![]() | 2009 | |
---|---|---|
88 | ![]() ![]() ![]() ![]() ![]() ![]() | Ghita Mezzour, Adrian Perrig, Virgil D. Gligor, Panos Papadimitratos: Privacy-Preserving Relationship Path Discovery in Social Networks. CANS 2009: 189-208 |
87 | ![]() ![]() ![]() ![]() ![]() ![]() | Gelareh Taban, Virgil D. Gligor: Privacy-Preserving Integrity-Assured Data Aggregation in Sensor Networks. CSE (3) 2009: 168-175 |
2008 | ||
86 | ![]() ![]() ![]() ![]() ![]() ![]() | Masayuki Abe, Virgil D. Gligor: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008 ACM 2008 |
85 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor, Jean-Pierre Hubaux, Radha Poovendran: Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008 ACM 2008 |
84 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor: Position Statement: On the Evolution of Adversary Models in Computer Systems and Networks. COMPSAC 2008: 10 |
83 | ![]() ![]() ![]() ![]() ![]() ![]() | Gelareh Taban, Virgil D. Gligor: Efficient Handling of Adversary Attacks in Aggregation Applications. ESORICS 2008: 66-81 |
82 | ![]() ![]() ![]() ![]() ![]() ![]() | Maxim Raya, Panagiotis Papadimitratos, Virgil D. Gligor, Jean-Pierre Hubaux: On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks. INFOCOM 2008: 1238-1246 |
81 | ![]() ![]() ![]() ![]() ![]() ![]() | Ji Sun Shin, Virgil D. Gligor: A New Privacy-Enhanced Matchmaking Protocol. NDSS 2008 |
2007 | ||
80 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Ning, Vijay Atluri, Virgil D. Gligor, Heiko Mantel: Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007 ACM 2007 |
79 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor: On the evolution of adversary models in security protocols: from the beginning to sensor networks. ASIACCS 2007: 3 |
78 | ![]() ![]() ![]() ![]() ![]() ![]() | Mark Luk, Ghita Mezzour, Adrian Perrig, Virgil D. Gligor: MiniSec: a secure sensor network communication architecture. IPSN 2007: 479-488 |
77 | ![]() ![]() ![]() ![]() ![]() ![]() | Farooq Anjum, S. Choi, Virgil D. Gligor, Ralf Guido Herrtwich, Jean-Pierre Hubaux, P. R. Kumar, Rajeev Shorey, Chin-Tau Lea: Guest Editorial Vehicular Networks. IEEE Journal on Selected Areas in Communications 25(8): 1497-1500 (2007) |
2006 | ||
76 | ![]() ![]() ![]() ![]() ![]() ![]() | Levente Buttyán, Virgil D. Gligor, Dirk Westhoff: Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers Springer 2006 |
75 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor: Emergent properties in ad-hoc networks: a security perspective. ASIACCS 2006: 1 |
74 | ![]() ![]() ![]() ![]() ![]() ![]() | Gelareh Taban, Alvaro A. Cárdenas, Virgil D. Gligor: Towards a secure and interoperable DRM architecture. Digital Rights Management Workshop 2006: 69-78 |
73 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor, Thomas Haigh, Dick Kemmerer, Carl E. Landwehr, Steven B. Lipner, John D. McLean: Information Assurance Technology Forecast 2005. IEEE Security & Privacy 4(1): 62-69 (2006) |
2005 | ||
72 | ![]() ![]() ![]() ![]() ![]() ![]() | Jonathan Katz, Philip D. MacKenzie, Gelareh Taban, Virgil D. Gligor: Two-Server Password-Only Authenticated Key Exchange. ACNS 2005: 1-16 |
71 | ![]() ![]() ![]() ![]() ![]() ![]() | Bryan Parno, Adrian Perrig, Virgil D. Gligor: Distributed Detection of Node Replication Attacks in Sensor Networks. IEEE Symposium on Security and Privacy 2005: 49-63 |
70 | ![]() ![]() ![]() ![]() ![]() ![]() | Rakeshbabu Bobba, Serban I. Gavrila, Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva: Administering Access Control in Dynamic Coalitions. LISA 2005: 249-261 |
69 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor: Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks. MADNES 2005: 1 |
68 | ![]() ![]() ![]() ![]() ![]() ![]() | Mike Burmester, Virgil D. Gligor, Evangelos Kranakis, J. D. Tygar, Yuliang Zheng: Panel: Authentication in Constrained Environments. MADNES 2005: 186-191 |
67 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor: Advances in sensor and ad-hoc network security: perspective and status. SASN 2005: 68 |
66 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor: On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike). Security Protocols Workshop 2005: 276-283 |
