default search action
Virgil D. Gligor
Person information
- affiliation: Carnegie Mellon University, Pittsburgh, PA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c132]Virgil D. Gligor, Adrian Perrig, David A. Basin:
Determining an Economic Value of High Assurance for Commodity Software Security. Security Protocols Workshop 2023: 228-242 - 2021
- [c131]Miao Yu, Virgil D. Gligor, Limin Jia:
An I/O Separation Model for Formal Verification of Kernel Implementations. SP 2021: 572-589
2010 – 2019
- 2019
- [c130]Virgil D. Gligor:
Establishing and Maintaining Root of Trust on Commodity Computer Systems. AsiaCCS 2019: 1-2 - [c129]Virgil D. Gligor:
Winning Against any Adversary on Commodity Computer Systems. CYSARM@CCS 2019: 1-2 - [c128]Virgil D. Gligor, Shan Leung Maverick Woo:
Establishing Software Root of Trust Unconditionally. NDSS 2019 - [c127]Virgil D. Gligor:
A Rest Stop on the Unending Road to Provable Security. Security Protocols Workshop 2019: 223-232 - [c126]Virgil D. Gligor:
A Rest Stop on the Unending Road to Provable Security (Transcript of Discussion). Security Protocols Workshop 2019: 233-241 - [i13]Jun Zhao, Osman Yagan, Virgil D. Gligor:
On Connectivity and Robustness in Random Intersection Graphs. CoRR abs/1911.01822 (2019) - 2018
- [j33]Saurabh Shintre, Virgil D. Gligor, João Barros:
Anonymity Leakage in Private VoIP Networks. IEEE Trans. Dependable Secur. Comput. 15(1): 14-26 (2018) - [c125]Virgil D. Gligor, Maverick Woo:
Requirements for Root of Trust Establishment. Security Protocols Workshop 2018: 192-202 - [c124]Virgil D. Gligor:
Requirements for Root of Trust Establishment (Transcript of Discussion). Security Protocols Workshop 2018: 203-208 - 2017
- [j32]Anh Pham, Italo Dacosta, Bastien Jacot-Guillarmod, Kévin Huguenin, Taha Hajar, Florian Tramèr, Virgil D. Gligor, Jean-Pierre Hubaux:
PrivateRide: A Privacy-Enhanced Ride-Hailing Service. Proc. Priv. Enhancing Technol. 2017(2): 38-56 (2017) - [j31]Jun Zhao, Osman Yagan, Virgil D. Gligor:
On Connectivity and Robustness in Random Intersection Graphs. IEEE Trans. Autom. Control. 62(5): 2121-2136 (2017) - [j30]Faruk Yavuz, Jun Zhao, Osman Yagan, Virgil D. Gligor:
k-Connectivity in Random K-Out Graphs Intersecting Erdős-Rényi Graphs. IEEE Trans. Inf. Theory 63(3): 1677-1692 (2017) - [c123]Taeho Lee, Christos Pappas, Adrian Perrig, Virgil D. Gligor, Yih-Chun Hu:
The Case for In-Network Replay Suppression. AsiaCCS 2017: 862-873 - [c122]Virgil D. Gligor, Frank Stajano:
Assuring the Safety of Asymmetric Social Protocols. Security Protocols Workshop 2017: 38-48 - 2016
- [c121]Min Suk Kang, Virgil D. Gligor, Vyas Sekar:
SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks. NDSS 2016 - [c120]Min Suk Kang, Virgil D. Gligor, Vyas Sekar:
Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents. Security Protocols Workshop 2016: 47-57 - [c119]Virgil D. Gligor:
Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents (Transcript of Discussion). Security Protocols Workshop 2016: 58-66 - 2015
- [j29]Zongwei Zhou, Miao Yu, Virgil D. Gligor:
Dancing with Giants: Wimpy Kernels for On-Demand I/O Isolation. IEEE Secur. Priv. 13(2): 38-46 (2015) - [j28]Virgil D. Gligor, Bryan Parno, Ji Sun Shin:
