2009 | ||
---|---|---|
88 | Ghita Mezzour, Adrian Perrig, Virgil D. Gligor, Panos Papadimitratos: Privacy-Preserving Relationship Path Discovery in Social Networks. CANS 2009: 189-208 | |
87 | Gelareh Taban, Virgil D. Gligor: Privacy-Preserving Integrity-Assured Data Aggregation in Sensor Networks. CSE (3) 2009: 168-175 | |
2008 | ||
86 | Masayuki Abe, Virgil D. Gligor: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008 ACM 2008 | |
85 | Virgil D. Gligor, Jean-Pierre Hubaux, Radha Poovendran: Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008 ACM 2008 | |
84 | Virgil D. Gligor: Position Statement: On the Evolution of Adversary Models in Computer Systems and Networks. COMPSAC 2008: 10 | |
83 | Gelareh Taban, Virgil D. Gligor: Efficient Handling of Adversary Attacks in Aggregation Applications. ESORICS 2008: 66-81 | |
82 | Maxim Raya, Panagiotis Papadimitratos, Virgil D. Gligor, Jean-Pierre Hubaux: On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks. INFOCOM 2008: 1238-1246 | |
81 | Ji Sun Shin, Virgil D. Gligor: A New Privacy-Enhanced Matchmaking Protocol. NDSS 2008 | |
2007 | ||
80 | Peng Ning, Vijay Atluri, Virgil D. Gligor, Heiko Mantel: Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007 ACM 2007 | |
79 | Virgil D. Gligor: On the evolution of adversary models in security protocols: from the beginning to sensor networks. ASIACCS 2007: 3 | |
78 | Mark Luk, Ghita Mezzour, Adrian Perrig, Virgil D. Gligor: MiniSec: a secure sensor network communication architecture. IPSN 2007: 479-488 | |
77 | Farooq Anjum, S. Choi, Virgil D. Gligor, Ralf Guido Herrtwich, Jean-Pierre Hubaux, P. R. Kumar, Rajeev Shorey, Chin-Tau Lea: Guest Editorial Vehicular Networks. IEEE Journal on Selected Areas in Communications 25(8): 1497-1500 (2007) | |
2006 | ||
76 | Levente Buttyán, Virgil D. Gligor, Dirk Westhoff: Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers Springer 2006 | |
75 | Virgil D. Gligor: Emergent properties in ad-hoc networks: a security perspective. ASIACCS 2006: 1 | |
74 | Gelareh Taban, Alvaro A. Cárdenas, Virgil D. Gligor: Towards a secure and interoperable DRM architecture. Digital Rights Management Workshop 2006: 69-78 | |
73 | Virgil D. Gligor, Thomas Haigh, Dick Kemmerer, Carl E. Landwehr, Steven B. Lipner, John D. McLean: Information Assurance Technology Forecast 2005. IEEE Security & Privacy 4(1): 62-69 (2006) | |
2005 | ||
72 | Jonathan Katz, Philip D. MacKenzie, Gelareh Taban, Virgil D. Gligor: Two-Server Password-Only Authenticated Key Exchange. ACNS 2005: 1-16 | |
71 | Bryan Parno, Adrian Perrig, Virgil D. Gligor: Distributed Detection of Node Replication Attacks in Sensor Networks. IEEE Symposium on Security and Privacy 2005: 49-63 | |
70 | Rakeshbabu Bobba, Serban I. Gavrila, Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva: Administering Access Control in Dynamic Coalitions. LISA 2005: 249-261 | |
69 | Virgil D. Gligor: Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks. MADNES 2005: 1 | |
68 | Mike Burmester, Virgil D. Gligor, Evangelos Kranakis, J. D. Tygar, Yuliang Zheng: Panel: Authentication in Constrained Environments. MADNES 2005: 186-191 | |
67 | Virgil D. Gligor: Advances in sensor and ad-hoc network security: perspective and status. SASN 2005: 68 | |
66 | Virgil D. Gligor: On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike). Security Protocols Workshop 2005: 276-283 | |