65 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor: Emergent properties in ad-hoc networks: a security perspective. Workshop on Wireless Security 2005: 55 |
64 | ![]() ![]() ![]() ![]() ![]() ![]() | Haowen Chan, Virgil D. Gligor, Adrian Perrig, Gautam Muralidharan: On the Distribution and Revocation of Cryptographic Keys in Sensor Networks. IEEE Trans. Dependable Sec. Comput. 2(3): 233-247 (2005) |
2004 | ||
63 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor: Security of Emergent Properties in Ad-Hoc Networks (Transcript of Discussion). Security Protocols Workshop 2004: 256-266 |
62 | ![]() ![]() ![]() ![]() ![]() ![]() | Himanshu Khurana, Virgil D. Gligor: A Model for Access Negotiations in Dynamic Coalitions. WETICE 2004: 205-210 |
2003 | ||
61 | ![]() ![]() ![]() ![]() ![]() ![]() | Omer Horvitz, Virgil D. Gligor: Weak Key Authenticity and the Computational Completeness of Formal Encryption. CRYPTO 2003: 530-547 |
60 | ![]() ![]() ![]() ![]() ![]() ![]() | Himanshu Khurana, Serban I. Gavrila, Rakeshbabu Bobba, Radostina K. Koleva, Anuja Sonalker, Emilian Dinu, Virgil D. Gligor, John S. Baras: Integrated Security Services for Dynamic Coalitions. DISCEX (2) 2003: 38-40 |
59 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor: Guaranteeing Access in Spite of Distributed Service-Flooding Attacks. Security Protocols Workshop 2003: 80-96 |
58 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor: Guaranteeing Access in Spite of Distributed Service-Flooding Attacks (Discussion). Security Protocols Workshop 2003: 97-105 |
2002 | ||
57 | ![]() ![]() ![]() ![]() ![]() ![]() | Agnes Hui Chan, Virgil D. Gligor: Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings Springer 2002 |
56 | ![]() ![]() ![]() ![]() ![]() ![]() | Laurent Eschenauer, Virgil D. Gligor: A key-management scheme for distributed sensor networks. ACM Conference on Computer and Communications Security 2002: 41-47 |
55 | ![]() ![]() ![]() ![]() ![]() ![]() | Himanshu Khurana, Virgil D. Gligor, John Linn: Reasoning about Joint Administration of Access Policies for Coalition Resources. ICDCS 2002: 429- |
54 | ![]() ![]() ![]() ![]() ![]() ![]() | Laurent Eschenauer, Virgil D. Gligor, John S. Baras: On Trust Establishment in Mobile Ad-Hoc Networks. Security Protocols Workshop 2002: 47-66 |
2001 | ||
53 | ![]() ![]() ![]() ![]() ![]() ![]() | Peter Ryan, John D. McLean, Jonathan K. Millen, Virgil D. Gligor: Non-Interference: Who Needs It? CSFW 2001: 237- |
52 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor, Pompiliu Donescu: Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes. FSE 2001: 92-108 |
51 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva, Vijay G. Bharadwaj, John S. Baras: On the Negotiation of Access Control Policies. Security Protocols Workshop 2001: 188-201 |
50 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor: Negotiation of Access Control Policies (Transcript of Discussion). Security Protocols Workshop 2001: 202-212 |
2000 | ||
49 | ![]() ![]() ![]() ![]() ![]() ![]() | Crispin Cowan, Steve Beattie, Greg Kroah-Hartman, Calton Pu, Perry Wagle, Virgil D. Gligor: SubDomain: Parsimonious Server Security. LISA 2000: 355-368 |
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Himanshu Khurana, Virgil D. Gligor: Review and Revocation of Access Privileges Distributed with PKI Certificates. Security Protocols Workshop 2000: 100-112 |
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor: Review and Revocation of Access Privileges Distributed with PKI Certificates (Transcript of Discussion). Security Protocols Workshop 2000: 113-124 |
46 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor, Matt Blaze, John Ioannidis: Denial of Service - Panel Discussion. Security Protocols Workshop 2000: 194-203 |
1999 | ||
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor: 20 Years of Operating Systems Security. IEEE Symposium on Security and Privacy 1999: 108-110 |
44 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor, Pompiliu Donescu: Integrity-Aware PCBC Encryption Schemes. Security Protocols Workshop 1999: 153-171 |
