The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Virgil D. Gligor: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Virgil D. Gligor, Radu Popescu-Zeletin
    Transaction management in distributed heterogeneous database management systems. [Citation Graph (16, 0)][DBLP]
    Inf. Syst., 1986, v:11, n:4, pp:287-297 [Journal]
  2. Virgil D. Gligor, Susan H. Shattuck
    On Deadlock Detection in Distributed Systems. [Citation Graph (13, 0)][DBLP]
    IEEE Trans. Software Eng., 1980, v:6, n:5, pp:435-440 [Journal]
  3. Virgil D. Gligor, Radu Popescu-Zeletin
    Concurrency Control Issues in Distributed Heterogeneous Database Management Systems. [Citation Graph (12, 0)][DBLP]
    DDSS, 1984, pp:43-56 [Conf]
  4. Virgil D. Gligor, Gary L. Luckenbaugh
    Inteconnecting Heterogeneous Database Management Systems. [Citation Graph (3, 0)][DBLP]
    IEEE Computer, 1984, v:17, n:1, pp:33-43 [Journal]
  5. Shiuh-Pyng Shieh, Virgil D. Gligor
    A Pattern-Oriented Intrusion-Detection Model and Its Applications. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:327-342 [Conf]
  6. Shyh-Wei Luan, Virgil D. Gligor
    A Fault-Tolerant Protocol for Atomic Broadcast. [Citation Graph (1, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1988, pp:112-126 [Conf]
  7. Virgil D. Gligor
    A Note on Denial-of-Service in Operating Systems. [Citation Graph (1, 0)][DBLP]
    IEEE Trans. Software Eng., 1984, v:10, n:3, pp:320-324 [Journal]
  8. Virgil D. Gligor, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, N. Vasudevan
    Design and Implementation of Secure Xenix. [Citation Graph (1, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:2, pp:208-221 [Journal]
  9. Jonathan Katz, Philip D. MacKenzie, Gelareh Taban, Virgil D. Gligor
    Two-Server Password-Only Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:1-16 [Conf]
  10. Laurent Eschenauer, Virgil D. Gligor
    A key-management scheme for distributed sensor networks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:41-47 [Conf]
  11. Virgil D. Gligor
    Emergent properties in ad-hoc networks: a security perspective. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:1- [Conf]
  12. Virgil D. Gligor
    On the evolution of adversary models in security protocols: from the beginning to sensor networks. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:3- [Conf]
  13. Omer Horvitz, Virgil D. Gligor
    Weak Key Authenticity and the Computational Completeness of Formal Encryption. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:530-547 [Conf]
  14. Virgil D. Gligor, Rajashekar Kailar, Stuart G. Stubblebine, Li Gong
    Logics for Cryptographic Protocols - Virtues and Limitations. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:219-226 [Conf]
  15. Sarbari Gupta, Virgil D. Gligor
    Towards a Theory of Penetration-Resistant Systems and its Applications. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:62-78 [Conf]
  16. Jingsha He, Virgil D. Gligor
    Information-Flow Analysis for Covert-Channel Identification in Multilevel Secure Operating Systems. [Citation Graph (0, 0)][DBLP]
    CSFW, 1990, pp:139-149 [Conf]
  17. Rajashekar Kailar, Virgil D. Gligor
    On Belief Evolution in Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:103-116 [Conf]
  18. Peter Ryan, John D. McLean, Jonathan K. Millen, Virgil D. Gligor
    Non-Interference: Who Needs It? [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:237-0 [Conf]
  19. Himanshu Khurana, Serban I. Gavrila, Rakeshbabu Bobba, Radostina K. Koleva, Anuja Sonalker, Emilian Dinu, Virgil D. Gligor, John S. Baras
    Integrated Security Services for Dynamic Coalitions. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:38-40 [Conf]
  20. Jingsha He, Virgil D. Gligor
    Formal Methods and Automated Tool for Timing-Channel Identification in TCB Source Code. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:57-76 [Conf]
  21. Virgil D. Gligor, Pompiliu Donescu
    Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:92-108 [Conf]
  22. Himanshu Khurana, Virgil D. Gligor, John Linn
    Reasoning about Joint Administration of Access Policies for Coalition Resources. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2002, pp:429-0 [Conf]
  23. Shau-Ping Lo, Virgil D. Gligor
    A Comparative Analysis of Multiprocessor Scheduling Algorithms. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1987, pp:356-363 [Conf]
  24. Shyh-Wei Luan, Virgil D. Gligor
    On Replay Detection in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1990, pp:188-195 [Conf]
  25. Virgil D. Gligor
    On Denial-of-Service in Computer Networks. [Citation Graph (0, 9)][DBLP]
    ICDE, 1986, pp:608-617 [Conf]
  26. Shau-Ping Lo, Virgil D. Gligor
    Properties of Multiprocessor Scheduling Algorithms. [Citation Graph (0, 0)][DBLP]
    ICPP, 1987, pp:867-870 [Conf]
  27. Mark Luk, Ghita Mezzour, Adrian Perrig, Virgil D. Gligor
    MiniSec: a secure sensor network communication architecture. [Citation Graph (0, 0)][DBLP]
    IPSN, 2007, pp:479-488 [Conf]
  28. Virgil D. Gligor
    Architectural Implementations of Abstract Data Type Implementation. [Citation Graph (0, 0)][DBLP]
    ISCA, 1979, pp:20-30 [Conf]
  29. Virgil D. Gligor, David Maier
    Representing Data Bases in Segmented Name Spaces. [Citation Graph (0, 0)][DBLP]
    JCDKB, 1978, pp:295-0 [Conf]
  30. Crispin Cowan, Steve Beattie, Greg Kroah-Hartman, Calton Pu, Perry Wagle, Virgil D. Gligor
    SubDomain: Parsimonious Server Security. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:355-368 [Conf]
  31. Rakeshbabu Bobba, Serban I. Gavrila, Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva
    Administering Access Control in Dynamic Coalitions. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:249-261 [Conf]
  32. Mike Burmester, Virgil D. Gligor, Evangelos Kranakis, J. D. Tygar, Yuliang Zheng
    Panel: Authentication in Constrained Environments. [Citation Graph (0, 0)][DBLP]
    MADNES, 2005, pp:186-191 [Conf]
  33. Virgil D. Gligor
    Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    MADNES, 2005, pp:1- [Conf]
  34. Virgil D. Gligor
    Characteristics of role-based access control. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  35. Virgil D. Gligor
    Advances in sensor and ad-hoc network security: perspective and status. [Citation Graph (0, 0)][DBLP]
    SASN, 2005, pp:68- [Conf]
  36. P.-C. Cheng, Virgil D. Gligor
    On the Formal Specification and Verification of a Multiparty Session Protocol. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:216-233 [Conf]
  37. Virgil D. Gligor
    A Note on the Denial-of-Service Problem. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1983, pp:139-149 [Conf]
