On the distribution and revocation of cryptographic keys in sensor networks
Haowen Chan, Gligor, V.D., Perrig, A., Muralidharan, G.
Published in IEEE transactions on dependable and secure computing (01.07.2005)
Published in IEEE transactions on dependable and secure computing (01.07.2005)
Get full text
Journal Article
Guest Editorial Vehicular Networks
Anjum, Farooq, Choi, Sunghyun, Gligor, Virgil D., Herrtwich, Ralf G., Hubaux, Jean-pierre, Kumar, P. R., Shorey, Rajeev, Lea, Chin-tau
Published in IEEE journal on selected areas in communications (01.10.2007)
Published in IEEE journal on selected areas in communications (01.10.2007)
Get full text
Journal Article
Position Statement: On the Evolution of Adversary Models in Computer Systems and Networks
Gligor, V.D.
Published in 2008 32nd Annual IEEE International Computer Software and Applications Conference (01.07.2008)
Published in 2008 32nd Annual IEEE International Computer Software and Applications Conference (01.07.2008)
Get full text
Conference Proceeding
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks
Raya, M., Papadimitratos, P., Gligor, V.D., Hubaux, J.-P.
Published in IEEE INFOCOM 2008 - The 27th Conference on Computer Communications (01.04.2008)
Published in IEEE INFOCOM 2008 - The 27th Conference on Computer Communications (01.04.2008)
Get full text
Conference Proceeding
On a pattern-oriented model for intrusion detection
Shiuh-Pyng Shieh, Gligor, V.D.
Published in IEEE transactions on knowledge and data engineering (01.07.1997)
Published in IEEE transactions on knowledge and data engineering (01.07.1997)
Get full text
Journal Article
Privacy-Preserving Integrity-Assured Data Aggregation in Sensor Networks
Taban, G., Gligor, V.D.
Published in 2009 International Conference on Computational Science and Engineering (01.08.2009)
Published in 2009 International Conference on Computational Science and Engineering (01.08.2009)
Get full text
Conference Proceeding
Information assurance technology forecast 2005
Gligor, V.D., Haigh, T., Kemmerer, D., Landwehr, C.E., Lipner, S., McLean, J.
Published in IEEE security & privacy (01.01.2006)
Published in IEEE security & privacy (01.01.2006)
Get full text
Magazine Article
A fault-tolerant protocol for atomic broadcast
Luan, S.-W., Gligor, V.D.
Published in IEEE transactions on parallel and distributed systems (01.07.1990)
Published in IEEE transactions on parallel and distributed systems (01.07.1990)
Get full text
Journal Article
20 years of operating systems security
Gligor, V.D.
Published in Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344) (1999)
Published in Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344) (1999)
Get full text
Conference Proceeding
On the identification of covert storage channels in secure systems
Tsai, C.-R., Gligor, V.D., Chandersekaran, C.S.
Published in IEEE transactions on software engineering (01.06.1990)
Published in IEEE transactions on software engineering (01.06.1990)
Get full text
Journal Article
Trusted RUBIX architecture and policy model interpretation
Testa, C.J., Wilner, B.D., Gligor, V.D.
Published in [1992] Proceedings Eighth Annual Computer Security Application Conference (1992)
Published in [1992] Proceedings Eighth Annual Computer Security Application Conference (1992)
Get full text
Conference Proceeding
Review and Revocation of Access Privileges Distributed Through Capabilities
Get full text
Journal Article
Book Review