Only Authenticated Key Exchange.
ACNS 2005: 1-16 |
71 | EE | Bryan Parno,
Adrian Perrig,
Virgil D. Gligor:
Distributed Detection of Node Replication Attacks in Sensor Networks.
IEEE Symposium on Security and Privacy 2005: 49-63 |
70 | EE | Rakeshbabu Bobba,
Serban I. Gavrila,
Virgil D. Gligor,
Himanshu Khurana,
Radostina K. Koleva:
Administering Access Control in Dynamic Coalitions.
LISA 2005: 249-261 |
69 | EE | Virgil D. Gligor:
Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks.
MADNES 2005: 1 |
68 | EE | Mike Burmester,
Virgil D. Gligor,
Evangelos Kranakis,
J. D. Tygar,
Yuliang Zheng:
Panel: Authentication in Constrained Environments.
MADNES 2005: 186-191 |
67 | EE | Virgil D. Gligor:
Advances in sensor and ad-hoc network security: perspective and status.
SASN 2005: 68 |
66 | EE | Virgil D. Gligor:
On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike).
Security Protocols Workshop 2005: 276-283 |
65 | EE | Virgil D. Gligor:
Emergent properties in ad-hoc networks: a security perspective.
Workshop on Wireless Security 2005: 55 |
64 | EE | Haowen Chan,
Virgil D. Gligor,
Adrian Perrig,
Gautam Muralidharan:
On the Distribution and Revocation of Cryptographic Keys in Sensor Networks.
IEEE Trans. Dependable Sec. Comput. 2(3): 233-247 (2005) |
2004 |
63 | EE | Virgil D. Gligor:
Security of Emergent Properties in Ad-Hoc Networks (Transcript of Discussion).
Security Protocols Workshop 2004: 256-266 |
62 | EE | Himanshu Khurana,
Virgil D. Gligor:
A Model for Access Negotiations in Dynamic Coalitions.
WETICE 2004: 205-210 |
2003 |
61 | EE | Omer Horvitz,
Virgil D. Gligor:
Weak Key Authenticity and the Computational Completeness of Formal Encryption.
CRYPTO 2003: 530-547 |
60 | EE | Himanshu Khurana,
Serban I. Gavrila,
Rakeshbabu Bobba,
Radostina K. Koleva,
Anuja Sonalker,
Emilian Dinu,
Virgil D. Gligor,
John S. Baras:
Integrated Security Services for Dynamic Coalitions.
DISCEX (2) 2003: 38-40 |
59 | EE | Virgil D. Gligor:
Guaranteeing Access in Spite of Distributed Service-Flooding Attacks.
Security Protocols Workshop 2003: 80-96 |
58 | EE | Virgil D. Gligor:
Guaranteeing Access in Spite of Distributed Service-Flooding Attacks (Discussion).
Security Protocols Workshop 2003: 97-105 |
2002 |
57 | | Agnes Hui Chan,
Virgil D. Gligor:
Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings
Springer 2002 |
56 | EE | Laurent Eschenauer,
Virgil D. Gligor:
A key-management scheme for distributed sensor networks.
ACM Conference on Computer and Communications Security 2002: 41-47 |
55 | EE | Himanshu Khurana,
Virgil D. Gligor,
John Linn:
Reasoning about Joint Administration of Access Policies for Coalition Resources.
ICDCS 2002: 429- |
54 | EE | Laurent Eschenauer,
Virgil D. Gligor,
John S. Baras:
On Trust Establishment in Mobile Ad-Hoc Networks.
Security Protocols Workshop 2002: 47-66 |
2001 |
53 | EE | Peter Ryan,
John D. McLean,
Jonathan K. Millen,
Virgil D. Gligor:
Non-Interference: Who Needs It?
CSFW 2001: 237- |
52 | EE | Virgil D. Gligor,
Pompiliu Donescu:
Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes.
FSE 2001: 92-108 |
51 | EE | Virgil D. Gligor,
Himanshu Khurana,
Radostina K. Koleva,
Vijay G. Bharadwaj,
John S. Baras:
On the Negotiation of Access Control Policies.
Security Protocols Workshop 2001: 188-201 |
50 | EE | Virgil D. Gligor:
Negotiation of Access Control Policies (Transcript of Discussion).
Security Protocols Workshop 2001: 202-212 |
2000 |
49 | EE | Crispin Cowan,
Steve Beattie,
Greg Kroah-Hartman,
Calton Pu,
Perry Wagle,
Virgil D. Gligor:
SubDomain: Parsimonious Server Security.
LISA 2000: 355-368 |
48 | EE | Himanshu Khurana,
Virgil D. Gligor:
Review and Revocation of Access Privileges Distributed with PKI Certificates.
Security Protocols Workshop 2000: 100-112 |
47 | EE | Virgil D. Gligor:
Review and Revocation of Access Privileges Distributed with PKI Certificates (Transcript of Discussion).
