Conference Bootstrapping Security Associations for Routing in Mobile Ad-Hoc Networks 2003 1511-1515 Bobba RB, Eschenauer L, Gligor V, Arbaugh W
Conference Integrated Security Services for Dynamic Coalitions 2003 38-40 Khurana: H, Gavrila S, Bobba R, Koleva R, Sonalker A, Dinu E, Gligor V, Baras J
Journal Article Weak Key Authenticity and the Computational Completeness of Formal Encryption 2003 • Lecture Notes in Computer Science • 2729:530-547 Horvitz O, Gligor V
Conference A key-management scheme for distributed sensor networks 2002 • Proceedings of the ACM Conference on Computer and Communications Security • 41-47 Eschenauer L, Gligor VD
Journal Article Fast encryption and authentication: XCBC encryption and XECB authentication modes 2002 • Lecture Notes in Computer Science • 2355:92-108 Gligor VD, Donescu P
Conference Negotiation of Access Control Policies 2002 • Lecture Notes in Computer Science • 2467:202-212 Gligor VD
Journal Article On the negotiation of access control policies 2002 • Lecture Notes in Computer Science • 2467:188-201 Gligor VD, Khurana H, Koleva RK, Bharadwaj VG, Baras JS
Conference Reasoning about Joint Administration of Access Policies for Coalition Resources 2002 • Distributed Computing Systems • 429-438 Khurana H, Gligor V, Linn J
Conference Denial of Service — Panel Discussion 2001 • Lecture Notes in Computer Science • 2133:194-203 Gligor V, Blaze M, Ioannidis J
Conference Non-Interference, who Needs it? 2001 • Proceedings of the Computer Security Foundations Workshop • 237-238 Ryan P, McLean J, Millen J, Gligor V
Conference Review and Revocation of Access Privileges Distributed with PKI Certificates 2001 • Lecture Notes in Computer Science • 2133:113-124 Gligor VD
Conference Review and Revocation of Access Privileges Distributed with PKI Certificates 2001 • Lecture Notes in Computer Science • 2133:100-112 Khurana H, Gligor VD
Journal Article Applying Specialization to Improve Survivability of OS Kernels (Immunix Project) 2000 Pu C, Cowan C, Gligor V, Hinton H, Walpole J
Conference Integrity-Aware PCBC Encryption Schemes 2000 • Lecture Notes in Computer Science • 1796:169-171 Gligor V
Journal Article Integrity-aware PCBC encryption schemes 2000 • Lecture Notes in Computer Science • 1796:153-168 Gligor VD, Donescu P
Conference SubDomain: Parsimonious server security 2000 • Proceedings of the 14th Conference on Systems Administration, LISA 2000 • 355-367 Cowan C, Beattie S, Kroah-Hartman G, Pu C, Wagle P, Gligor V
Journal Article 20 years of operating systems security 1999 • Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy • 108-110 Gligor VD
Conference 20 years of operating systems security 1999 • IEEE Symposium on Security and Privacy: Proceedings • 108-110 Gligor VD
Journal Article Application-oriented security policies and their composition 1999 • Lecture Notes in Computer Science • 1550:67-82 Gligor VD, Gavrila SI
Conference Application-Oriented Security Policies and Their Composition 1998 • Lecture Notes in Computer Science • 1550:75-82 Gligor V
Conference Discussion Session: Differences Between Academic and Commercial Security 1998 • Lecture Notes in Computer Science • 1550:177-192 Gligor V, Landrock P, Lomas M, Yahalom R, Warne J
Conference On the formal definition of separation-of-duty policies and their composition 1998 • IEEE Symposium on Security and Privacy: Proceedings • 172-183 Gligor VD, Gavrila SI, Ferraiolo D
Conference Panel Session - Future Directions 1998 • Lecture Notes in Computer Science • 1550:227-239 Lee S, Feigenbaum J, Gligor V, Christianson B, Needham R
Journal Article On a pattern-oriented model for intrusion detection 1997 • IEEE Transactions on Knowledge and Data Engineering • 9(4):661-667 Shieh SP, Gligor VD