65 | Virgil D. Gligor: Emergent properties in ad-hoc networks: a security perspective. Workshop on Wireless Security 2005: 55 | |
64 | Haowen Chan, Virgil D. Gligor, Adrian Perrig, Gautam Muralidharan: On the Distribution and Revocation of Cryptographic Keys in Sensor Networks. IEEE Trans. Dependable Sec. Comput. 2(3): 233-247 (2005) | |
2004 | ||
63 | Virgil D. Gligor: Security of Emergent Properties in Ad-Hoc Networks (Transcript of Discussion). Security Protocols Workshop 2004: 256-266 | |
62 | Himanshu Khurana, Virgil D. Gligor: A Model for Access Negotiations in Dynamic Coalitions. WETICE 2004: 205-210 | |
2003 | ||
61 | Omer Horvitz, Virgil D. Gligor: Weak Key Authenticity and the Computational Completeness of Formal Encryption. CRYPTO 2003: 530-547 | |
60 | Himanshu Khurana, Serban I. Gavrila, Rakeshbabu Bobba, Radostina K. Koleva, Anuja Sonalker, Emilian Dinu, Virgil D. Gligor, John S. Baras: Integrated Security Services for Dynamic Coalitions. DISCEX (2) 2003: 38-40 | |
59 | Virgil D. Gligor: Guaranteeing Access in Spite of Distributed Service-Flooding Attacks. Security Protocols Workshop 2003: 80-96 | |
58 | Virgil D. Gligor: Guaranteeing Access in Spite of Distributed Service-Flooding Attacks (Discussion). Security Protocols Workshop 2003: 97-105 | |
2002 | ||
57 | Agnes Hui Chan, Virgil D. Gligor: Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings Springer 2002 | |
56 | Laurent Eschenauer, Virgil D. Gligor: A key-management scheme for distributed sensor networks. ACM Conference on Computer and Communications Security 2002: 41-47 | |
55 | Himanshu Khurana, Virgil D. Gligor, John Linn: Reasoning about Joint Administration of Access Policies for Coalition Resources. ICDCS 2002: 429- | |
54 | Laurent Eschenauer, Virgil D. Gligor, John S. Baras: On Trust Establishment in Mobile Ad-Hoc Networks. Security Protocols Workshop 2002: 47-66 | |
2001 | ||
53 | Peter Ryan, John D. McLean, Jonathan K. Millen, Virgil D. Gligor: Non-Interference: Who Needs It? CSFW 2001: 237- | |
52 | Virgil D. Gligor, Pompiliu Donescu: Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes. FSE 2001: 92-108 | |
51 | Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva, Vijay G. Bharadwaj, John S. Baras: On the Negotiation of Access Control Policies. Security Protocols Workshop 2001: 188-201 | |
50 | Virgil D. Gligor: Negotiation of Access Control Policies (Transcript of Discussion). Security Protocols Workshop 2001: 202-212 | |
2000 | ||
49 | Crispin Cowan, Steve Beattie, Greg Kroah-Hartman, Calton Pu, Perry Wagle, Virgil D. Gligor: SubDomain: Parsimonious Server Security. LISA 2000: 355-368 | |
48 | Himanshu Khurana, Virgil D. Gligor: Review and Revocation of Access Privileges Distributed with PKI Certificates. Security Protocols Workshop 2000: 100-112 | |
47 | Virgil D. Gligor: Review and Revocation of Access Privileges Distributed with PKI Certificates (Transcript of Discussion). Security Protocols Workshop 2000: 113-124 | |
46 | Virgil D. Gligor, Matt Blaze, John Ioannidis: Denial of Service - Panel Discussion. Security Protocols Workshop 2000: 194-203 | |
1999 | ||
45 | Virgil D. Gligor: 20 Years of Operating Systems Security. IEEE Symposium on Security and Privacy 1999: 108-110 | |
44 | Virgil D. Gligor, Pompiliu Donescu: Integrity-Aware PCBC Encryption Schemes. Security Protocols Workshop 1999: 153-171 | |