1998 | ||
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor, Serban I. Gavrila, David F. Ferraiolo: On the Formal Definition of Separation-of-Duty Policies and their Composition. IEEE Symposium on Security and Privacy 1998: 172-183 |
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor, Peter Landrock, T. Mark A. Lomas, Raphael Yahalom, John P. Warne: Discussion Session: Differences Between Academic and Commercial Security. Security Protocols Workshop 1998: 177-192 |
41 | ![]() ![]() ![]() ![]() ![]() ![]() | Roger M. Needham, E. Stewart Lee, Joan Feigenbaum, Virgil D. Gligor, Bruce Christianson: Panel Session - Future Directions. Security Protocols Workshop 1998: 227-239 |
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor, Serban I. Gavrila: Application-Oriented Security Policies and Their Composition (Position Paper). Security Protocols Workshop 1998: 67-74 |
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor: Application-Oriented Security Policies and Their Composition (Transcript of Discussion). Security Protocols Workshop 1998: 75-82 |
1997 | ||
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Shiuh-Pyng Shieh, Virgil D. Gligor: On a Pattern-Oriented Model for Intrusion Detection. IEEE Trans. Knowl. Data Eng. 9(4): 661-667 (1997) |
1996 | ||
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Shiuh-Pyng Shieh, Virgil D. Gligor: Detecting Illicit Leakage of Information in Operating Systems. Journal of Computer Security 4(2/3): 123-148 (1996) |
1995 | ||
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor: Characteristics of role-based access control. ACM Workshop on Role-Based Access Control 1995 |
1993 | ||
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor, Shyh-Wei Luan, Joe Pato: On Inter-Realm Authentication in Large Distributed Systems. Journal of Computer Security 2(2-3): 137-158 (1993) |
1992 | ||
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Jingsha He, Virgil D. Gligor: Formal Methods and Automated Tool for Timing-Channel Identification in TCB Source Code. ESORICS 1992: 57-76 |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Sarbari Gupta, Virgil D. Gligor: Towards a Theory of Penetration-Resistant Systems and its Applications. Journal of Computer Security 1(2): 133-158 (1992) |
1991 | ||
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Rajashekar Kailar, Virgil D. Gligor: On Belief Evolution in Authentication Protocols. CSFW 1991: 103-116 |
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor, Rajashekar Kailar, Stuart G. Stubblebine, Li Gong: Logics for Cryptographic Protocols - Virtues and Limitations. CSFW 1991: 219-226 |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Sarbari Gupta, Virgil D. Gligor: Towards a Theory of Penetration-Resistant Systems and its Applications. CSFW 1991: 62-78 |
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Shiuh-Pyng Shieh, Virgil D. Gligor: A Pattern-Oriented Intrusion-Detection Model and Its Applications. IEEE Symposium on Security and Privacy 1991: 327-342 |
1990 | ||
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Jingsha He, Virgil D. Gligor: Information-Flow Analysis for Covert-Channel Identification in Multilevel Secure Operating Systems. CSFW 1990: 139-149 |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Shyh-Wei Luan, Virgil D. Gligor: On Replay Detection in Distributed Systems. ICDCS 1990: 188-195 |
26 | ![]() ![]() ![]() ![]() ![]() ![]() | P.-C. Cheng, Virgil D. Gligor: On the Formal Specification and Verification of a Multiparty Session Protocol. IEEE Symposium on Security and Privacy 1990: 216-233 |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Shiuh-Pyng Shieh, Virgil D. Gligor: Auditing the Use of Covert Storage Channels in Secure Systems. IEEE Symposium on Security and Privacy 1990: 285-295 |
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Shyh-Wei Luan, Virgil D. Gligor: A Fault-Tolerant Protocol for Atomic Broadcast. IEEE Trans. Parallel Distrib. Syst. 1(3): 271-285 (1990) |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Chii-Ren Tsai, Virgil D. Gligor, C. Sekar Chandersekaran: On the Identification of Covert Storage Channels in Secure Systems. IEEE Trans. Software Eng. 16(6): 569-580 (1990) |