Network Adversary Attacks against Secure Encryption Schemes. IEICE Trans. Commun. 98-B(2): 267-279 (2015) - [j27]Jun Zhao, Osman Yagan, Virgil D. Gligor:
k-Connectivity in Random Key Graphs With Unreliable Links. IEEE Trans. Inf. Theory 61(7): 3810-3836 (2015) - [j26]Faruk Yavuz, Jun Zhao, Osman Yagan, Virgil D. Gligor:
Toward k-Connectivity of the Random Graph Induced by a Pairwise Key Predistribution Scheme With Unreliable Links. IEEE Trans. Inf. Theory 61(11): 6251-6271 (2015) - [c118]Jun Zhao, Osman Yagan, Virgil D. Gligor:
On k-Connectivity and Minimum Vertex Degree in Random s-Intersection Graphs. ANALCO 2015: 1-15 - [c117]Miao Yu, Virgil D. Gligor, Zongwei Zhou:
Trusted Display on Untrusted Commodity Platforms. CCS 2015: 989-1003 - [c116]Faruk Yavuz, Jun Zhao, Osman Yagan, Virgil D. Gligor:
Designing secure and reliable wireless sensor networks under a pairwise key predistribution scheme. ICC 2015: 6277-6283 - [c115]Saurabh Shintre, Virgil D. Gligor, João Barros:
Optimal strategies for side-channel leakage in FCFS packet schedulers. ISIT 2015: 2515-2519 - [c114]Yanlin Li, Yueqiang Cheng, Virgil D. Gligor, Adrian Perrig:
Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction. Security Protocols Workshop 2015: 50-68 - [c113]Virgil D. Gligor:
Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction (Transcript of Discussion). Security Protocols Workshop 2015: 69-79 - [c112]Jun Zhao, Osman Yagan, Virgil D. Gligor:
Exact analysis of k-connectivity in secure sensor networks with unreliable links. WiOpt 2015: 191-198 - [i12]Jun Zhao, Osman Yagan, Virgil D. Gligor:
Threshold Functions in Random s-Intersection Graphs. CoRR abs/1502.00395 (2015) - [i11]Jun Zhao, Osman Yagan, Virgil D. Gligor:
k-Connectivity of Random Key Graphs. CoRR abs/1502.00400 (2015) - [i10]Jun Zhao, Osman Yagan, Virgil D. Gligor:
Monotone Increasing Properties and Their Phase Transitions in Uniform Random Intersection Graphs. CoRR abs/1502.00405 (2015) - [i9]Jun Zhao, Osman Yagan, Virgil D. Gligor:
Random intersection graphs and their applications in security, wireless communication, and social networks. CoRR abs/1504.03161 (2015) - [i8]Jun Zhao, Osman Yagan, Virgil D. Gligor:
Connectivity in Secure Wireless Sensor Networks under Transmission Constraints. CoRR abs/1508.00545 (2015) - 2014
- [c111]Jun Zhao, Osman Yagan, Virgil D. Gligor:
Connectivity in secure wireless sensor networks under transmission constraints. Allerton 2014: 1294-1301 - [c110]Min Suk Kang, Virgil D. Gligor:
Routing Bottlenecks in the Internet: Causes, Exploits, and Countermeasures. CCS 2014: 321-333 - [c109]Jun Zhao, Osman Yagan, Virgil D. Gligor:
On the strengths of connectivity and robustness in general random intersection graphs. CDC 2014: 3661-3668 - [c108]Jun Zhao, Osman Yagan, Virgil D. Gligor:
On topological properties of wireless sensor networks under the q-composite key predistribution scheme with on/off channels. ISIT 2014: 1131-1135 - [c107]Faruk Yavuz, Jun Zhao, Osman Yagan, Virgil D. Gligor:
On secure and reliable communications in wireless sensor networks: Towards k-connectivity under a random pairwise key predistribution scheme. ISIT 2014: 2381-2385 - [c106]Zongwei Zhou, Miao Yu, Virgil D. Gligor:
Dancing with Giants: Wimpy Kernels for On-Demand Isolated I/O. IEEE Symposium on Security and Privacy 2014: 308-323 - [c105]Virgil D. Gligor:
Dancing with the Adversary: A Tale of Wimps and Giants. Security Protocols Workshop 2014: 100-115 - [c104]Virgil D. Gligor:
Dancing with the Adversary: A Tale of Wimps and Giants (Transcript of Discussion). Security Protocols Workshop 2014: 116-129 - [i7]Faruk Yavuz, Jun Zhao, Osman Yagan, Virgil D. Gligor:
Towards $k$-connectivity of the random graph induced by a pairwise key predistribution scheme with unreliable links. CoRR abs/1405.5193 (2014) - [i6]Jun Zhao, Osman Yagan, Virgil D. Gligor:
On Topological Properties of Wireless Sensor Networks under the q-Composite Key Predistribution Scheme with On/Off Channels. CoRR abs/1408.5082 (2014) - [i5]Jun Zhao, Osman Yagan, Virgil D. Gligor:
On the strengths of connectivity and robustness in general random intersection graphs. CoRR abs/1409.5995 (2014) - [i4]Jun Zhao, Osman Yagan, Virgil D. Gligor:
On $k$-connectivity and minimum vertex degree in random $s$-intersection graphs. CoRR abs/1409.6021 (2014) - [i3]Jun Zhao, Osman Yagan, Virgil D. Gligor:
On asymptotically exact probability of $k$-connectivity in random key graphs intersecting Erdős-Rényi graphs. CoRR abs/1409.6022 (2014) - 2013
- [j25]Ji Sun Shin, Virgil D. Gligor:
A New Privacy-Enhanced Matchmaking Protocol. IEICE Trans. Commun. 96-B(8): 2049-2059 (2013) - [c103]Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Sangjae Yoo, Xin Zhang, Soo Bum Lee, Virgil D. Gligor, Adrian Perrig:
STRIDE: sanctuary trail - refuge from internet DDoS entrapment. AsiaCCS 2013: 415-426 - [c102]Soo Bum Lee, Min Suk Kang, Virgil D. Gligor:
CoDef: collaborative defense against large-scale link-flooding attacks. CoNEXT 2013: 417-428 - [c101]Tiffany Hyun-Jin Kim, Akira Yamada, Virgil D. Gligor, Jason I. Hong, Adrian Perrig:
RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication. Financial Cryptography 2013: 69-77 - [c100]Tiffany Hyun-Jin Kim, Virgil D. Gligor, Jorge Guajardo, Jason I. Hong, Adrian Perrig:
Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference. Financial Cryptography Workshops 2013: 112-130 - [c99]Jun Zhao, Osman Yagan, Virgil D. Gligor:
Secure k-connectivity in wireless sensor networks under an on/off channel model. ISIT 2013: 2790-2794 - [c98]Min Suk Kang, Soo Bum Lee, Virgil D. Gligor:
The Crossfire Attack. IEEE Symposium on Security and Privacy 2013: 127-141 - [c97]Jun Zhao, Virgil D. Gligor, Adrian Perrig, James Newsome:
ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets. Security Protocols Workshop 2013: 94-114 - [c96]Virgil D. Gligor:
ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets (Transcript of Discussion). Security Protocols Workshop 2013: 115-122 - [c95]Zongwei Zhou, Jun Han, Yue-Hsun Lin, Adrian Perrig, Virgil D. Gligor:
KISS: "Key It Simple and Secure" Corporate Key Management. TRUST 2013: 1-18 - [c94]Tiffany Hyun-Jin Kim, Lin-Shung Huang, Adrian Perrig, Collin Jackson, Virgil D. Gligor:
Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure. WWW 2013: 679-690 - [e7]Ahmad-Reza Sadeghi, Virgil D. Gligor, Moti Yung:
2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013. ACM 2013, ISBN 978-1-4503-2477-9 [contents] - 2012
- [j24]Jonathan Katz, Philip D. MacKenzie, Gelareh Taban, Virgil D. Gligor:
Two-server password-only authenticated key exchange. J. Comput. Syst. Sci. 78(2): 651-669 (2012) - [c93]Virgil D. Gligor:
On the foundations of trust in networks of humans and computers. CCS 2012: 1 - [c92]Chang-Han Jong, Virgil D. Gligor:
Discovering records of private VoIP calls without wiretapping. AsiaCCS 2012: 67-68 - [c91]Tiffany Hyun-Jin Kim, Virgil D. Gligor, Adrian Perrig:
GeoPKI: Converting Spatial Trust into Certificate Trust. EuroPKI 2012: 128-144 - [c90]Zongwei Zhou, Virgil D. Gligor, James Newsome, Jonathan M. McCune:
Building Verifiable Trusted Path on Commodity x86 Computers. IEEE Symposium on Security and Privacy 2012: 616-630 - [c89]Tiffany Hyun-Jin Kim, Virgil D. Gligor, Adrian Perrig:
Street-Level Trust Semantics for Attribute Authentication. Security Protocols Workshop 2012: 96-115 - [c88]Virgil D. Gligor:
Street-Level Trust Semantics for Attribute Authentication (Transcript of Discussion). Security Protocols Workshop 2012: 116-125 - [c87]Amit Vasudevan, Bryan Parno, Ning Qu, Virgil D. Gligor, Adrian Perrig:
Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms. TRUST 2012: 34-54 - [c86]Chang-Han Jong, Virgil D. Gligor:
Private communication detection: a stochastic approach. WISEC 2012: 75-86 - [e6]Ting Yu, George Danezis, Virgil D. Gligor:
the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012. ACM 2012, ISBN 978-1-4503-1651-4 [contents] - [i2]Osman Yagan, Virgil D. Gligor:
Analysis of complex contagions in random multiplex networks. CoRR abs/1204.0491 (2012) - [i1]Jun Zhao, Osman Yagan, Virgil D. Gligor:
k-Connectivity in Secure Wireless Sensor Networks with Physical Link Constraints - The On/Off Channel Model. CoRR abs/1206.1531 (2012) - 2011
- [c85]Tiffany Hyun-Jin Kim, Virgil D. Gligor, Adrian Perrig:
A Picture is Worth a Thousand Words: Improving Usability and Robustness of Online Recommendation Systems. ICCCN 2011: 1-6 - [c84]Xin Zhang, Zongwei Zhou, Geoffrey Hasker, Adrian Perrig, Virgil D. Gligor:
Network fault localization with small TCB. ICNP 2011: 143-154 - [c83]Virgil D. Gligor, Jeannette M. Wing:
Towards a Theory of Trust in Networks of Humans and Computers. Security Protocols Workshop 2011: 223-242 - [c82]Virgil D. Gligor:
Towards a Theory of Trust in Networks of Humans and Computers (Transcript of Discussion). Security Protocols Workshop 2011: 243-257 - 2010
- [j23]Virgil D. Gligor:
Editorial. IEEE Trans. Dependable Secur. Comput. 7(1): 1-3 (2010) - [c81]Soo Bum Lee, Virgil D. Gligor, Adrian Perrig:
Dependable connection setup for network capabilities. DSN 2010: 301-310 - [c80]Soo Bum Lee, Virgil D. Gligor:
FLoc : Dependable Link Access for Legitimate Traffic in Flooding Attacks. ICDCS 2010: 327-338 - [c79]Virgil D. Gligor:
Architectures for practical security. SACMAT 2010: 161-162 - [c78]Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil D. Gligor, Adrian Perrig:
TrustVisor: Efficient TCB Reduction and Attestation. IEEE Symposium on Security and Privacy 2010: 143-158 - [c77]Virgil D. Gligor:
Security Limitations of Virtualization and How to Overcome Them. Security Protocols Workshop 2010: 233-251 - [c76]Virgil D. Gligor:
Security Limitations of Virtualization and How to Overcome Them (Transcript of Discussion). Security Protocols Workshop 2010: 252-265