1998 | ||
43 | Virgil D. Gligor, Serban I. Gavrila, David F. Ferraiolo: On the Formal Definition of Separation-of-Duty Policies and their Composition. IEEE Symposium on Security and Privacy 1998: 172-183 | |
42 | Virgil D. Gligor, Peter Landrock, T. Mark A. Lomas, Raphael Yahalom, John P. Warne: Discussion Session: Differences Between Academic and Commercial Security. Security Protocols Workshop 1998: 177-192 | |
41 | Roger M. Needham, E. Stewart Lee, Joan Feigenbaum, Virgil D. Gligor, Bruce Christianson: Panel Session - Future Directions. Security Protocols Workshop 1998: 227-239 | |
40 | Virgil D. Gligor, Serban I. Gavrila: Application-Oriented Security Policies and Their Composition (Position Paper). Security Protocols Workshop 1998: 67-74 | |
39 | Virgil D. Gligor: Application-Oriented Security Policies and Their Composition (Transcript of Discussion). Security Protocols Workshop 1998: 75-82 | |
1997 | ||
38 | Shiuh-Pyng Shieh, Virgil D. Gligor: On a Pattern-Oriented Model for Intrusion Detection. IEEE Trans. Knowl. Data Eng. 9(4): 661-667 (1997) | |
1996 | ||
37 | Shiuh-Pyng Shieh, Virgil D. Gligor: Detecting Illicit Leakage of Information in Operating Systems. Journal of Computer Security 4(2/3): 123-148 (1996) | |
1995 | ||
36 | Virgil D. Gligor: Characteristics of role-based access control. ACM Workshop on Role-Based Access Control 1995 | |
1993 | ||
35 | Virgil D. Gligor, Shyh-Wei Luan, Joe Pato: On Inter-Realm Authentication in Large Distributed Systems. Journal of Computer Security 2(2-3): 137-158 (1993) | |
1992 | ||
34 | Jingsha He, Virgil D. Gligor: Formal Methods and Automated Tool for Timing-Channel Identification in TCB Source Code. ESORICS 1992: 57-76 | |
33 | Sarbari Gupta, Virgil D. Gligor: Towards a Theory of Penetration-Resistant Systems and its Applications. Journal of Computer Security 1(2): 133-158 (1992) | |
1991 | ||
32 | Rajashekar Kailar, Virgil D. Gligor: On Belief Evolution in Authentication Protocols. CSFW 1991: 103-116 | |
31 | Virgil D. Gligor, Rajashekar Kailar, Stuart G. Stubblebine, Li Gong: Logics for Cryptographic Protocols - Virtues and Limitations. CSFW 1991: 219-226 | |
30 | Sarbari Gupta, Virgil D. Gligor: Towards a Theory of Penetration-Resistant Systems and its Applications. CSFW 1991: 62-78 | |
29 | Shiuh-Pyng Shieh, Virgil D. Gligor: A Pattern-Oriented Intrusion-Detection Model and Its Applications. IEEE Symposium on Security and Privacy 1991: 327-342 | |
1990 | ||
28 | Jingsha He, Virgil D. Gligor: Information-Flow Analysis for Covert-Channel Identification in Multilevel Secure Operating Systems. CSFW 1990: 139-149 | |
27 | Shyh-Wei Luan, Virgil D. Gligor: On Replay Detection in Distributed Systems. ICDCS 1990: 188-195 | |
26 | P.-C. Cheng, Virgil D. Gligor: On the Formal Specification and Verification of a Multiparty Session Protocol. IEEE Symposium on Security and Privacy 1990: 216-233 | |
25 | Shiuh-Pyng Shieh, Virgil D. Gligor: Auditing the Use of Covert Storage Channels in Secure Systems. IEEE Symposium on Security and Privacy 1990: 285-295 | |
24 | Shyh-Wei Luan, Virgil D. Gligor: A Fault-Tolerant Protocol for Atomic Broadcast. IEEE Trans. Parallel Distrib. Syst. 1(3): 271-285 (1990) | |
23 | Chii-Ren Tsai, Virgil D. Gligor, C. Sekar Chandersekaran: On the Identification of Covert Storage Channels in Secure Systems. IEEE Trans. Software Eng. 16(6): 569-580 (1990) | |
