Search the dblp DataBase
Virgil D. Gligor :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Virgil D. Gligor , Radu Popescu-Zeletin Transaction management in distributed heterogeneous database management systems. [Citation Graph (16, 0)][DBLP ] Inf. Syst., 1986, v:11, n:4, pp:287-297 [Journal ] Virgil D. Gligor , Susan H. Shattuck On Deadlock Detection in Distributed Systems. [Citation Graph (13, 0)][DBLP ] IEEE Trans. Software Eng., 1980, v:6, n:5, pp:435-440 [Journal ] Virgil D. Gligor , Radu Popescu-Zeletin Concurrency Control Issues in Distributed Heterogeneous Database Management Systems. [Citation Graph (12, 0)][DBLP ] DDSS, 1984, pp:43-56 [Conf ] Virgil D. Gligor , Gary L. Luckenbaugh Inteconnecting Heterogeneous Database Management Systems. [Citation Graph (3, 0)][DBLP ] IEEE Computer, 1984, v:17, n:1, pp:33-43 [Journal ] Shiuh-Pyng Shieh , Virgil D. Gligor A Pattern-Oriented Intrusion-Detection Model and Its Applications. [Citation Graph (1, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1991, pp:327-342 [Conf ] Shyh-Wei Luan , Virgil D. Gligor A Fault-Tolerant Protocol for Atomic Broadcast. [Citation Graph (1, 0)][DBLP ] Symposium on Reliable Distributed Systems, 1988, pp:112-126 [Conf ] Virgil D. Gligor A Note on Denial-of-Service in Operating Systems. [Citation Graph (1, 0)][DBLP ] IEEE Trans. Software Eng., 1984, v:10, n:3, pp:320-324 [Journal ] Virgil D. Gligor , C. Sekar Chandersekaran , Robert S. Chapman , Leslie J. Dotterer , Matthew S. Hecht , Wen-Der Jiang , Abhai Johri , Gary L. Luckenbaugh , N. Vasudevan Design and Implementation of Secure Xenix. [Citation Graph (1, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:208-221 [Journal ] Jonathan Katz , Philip D. MacKenzie , Gelareh Taban , Virgil D. Gligor Two-Server Password-Only Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP ] ACNS, 2005, pp:1-16 [Conf ] Laurent Eschenauer , Virgil D. Gligor A key-management scheme for distributed sensor networks. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:41-47 [Conf ] Virgil D. Gligor Emergent properties in ad-hoc networks: a security perspective. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:1- [Conf ] Virgil D. Gligor On the evolution of adversary models in security protocols: from the beginning to sensor networks. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:3- [Conf ] Omer Horvitz , Virgil D. Gligor Weak Key Authenticity and the Computational Completeness of Formal Encryption. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:530-547 [Conf ] Virgil D. Gligor , Rajashekar Kailar , Stuart G. Stubblebine , Li Gong Logics for Cryptographic Protocols - Virtues and Limitations. [Citation Graph (0, 0)][DBLP ] CSFW, 1991, pp:219-226 [Conf ] Sarbari Gupta , Virgil D. Gligor Towards a Theory of Penetration-Resistant Systems and its Applications. [Citation Graph (0, 0)][DBLP ] CSFW, 1991, pp:62-78 [Conf ] Jingsha He , Virgil D. Gligor Information-Flow Analysis for Covert-Channel Identification in Multilevel Secure Operating Systems. [Citation Graph (0, 0)][DBLP ] CSFW, 1990, pp:139-149 [Conf ] Rajashekar Kailar , Virgil D. Gligor On Belief Evolution in Authentication Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 1991, pp:103-116 [Conf ] Peter Ryan , John D. McLean , Jonathan K. Millen , Virgil D. Gligor Non-Interference: Who Needs It? [Citation Graph (0, 0)][DBLP ] CSFW, 2001, pp:237-0 [Conf ] Himanshu Khurana , Serban I. Gavrila , Rakeshbabu Bobba , Radostina K. Koleva , Anuja Sonalker , Emilian Dinu , Virgil D. Gligor , John S. Baras Integrated Security Services for Dynamic Coalitions. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:38-40 [Conf ] Jingsha He , Virgil D. Gligor Formal Methods and Automated Tool for Timing-Channel Identification in TCB Source Code. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:57-76 [Conf ] Virgil D. Gligor , Pompiliu Donescu Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes. [Citation Graph (0, 0)][DBLP ] FSE, 2001, pp:92-108 [Conf ] Himanshu Khurana , Virgil D. Gligor , John Linn Reasoning about Joint Administration of Access Policies for Coalition Resources. [Citation Graph (0, 0)][DBLP ] ICDCS, 2002, pp:429-0 [Conf ] Shau-Ping Lo , Virgil D. Gligor A Comparative Analysis of Multiprocessor Scheduling Algorithms. [Citation Graph (0, 0)][DBLP ] ICDCS, 1987, pp:356-363 [Conf ] Shyh-Wei Luan , Virgil D. Gligor On Replay Detection in Distributed Systems. [Citation Graph (0, 0)][DBLP ] ICDCS, 1990, pp:188-195 [Conf ] Virgil D. Gligor On Denial-of-Service in Computer Networks. [Citation Graph (0, 9)][DBLP ] ICDE, 1986, pp:608-617 [Conf ] Shau-Ping Lo , Virgil D. Gligor Properties of Multiprocessor Scheduling Algorithms. [Citation Graph (0, 0)][DBLP ] ICPP, 1987, pp:867-870 [Conf ] Mark Luk , Ghita Mezzour , Adrian Perrig , Virgil D. Gligor MiniSec: a secure sensor network communication architecture. [Citation Graph (0, 0)][DBLP ] IPSN, 2007, pp:479-488 [Conf ] Virgil D. Gligor Architectural Implementations of Abstract Data Type Implementation. [Citation Graph (0, 0)][DBLP ] ISCA, 1979, pp:20-30 [Conf ] Virgil D. Gligor , David Maier Representing Data Bases in Segmented Name Spaces. [Citation Graph (0, 0)][DBLP ] JCDKB, 1978, pp:295-0 [Conf ] Crispin Cowan , Steve Beattie , Greg Kroah-Hartman , Calton Pu , Perry Wagle , Virgil D. Gligor SubDomain: Parsimonious Server Security. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:355-368 [Conf ] Rakeshbabu Bobba , Serban I. Gavrila , Virgil D. Gligor , Himanshu Khurana , Radostina K. Koleva Administering Access Control in Dynamic Coalitions. [Citation Graph (0, 0)][DBLP ] LISA, 2005, pp:249-261 [Conf ] Mike Burmester , Virgil D. Gligor , Evangelos Kranakis , J. D. Tygar , Yuliang Zheng Panel: Authentication in Constrained Environments. [Citation Graph (0, 0)][DBLP ] MADNES, 2005, pp:186-191 [Conf ] Virgil D. Gligor Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] MADNES, 2005, pp:1- [Conf ] Virgil D. Gligor Characteristics of role-based access control. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf ] Virgil D. Gligor Advances in sensor and ad-hoc network security: perspective and status. [Citation Graph (0, 0)][DBLP ] SASN, 2005, pp:68- [Conf ] P.-C. Cheng , Virgil D. Gligor On the Formal Specification and Verification of a Multiparty Session Protocol. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1990, pp:216-233 [Conf ] Virgil D. Gligor A Note on the Denial-of-Service Problem. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1983, pp:139-149 [Conf ] Virgil D. Gligor 20 Years of Operating Systems Security. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1999, pp:108-110 [Conf ] Virgil D. Gligor , E. L. Burch , C. Sekar Chandersekaran , Robert S. Chapman , Leslie J. Dotterer , Matthew S. Hecht , Wen-Der Jiang , Gary L. Luckenbaugh , N. Vasudevan On the Design and the Implementation of Secure Xenix Workstations. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1986, pp:102-117 [Conf ] Virgil D. Gligor , C. Sekar Chandersekaran , W. Cheng , Wen-Der Jiang , Abhai Johri , Gary L. Luckenbaugh , L. Edward Reich A New Security Testing Method and Its Application to the Secure Xenix Kernel. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1986, pp:40-59 [Conf ] Bryan Parno , Adrian Perrig , Virgil D. Gligor Distributed Detection of Node Replication Attacks in Sensor Networks. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:49-63 [Conf ] Chii-Ren Tsai , Virgil D. Gligor , C. Sekar Chandersekaran A Formal Method for the Identification of Covert Storage Channels in Source Code. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1987, pp:74-87 [Conf ] Shiuh-Pyng Shieh , Virgil D. Gligor Auditing the Use of Covert Storage Channels in Secure Systems. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1990, pp:285-295 [Conf ] Laurent Eschenauer , Virgil D. Gligor , John S. Baras On Trust Establishment in Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2002, pp:47-66 [Conf ] Virgil D. Gligor Review and Revocation of Access Privileges Distributed with PKI Certificates (Transcript of Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2000, pp:113-124 [Conf ] Virgil D. Gligor Negotiation of Access Control Policies (Transcript of Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2001, pp:202-212 [Conf ] Virgil D. Gligor Guaranteeing Access in Spite of Distributed Service-Flooding Attacks. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2003, pp:80-96 [Conf ] Virgil D. Gligor Guaranteeing Access in Spite of Distributed Service-Flooding Attacks (Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2003, pp:97-105 [Conf ] Virgil D. Gligor Application-Oriented Security Policies and Their Composition (Transcript of Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1998, pp:75-82 [Conf ] Virgil D. Gligor , Matt Blaze , John Ioannidis Denial of Service - Panel Discussion. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2000, pp:194-203 [Conf ] Virgil D. Gligor , Pompiliu Donescu Integrity-Aware PCBC Encryption Schemes. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1999, pp:153-171 [Conf ] Virgil D. Gligor , Serban I. Gavrila Application-Oriented Security Policies and Their Composition (Position Paper). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1998, pp:67-74 [Conf ] Virgil D. Gligor , Himanshu Khurana , Radostina K. Koleva , Vijay G. Bharadwaj , John S. Baras On the Negotiation of Access Control Policies. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2001, pp:188-201 [Conf ] Virgil D. Gligor , Peter Landrock , T. Mark A. Lomas , Raphael Yahalom , John P. Warne Discussion Session: Differences Between Academic and Commercial Security. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1998, pp:177-192 [Conf ] Himanshu Khurana , Virgil D. Gligor Review and Revocation of Access Privileges Distributed with PKI Certificates. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2000, pp:100-112 [Conf ] Roger M. Needham , E. Stewart Lee , Joan Feigenbaum , Virgil D. Gligor , Bruce Christianson Panel Session - Future Directions. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1998, pp:227-239 [Conf ] Virgil D. Gligor Security of Emergent Properties in Ad-Hoc Networks (Transcript of Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2004, pp:256-266 [Conf ] Himanshu Khurana , Virgil D. Gligor A Model for Access Negotiations in Dynamic Coalitions. [Citation Graph (0, 0)][DBLP ] WETICE, 2004, pp:205-210 [Conf ] Virgil D. Gligor , Thomas Haigh , Dick Kemmerer , Carl E. Landwehr , Steven B. Lipner , John D. McLean Information Assurance Technology Forecast 2005. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2006, v:4, n:1, pp:62-69 [Journal ] Sarbari Gupta , Virgil D. Gligor Towards a Theory of Penetration-Resistant Systems and its Applications. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1992, v:1, n:2, pp:133-158 [Journal ] Virgil D. Gligor , Shyh-Wei Luan , Joe Pato On Inter-Realm Authentication in Large Distributed Systems. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1993, v:2, n:2-3, pp:137-158 [Journal ] Shiuh-Pyng Shieh , Virgil D. Gligor Detecting Illicit Leakage of Information in Operating Systems. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1996, v:4, n:2/3, pp:123-148 [Journal ] Virgil D. Gligor , David Maier Finding Augmented-Set Bases. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1982, v:11, n:3, pp:602-609 [Journal ] Haowen Chan , Virgil D. Gligor , Adrian Perrig , Gautam Muralidharan On the Distribution and Revocation of Cryptographic Keys in Sensor Networks. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:3, pp:233-247 [Journal ] Shiuh-Pyng Shieh , Virgil D. Gligor On a Pattern-Oriented Model for Intrusion Detection. [Citation Graph (0, 8)][DBLP ] IEEE Trans. Knowl. Data Eng., 1997, v:9, n:4, pp:661-667 [Journal ] Shyh-Wei Luan , Virgil D. Gligor A Fault-Tolerant Protocol for Atomic Broadcast. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 1990, v:1, n:3, pp:271-285 [Journal ] Virgil D. Gligor Review and Revocation of Access Privileges Distributed Through Capabilities. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1979, v:5, n:6, pp:575-586 [Journal ] Virgil D. Gligor , C. Sekar Chandersekaran , Wen-Der Jiang , Abhai Johri , Gary L. Luckenbaugh , L. Edward Reich A New Security Testing Method and Its Application to the Secure Xenix Kernel. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:169-183 [Journal ] Virgil D. Gligor , Bruce G. Lindsay Object Migration and Authentication. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1979, v:5, n:6, pp:607-611 [Journal ] Virgil D. Gligor , Peter A. Ng Foreword. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1985, v:11, n:6, pp:497-501 [Journal ] Chii-Ren Tsai , Virgil D. Gligor , C. Sekar Chandersekaran On the Identification of Covert Storage Channels in Secure Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1990, v:16, n:6, pp:569-580 [Journal ] Che-Fn Yu , Virgil D. Gligor A Specification and Verification Method for Preventing Denial of Service. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1990, v:16, n:6, pp:581-592 [Journal ] Privacy-Preserving Relationship Path Discovery in Social Networks. [Citation Graph (, )][DBLP ] Position Statement: On the Evolution of Adversary Models in Computer Systems and Networks. [Citation Graph (, )][DBLP ] Towards a secure and interoperable DRM architecture. [Citation Graph (, )][DBLP ] Efficient Handling of Adversary Attacks in Aggregation Applications. [Citation Graph (, )][DBLP ] FLoc : Dependable Link Access for Legitimate Traffic in Flooding Attacks. [Citation Graph (, )][DBLP ] On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks. [Citation Graph (, )][DBLP ] A New Privacy-Enhanced Matchmaking Protocol. [Citation Graph (, )][DBLP ] Architectures for practical security. [Citation Graph (, )][DBLP ] TrustVisor: Efficient TCB Reduction and Attestation. [Citation Graph (, )][DBLP ] On the Formal Definition of Separation-of-Duty Policies and their Composition. [Citation Graph (, )][DBLP ] On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike). [Citation Graph (, )][DBLP ] Emergent properties in ad-hoc networks: a security perspective. [Citation Graph (, )][DBLP ] Privacy-Preserving Integrity-Assured Data Aggregation in Sensor Networks. [Citation Graph (, )][DBLP ] Search in 0.067secs, Finished in 0.070secs