Journal Article 20 years of operating systems security 1999 • Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy • 108-110 Gligor VD
Conference 20 years of operating systems security 1999 • IEEE Symposium on Security and Privacy: Proceedings • 1999-January:108-110 Gligor VD
Journal Article Application-oriented security policies and their composition 1999 • Lecture Notes in Computer Science • 1550:67-82 Gligor VD, Gavrila SI
Conference Application-oriented security policies and their composition 1998 • Lecture Notes in Computer Science • 1550:75-82 Gligor V
Conference Discussion session: Differences between academic and commercial security 1998 • Lecture Notes in Computer Science • 1550:177-192 Gligor V, Landrock P, Lomas M, Yahalom R, Warne J
Conference On the formal definition of separation-of-duty policies and their composition 1998 • Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy • 172-183 Gligor VD, Gavrila SI, Ferraiolo D
Conference Panel session - Future directions 1998 • Lecture Notes in Computer Science • 1550:227-239 Lee S, Feigenbaum J, Gligor V, Christianson B, Needham R
Journal Article On a pattern-oriented model for intrusion detection 1997 • IEEE Transactions on Knowledge and Data Engineering • 9(4):661-667 Shieh SP, Gligor VD
Journal Article Detecting illicit leakage of information in operating systems 1996 • Journal of Computer Security • 4(2-3):123-148 Shieh SP, Gligor VD
Conference Characteristics of role-based access control 1995 • Proceedings of the ACM Workshop on Role-Based Access Control • 9-14 Gligor V
Chapter On the Security Effectiveness of Cryptographic Protocols 1995 139-157 Kailar R, Gligor VD, Gong L
Journal Article On inter-realm authentication in large distributed systems 1993 • Journal of Computer Security • 2(2-3):137-157 Gligor VD, Luan SW, Pato JN
Conference Protocol design for integrity protection 1993 • Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy • 41-53 Stubblebine S, Gligor V
Conference Distributed audit with secure remote procedure calls 1992 • University of Kentucky, Office of Engineering Services, (Bulletin) UKY BU • 154-160 Tsai CR, Gligor VD
Conference Formal methods and automated tool for timing-channel identification in TCB source code 1992 • Lecture Notes in Computer Science • 648 LNCS:57-75 He J, Gligor VD
Conference On inter-realm authentication in large distributed systems 1992 • University of Kentucky, Office of Engineering Services, (Bulletin) UKY BU • 1-2 Gligor VD, Luan SW, Pato JN
Conference On message integrity in cryptographic protocols 1992 • Proceedings of the Symposium on Security and Privacy • 85-104 Stubblebine SG, Gligor VD
Journal Article Towards a theory of penetration- resistant systems and its applications 1992 • Journal of Computer Security • 1(2):133-158 Gupta S, Gligor VD
Conference Trusted RUBIX architecture and policy model interpretation 1992 • Proceedings - Annual Computer Security Applications Conference, ACSAC • Part F146266:97-110 Testa CJ, Wilner BD, Gligor VD
Conference A pattern-oriented intrusion-detection model and its applications 1991 • Proceedings of the Symposium on Security and Privacy • 327-342 Shieh SW, Gligor VD
Conference Logics for cryptographic protocols-virtues and limitations 1991 • Proceedings of the Computer Security Foundations Workshop • 219-226 Gligor VD, Kailar R, Stubblebine S, Gong L
Conference On belief evolution in authentication protocols 1991 • Proceedings of the Computer Security Foundations Workshop • 103-116 Kailar R, Gligor VD
Conference Towards a theory of penetration-resistant systems and its applications 1991 • Proceedings of the Computer Security Foundations Workshop • 62-78 Gupta S, Gligor VD