22 | Che-Fn Yu, Virgil D. Gligor: A Specification and Verification Method for Preventing Denial of Service. IEEE Trans. Software Eng. 16(6): 581-592 (1990) | |
1988 | ||
21 | Shyh-Wei Luan, Virgil D. Gligor: A Fault-Tolerant Protocol for Atomic Broadcast. SRDS 1988: 112-126 | |
1987 | ||
20 | Shau-Ping Lo, Virgil D. Gligor: A Comparative Analysis of Multiprocessor Scheduling Algorithms. ICDCS 1987: 356-363 | |
19 | Shau-Ping Lo, Virgil D. Gligor: Properties of Multiprocessor Scheduling Algorithms. ICPP 1987: 867-870 | |
18 | Chii-Ren Tsai, Virgil D. Gligor, C. Sekar Chandersekaran: A Formal Method for the Identification of Covert Storage Channels in Source Code. IEEE Symposium on Security and Privacy 1987: 74-87 | |
17 | Virgil D. Gligor, C. Sekar Chandersekaran, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, L. Edward Reich: A New Security Testing Method and Its Application to the Secure Xenix Kernel. IEEE Trans. Software Eng. 13(2): 169-183 (1987) | |
16 | Virgil D. Gligor, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, N. Vasudevan: Design and Implementation of Secure Xenix. IEEE Trans. Software Eng. 13(2): 208-221 (1987) | |
1986 | ||
15 | Virgil D. Gligor: On Denial-of-Service in Computer Networks. ICDE 1986: 608-617 | |
14 | Virgil D. Gligor, E. L. Burch, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Gary L. Luckenbaugh, N. Vasudevan: On the Design and the Implementation of Secure Xenix Workstations. IEEE Symposium on Security and Privacy 1986: 102-117 | |
13 | Virgil D. Gligor, C. Sekar Chandersekaran, W. Cheng, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, L. Edward Reich: A New Security Testing Method and Its Application to the Secure Xenix Kernel. IEEE Symposium on Security and Privacy 1986: 40-59 | |
12 | Virgil D. Gligor, Radu Popescu-Zeletin: Transaction management in distributed heterogeneous database management systems. Inf. Syst. 11(4): 287-297 (1986) | |
1985 | ||
11 | Virgil D. Gligor, Peter A. Ng: Foreword. IEEE Trans. Software Eng. 11(6): 497-501 (1985) | |
1984 | ||
10 | Virgil D. Gligor, Radu Popescu-Zeletin: Concurrency Control Issues in Distributed Heterogeneous Database Management Systems. DDSS 1984: 43-56 | |
9 | Virgil D. Gligor, Gary L. Luckenbaugh: Inteconnecting Heterogeneous Database Management Systems. IEEE Computer 17(1): 33-43 (1984) | |
8 | Virgil D. Gligor: A Note on Denial-of-Service in Operating Systems. IEEE Trans. Software Eng. 10(3): 320-324 (1984) | |
1983 | ||
7 | Virgil D. Gligor: A Note on the Denial-of-Service Problem. IEEE Symposium on Security and Privacy 1983: 139-149 | |
1982 | ||
6 | Virgil D. Gligor, David Maier: Finding Augmented-Set Bases. SIAM J. Comput. 11(3): 602-609 (1982) | |
1980 | ||
5 | Virgil D. Gligor, Susan H. Shattuck: On Deadlock Detection in Distributed Systems. IEEE Trans. Software Eng. 6(5): 435-440 (1980) | |
1979 | ||
4 | Virgil D. Gligor: Architectural Implementations of Abstract Data Type Implementation. ISCA 1979: 20-30 | |
3 | Virgil D. Gligor: Review and Revocation of Access Privileges Distributed Through Capabilities. IEEE Trans. Software Eng. 5(6): 575-586 (1979) | |
2 | Virgil D. Gligor, Bruce G. Lindsay: Object Migration and Authentication. IEEE Trans. Software Eng. 5(6): 607-611 (1979) | |
1978 | ||
1 | Virgil D. Gligor, David Maier: Representing Data Bases in Segmented Name Spaces. JCDKB 1978: 295- |