Security Protocols Workshop 2000: 113-124 |
46 | EE | Virgil D. Gligor,
Matt Blaze,
John Ioannidis:
Denial of Service - Panel Discussion.
Security Protocols Workshop 2000: 194-203 |
1999 |
45 | EE | Virgil D. Gligor:
20 Years of Operating Systems Security.
IEEE Symposium on Security and Privacy 1999: 108-110 |
44 | | Virgil D. Gligor,
Pompiliu Donescu:
Integrity-Aware PCBC Encryption Schemes.
Security Protocols Workshop 1999: 153-171 |
1998 |
43 | EE | Virgil D. Gligor,
Serban I. Gavrila,
David F. Ferraiolo:
On the Formal Definition of Separation-of-Duty Policies and their Composition.
IEEE Symposium on Security and Privacy 1998: 172-183 |
42 | EE | Virgil D. Gligor,
Peter Landrock,
T. Mark A. Lomas,
Raphael Yahalom,
John P. Warne:
Discussion Session: Differences Between Academic and Commercial Security.
Security Protocols Workshop 1998: 177-192 |
41 | EE | Roger M. Needham,
E. Stewart Lee,
Joan Feigenbaum,
Virgil D. Gligor,
Bruce Christianson:
Panel Session - Future Directions.
Security Protocols Workshop 1998: 227-239 |
40 | EE | Virgil D. Gligor,
Serban I. Gavrila:
Application-Oriented Security Policies and Their Composition (Position Paper).
Security Protocols Workshop 1998: 67-74 |
39 | EE | Virgil D. Gligor:
Application-Oriented Security Policies and Their Composition (Transcript of Discussion).
Security Protocols Workshop 1998: 75-82 |
1997 |
38 | EE | Shiuh-Pyng Shieh,
Virgil D. Gligor:
On a Pattern-Oriented Model for Intrusion Detection.
IEEE Trans. Knowl. Data Eng. 9(4): 661-667 (1997) |
1996 |
37 | | Shiuh-Pyng Shieh,
Virgil D. Gligor:
Detecting Illicit Leakage of Information in Operating Systems.
Journal of Computer Security 4(2/3): 123-148 (1996) |
1995 |
36 | EE | Virgil D. Gligor:
Characteristics of role-based access control.
ACM Workshop on Role-Based Access Control 1995 |
1993 |
35 | | Virgil D. Gligor,
Shyh-Wei Luan,
Joe Pato:
On Inter-Realm Authentication in Large Distributed Systems.
Journal of Computer Security 2(2-3): 137-158 (1993) |
1992 |
34 | EE | Jingsha He,
Virgil D. Gligor:
Formal Methods and Automated Tool for Timing-Channel Identification in TCB Source Code.
ESORICS 1992: 57-76 |
33 | | Sarbari Gupta,
Virgil D. Gligor:
Towards a Theory of Penetration-Resistant Systems and its Applications.
Journal of Computer Security 1(2): 133-158 (1992) |
1991 |
32 | | Rajashekar Kailar,
Virgil D. Gligor:
On Belief Evolution in Authentication Protocols.
CSFW 1991: 103-116 |
31 | | Virgil D. Gligor,
Rajashekar Kailar,
Stuart G. Stubblebine,
Li Gong:
Logics for Cryptographic Protocols - Virtues and Limitations.
CSFW 1991: 219-226 |
30 | | Sarbari Gupta,
Virgil D. Gligor:
Towards a Theory of Penetration-Resistant Systems and its Applications.
CSFW 1991: 62-78 |
29 | | Shiuh-Pyng Shieh,
Virgil D. Gligor:
A Pattern-Oriented Intrusion-Detection Model and Its Applications.
IEEE Symposium on Security and Privacy 1991: 327-342 |
1990 |
28 | | Jingsha He,
Virgil D. Gligor:
Information-Flow Analysis for Covert-Channel Identification in Multilevel Secure Operating Systems.
CSFW 1990: 139-149 |
27 | | Shyh-Wei Luan,
Virgil D. Gligor:
On Replay Detection in Distributed Systems.
ICDCS 1990: 188-195 |
26 | | P.-C. Cheng,
Virgil D. Gligor:
On the Formal Specification and Verification of a Multiparty Session Protocol.
IEEE Symposium on Security and Privacy 1990: 216-233 |
25 | | Shiuh-Pyng Shieh,
Virgil D. Gligor:
Auditing the Use of Covert Storage Channels in Secure Systems.
IEEE Symposium on Security and Privacy 1990: 285-295 |
24 | EE | Shyh-Wei Luan,
Virgil D. Gligor:
A Fault-Tolerant Protocol for Atomic Broadcast.
IEEE Trans. Parallel Distrib. Syst. 1(3): 271-285 (1990) |
23 | EE | Chii-Ren Tsai,
Virgil D. Gligor,
C. Sekar Chandersekaran:
On the Identification of Covert Storage Channels in Secure Systems.