  38. Virgil D. Gligor
    20 Years of Operating Systems Security. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:108-110 [Conf]
  39. Virgil D. Gligor, E. L. Burch, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Gary L. Luckenbaugh, N. Vasudevan
    On the Design and the Implementation of Secure Xenix Workstations. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:102-117 [Conf]
  40. Virgil D. Gligor, C. Sekar Chandersekaran, W. Cheng, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, L. Edward Reich
    A New Security Testing Method and Its Application to the Secure Xenix Kernel. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:40-59 [Conf]
  41. Bryan Parno, Adrian Perrig, Virgil D. Gligor
    Distributed Detection of Node Replication Attacks in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:49-63 [Conf]
  42. Chii-Ren Tsai, Virgil D. Gligor, C. Sekar Chandersekaran
    A Formal Method for the Identification of Covert Storage Channels in Source Code. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:74-87 [Conf]
  43. Shiuh-Pyng Shieh, Virgil D. Gligor
    Auditing the Use of Covert Storage Channels in Secure Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:285-295 [Conf]
  44. Laurent Eschenauer, Virgil D. Gligor, John S. Baras
    On Trust Establishment in Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2002, pp:47-66 [Conf]
  45. Virgil D. Gligor
    Review and Revocation of Access Privileges Distributed with PKI Certificates (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:113-124 [Conf]
  46. Virgil D. Gligor
    Negotiation of Access Control Policies (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:202-212 [Conf]
  47. Virgil D. Gligor
    Guaranteeing Access in Spite of Distributed Service-Flooding Attacks. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:80-96 [Conf]
  48. Virgil D. Gligor
    Guaranteeing Access in Spite of Distributed Service-Flooding Attacks (Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:97-105 [Conf]
  49. Virgil D. Gligor
    Application-Oriented Security Policies and Their Composition (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:75-82 [Conf]
  50. Virgil D. Gligor, Matt Blaze, John Ioannidis
    Denial of Service - Panel Discussion. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:194-203 [Conf]
  51. Virgil D. Gligor, Pompiliu Donescu
    Integrity-Aware PCBC Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:153-171 [Conf]
  52. Virgil D. Gligor, Serban I. Gavrila
    Application-Oriented Security Policies and Their Composition (Position Paper). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:67-74 [Conf]
  53. Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva, Vijay G. Bharadwaj, John S. Baras
    On the Negotiation of Access Control Policies. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:188-201 [Conf]
  54. Virgil D. Gligor, Peter Landrock, T. Mark A. Lomas, Raphael Yahalom, John P. Warne
    Discussion Session: Differences Between Academic and Commercial Security. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:177-192 [Conf]
  55. Himanshu Khurana, Virgil D. Gligor
    Review and Revocation of Access Privileges Distributed with PKI Certificates. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:100-112 [Conf]
  56. Roger M. Needham, E. Stewart Lee, Joan Feigenbaum, Virgil D. Gligor, Bruce Christianson
    Panel Session - Future Directions. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:227-239 [Conf]
  57. Virgil D. Gligor
    Security of Emergent Properties in Ad-Hoc Networks (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2004, pp:256-266 [Conf]
  58. Himanshu Khurana, Virgil D. Gligor
    A Model for Access Negotiations in Dynamic Coalitions. [Citation Graph (0, 0)][DBLP]
    WETICE, 2004, pp:205-210 [Conf]
  59. Virgil D. Gligor, Thomas Haigh, Dick Kemmerer, Carl E. Landwehr, Steven B. Lipner, John D. McLean
    Information Assurance Technology Forecast 2005. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:1, pp:62-69 [Journal]
  60. Sarbari Gupta, Virgil D. Gligor
    Towards a Theory of Penetration-Resistant Systems and its Applications. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1992, v:1, n:2, pp:133-158 [Journal]
  61. Virgil D. Gligor, Shyh-Wei Luan, Joe Pato
    On Inter-Realm Authentication in Large Distributed Systems. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1993, v:2, n:2-3, pp:137-158 [Journal]
  62. Shiuh-Pyng Shieh, Virgil D. Gligor
    Detecting Illicit Leakage of Information in Operating Systems. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1996, v:4, n:2/3, pp:123-148 [Journal]
  63. Virgil D. Gligor, David Maier
    Finding Augmented-Set Bases. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1982, v:11, n:3, pp:602-609 [Journal]
  64. Haowen Chan, Virgil D. Gligor, Adrian Perrig, Gautam Muralidharan
    On the Distribution and Revocation of Cryptographic Keys in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:3, pp:233-247 [Journal]
  65. Shiuh-Pyng Shieh, Virgil D. Gligor
    On a Pattern-Oriented Model for Intrusion Detection. [Citation Graph (0, 8)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1997, v:9, n:4, pp:661-667 [Journal]
  66. Shyh-Wei Luan, Virgil D. Gligor
    A Fault-Tolerant Protocol for Atomic Broadcast. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 1990, v:1, n:3, pp:271-285 [Journal]
  67. Virgil D. Gligor
    Review and Revocation of Access Privileges Distributed Through Capabilities. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1979, v:5, n:6, pp:575-586 [Journal]
  68. Virgil D. Gligor, C. Sekar Chandersekaran, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, L. Edward Reich
    A New Security Testing Method and Its Application to the Secure Xenix Kernel. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:2, pp:169-183 [Journal]
  69. Virgil D. Gligor, Bruce G. Lindsay
    Object Migration and Authentication. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1979, v:5, n:6, pp:607-611 [Journal]
  70. Virgil D. Gligor, Peter A. Ng
    Foreword. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1985, v:11, n:6, pp:497-501 [Journal]
  71. Chii-Ren Tsai, Virgil D. Gligor, C. Sekar Chandersekaran
    On the Identification of Covert Storage Channels in Secure Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1990, v:16, n:6, pp:569-580 [Journal]
  72. Che-Fn Yu, Virgil D. Gligor
    A Specification and Verification Method for Preventing Denial of Service. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1990, v:16, n:6, pp:581-592 [Journal]