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Che-Fn Yu, Virgil D. Gligor: A Specification and Verification Method for Preventing Denial of Service. IEEE Trans. Software Eng. 16(6): 581-592 (1990) |
1988 | ||
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Shyh-Wei Luan, Virgil D. Gligor: A Fault-Tolerant Protocol for Atomic Broadcast. SRDS 1988: 112-126 |
1987 | ||
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Shau-Ping Lo, Virgil D. Gligor: A Comparative Analysis of Multiprocessor Scheduling Algorithms. ICDCS 1987: 356-363 |
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Shau-Ping Lo, Virgil D. Gligor: Properties of Multiprocessor Scheduling Algorithms. ICPP 1987: 867-870 |
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Chii-Ren Tsai, Virgil D. Gligor, C. Sekar Chandersekaran: A Formal Method for the Identification of Covert Storage Channels in Source Code. IEEE Symposium on Security and Privacy 1987: 74-87 |
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor, C. Sekar Chandersekaran, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, L. Edward Reich: A New Security Testing Method and Its Application to the Secure Xenix Kernel. IEEE Trans. Software Eng. 13(2): 169-183 (1987) |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, N. Vasudevan: Design and Implementation of Secure Xenix. IEEE Trans. Software Eng. 13(2): 208-221 (1987) |
1986 | ||
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor: On Denial-of-Service in Computer Networks. ICDE 1986: 608-617 |
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor, E. L. Burch, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Gary L. Luckenbaugh, N. Vasudevan: On the Design and the Implementation of Secure Xenix Workstations. IEEE Symposium on Security and Privacy 1986: 102-117 |
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor, C. Sekar Chandersekaran, W. Cheng, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, L. Edward Reich: A New Security Testing Method and Its Application to the Secure Xenix Kernel. IEEE Symposium on Security and Privacy 1986: 40-59 |
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor, Radu Popescu-Zeletin: Transaction management in distributed heterogeneous database management systems. Inf. Syst. 11(4): 287-297 (1986) |
1985 | ||
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor, Peter A. Ng: Foreword. IEEE Trans. Software Eng. 11(6): 497-501 (1985) |
1984 | ||
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor, Radu Popescu-Zeletin: Concurrency Control Issues in Distributed Heterogeneous Database Management Systems. DDSS 1984: 43-56 |
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor, Gary L. Luckenbaugh: Inteconnecting Heterogeneous Database Management Systems. IEEE Computer 17(1): 33-43 (1984) |
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor: A Note on Denial-of-Service in Operating Systems. IEEE Trans. Software Eng. 10(3): 320-324 (1984) |
1983 | ||
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor: A Note on the Denial-of-Service Problem. IEEE Symposium on Security and Privacy 1983: 139-149 |
1982 | ||
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor, David Maier: Finding Augmented-Set Bases. SIAM J. Comput. 11(3): 602-609 (1982) |
1980 | ||
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor, Susan H. Shattuck: On Deadlock Detection in Distributed Systems. IEEE Trans. Software Eng. 6(5): 435-440 (1980) |
1979 | ||
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor: Architectural Implementations of Abstract Data Type Implementation. ISCA 1979: 20-30 |
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor: Review and Revocation of Access Privileges Distributed Through Capabilities. IEEE Trans. Software Eng. 5(6): 575-586 (1979) |
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor, Bruce G. Lindsay: Object Migration and Authentication. IEEE Trans. Software Eng. 5(6): 607-611 (1979) |
1978 | ||
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Virgil D. Gligor, David Maier: Representing Data Bases in Segmented Name Spaces. JCDKB 1978: 295- |