IEEE Trans. Software Eng. 16(6): 569-580 (1990) |
22 | EE | Che-Fn Yu,
Virgil D. Gligor:
A Specification and Verification Method for Preventing Denial of Service.
IEEE Trans. Software Eng. 16(6): 581-592 (1990) |
1988 |
21 | | Shyh-Wei Luan,
Virgil D. Gligor:
A Fault-Tolerant Protocol for Atomic Broadcast.
SRDS 1988: 112-126 |
1987 |
20 | | Shau-Ping Lo,
Virgil D. Gligor:
A Comparative Analysis of Multiprocessor Scheduling Algorithms.
ICDCS 1987: 356-363 |
19 | | Shau-Ping Lo,
Virgil D. Gligor:
Properties of Multiprocessor Scheduling Algorithms.
ICPP 1987: 867-870 |
18 | | Chii-Ren Tsai,
Virgil D. Gligor,
C. Sekar Chandersekaran:
A Formal Method for the Identification of Covert Storage Channels in Source Code.
IEEE Symposium on Security and Privacy 1987: 74-87 |
17 | | Virgil D. Gligor,
C. Sekar Chandersekaran,
Wen-Der Jiang,
Abhai Johri,
Gary L. Luckenbaugh,
L. Edward Reich:
A New Security Testing Method and Its Application to the Secure Xenix Kernel.
IEEE Trans. Software Eng. 13(2): 169-183 (1987) |
16 | | Virgil D. Gligor,
C. Sekar Chandersekaran,
Robert S. Chapman,
Leslie J. Dotterer,
Matthew S. Hecht,
Wen-Der Jiang,
Abhai Johri,
Gary L. Luckenbaugh,
N. Vasudevan:
Design and Implementation of Secure Xenix.
IEEE Trans. Software Eng. 13(2): 208-221 (1987) |
1986 |
15 | EE | Virgil D. Gligor:
On Denial-of-Service in Computer Networks.
ICDE 1986: 608-617 |
14 | | Virgil D. Gligor,
E. L. Burch,
C. Sekar Chandersekaran,
Robert S. Chapman,
Leslie J. Dotterer,
Matthew S. Hecht,
Wen-Der Jiang,
Gary L. Luckenbaugh,
N. Vasudevan:
On the Design and the Implementation of Secure Xenix Workstations.
IEEE Symposium on Security and Privacy 1986: 102-117 |
13 | | Virgil D. Gligor,
C. Sekar Chandersekaran,
W. Cheng,
Wen-Der Jiang,
Abhai Johri,
Gary L. Luckenbaugh,
L. Edward Reich:
A New Security Testing Method and Its Application to the Secure Xenix Kernel.
IEEE Symposium on Security and Privacy 1986: 40-59 |
12 | | Virgil D. Gligor,
Radu Popescu-Zeletin:
Transaction management in distributed heterogeneous database management systems.
Inf. Syst. 11(4): 287-297 (1986) |
1985 |
11 | | Virgil D. Gligor,
Peter A. Ng:
Foreword.
IEEE Trans. Software Eng. 11(6): 497-501 (1985) |
1984 |
10 | | Virgil D. Gligor,
Radu Popescu-Zeletin:
Concurrency Control Issues in Distributed Heterogeneous Database Management Systems.
DDSS 1984: 43-56 |
9 | | Virgil D. Gligor,
Gary L. Luckenbaugh:
Inteconnecting Heterogeneous Database Management Systems.
IEEE Computer 17(1): 33-43 (1984) |
8 | | Virgil D. Gligor:
A Note on Denial-of-Service in Operating Systems.
IEEE Trans. Software Eng. 10(3): 320-324 (1984) |
1983 |
7 | | Virgil D. Gligor:
A Note on the Denial-of-Service Problem.
IEEE Symposium on Security and Privacy 1983: 139-149 |
1982 |
6 | | Virgil D. Gligor,
David Maier:
Finding Augmented-Set Bases.
SIAM J. Comput. 11(3): 602-609 (1982) |
1980 |
5 | | Virgil D. Gligor,
Susan H. Shattuck:
On Deadlock Detection in Distributed Systems.
IEEE Trans. Software Eng. 6(5): 435-440 (1980) |
1979 |
4 | | Virgil D. Gligor:
Architectural Implementations of Abstract Data Type Implementation.
ISCA 1979: 20-30 |
3 | | Virgil D. Gligor:
Review and Revocation of Access Privileges Distributed Through Capabilities.
IEEE Trans. Software Eng. 5(6): 575-586 (1979) |
2 | | Virgil D. Gligor,
Bruce G. Lindsay:
Object Migration and Authentication.
IEEE Trans. Software Eng. 5(6): 607-611 (1979) |
1978 |
1 | | Virgil D. Gligor,
David Maier:
Representing Data Bases in Segmented Name Spaces.
JCDKB 1978: 295- |