  73. Privacy-Preserving Relationship Path Discovery in Social Networks. [Citation Graph (, )][DBLP]


  74. Position Statement: On the Evolution of Adversary Models in Computer Systems and Networks. [Citation Graph (, )][DBLP]


  75. Towards a secure and interoperable DRM architecture. [Citation Graph (, )][DBLP]


  76. Efficient Handling of Adversary Attacks in Aggregation Applications. [Citation Graph (, )][DBLP]


  77. FLoc : Dependable Link Access for Legitimate Traffic in Flooding Attacks. [Citation Graph (, )][DBLP]


  78. On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks. [Citation Graph (, )][DBLP]


  79. A New Privacy-Enhanced Matchmaking Protocol. [Citation Graph (, )][DBLP]


  80. Architectures for practical security. [Citation Graph (, )][DBLP]


  81. TrustVisor: Efficient TCB Reduction and Attestation. [Citation Graph (, )][DBLP]


  82. On the Formal Definition of Separation-of-Duty Policies and their Composition. [Citation Graph (, )][DBLP]


  83. On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike). [Citation Graph (, )][DBLP]


  84. Emergent properties in ad-hoc networks: a security perspective. [Citation Graph (, )][DBLP]


  85. Privacy-Preserving Integrity-Assured Data Aggregation in Sensor Networks. [Citation Graph (, )][DBLP]


Search in 0.067secs, Finished in 0.070secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002