2000 – 2009
- 2009
- [j22]Adrian Perrig, Wade Trappe, Virgil D. Gligor, Radha Poovendran, Heejo Lee:
Secure wireless networking. J. Commun. Networks 11(6): 323-327 (2009) - [c75]Ghita Mezzour, Adrian Perrig, Virgil D. Gligor, Panos Papadimitratos:
Privacy-Preserving Relationship Path Discovery in Social Networks. CANS 2009: 189-208 - [c74]Gelareh Taban, Virgil D. Gligor:
Privacy-Preserving Integrity-Assured Data Aggregation in Sensor Networks. CSE (3) 2009: 168-175 - [c73]Virgil D. Gligor, Adrian Perrig, Jun Zhao:
Brief Encounters with a Random Key Graph. Security Protocols Workshop 2009: 157-161 - [c72]Virgil D. Gligor:
Brief Encounters with a Random Key Graph. Security Protocols Workshop 2009: 162-170 - 2008
- [c71]Virgil D. Gligor:
Position Statement: On the Evolution of Adversary Models in Computer Systems and Networks. COMPSAC 2008: 10 - [c70]Gelareh Taban, Virgil D. Gligor:
Efficient Handling of Adversary Attacks in Aggregation Applications. ESORICS 2008: 66-81 - [c69]Maxim Raya, Panagiotis Papadimitratos, Virgil D. Gligor, Jean-Pierre Hubaux:
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks. INFOCOM 2008: 1238-1246 - [c68]Ji Sun Shin, Virgil D. Gligor:
A New Privacy-Enhanced Matchmaking Protocol. NDSS 2008 - [c67]S. Farshad Bahari, Virgil D. Gligor:
Handling New Adversaries in Wireless Ad-Hoc Networks. Security Protocols Workshop 2008: 118-119 - [c66]Virgil D. Gligor:
Handling New Adversaries in Wireless Ad-Hoc Networks (Transcript of Discussion). Security Protocols Workshop 2008: 120-125 - [p1]Virgil D. Gligor, C. Sekar Chandersekaran:
Surviving Insider Attacks: A Call for System Experiments. Insider Attack and Cyber Security 2008: 153-164 - [e5]Masayuki Abe, Virgil D. Gligor:
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008. ACM 2008, ISBN 978-1-59593-979-1 [contents] - [e4]Virgil D. Gligor, Jean-Pierre Hubaux, Radha Poovendran:
Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008. ACM 2008, ISBN 978-1-59593-814-5 [contents] - 2007
- [j21]Farooq Anjum, Sunghyun Choi, Virgil D. Gligor, Ralf Guido Herrtwich, Jean-Pierre Hubaux, P. R. Kumar, Rajeev Shorey, Chin-Tau Lea:
Guest Editorial Vehicular Networks. IEEE J. Sel. Areas Commun. 25(8): 1497-1500 (2007) - [c65]Virgil D. Gligor:
On the evolution of adversary models in security protocols: from the beginning to sensor networks. AsiaCCS 2007: 3 - [c64]Mark Luk, Ghita Mezzour, Adrian Perrig, Virgil D. Gligor:
MiniSec: a secure sensor network communication architecture. IPSN 2007: 479-488 - [e3]Peng Ning, Vijay Atluri, Virgil D. Gligor, Heiko Mantel:
Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007. ACM 2007, ISBN 978-1-59593-887-9 [contents] - 2006
- [j20]Virgil D. Gligor, Thomas Haigh, Dick Kemmerer, Carl E. Landwehr, Steven B. Lipner, John D. McLean:
Information Assurance Technology Forecast 2005. IEEE Secur. Priv. 4(1): 62-69 (2006) - [c63]Virgil D. Gligor:
Emergent properties in ad-hoc networks: a security perspective. AsiaCCS 2006: 1 - [c62]Gelareh Taban, Alvaro A. Cárdenas, Virgil D. Gligor:
Towards a secure and interoperable DRM architecture. Digital Rights Management Workshop 2006: 69-78 - [e2]Levente Buttyán, Virgil D. Gligor, Dirk Westhoff:
Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4357, Springer 2006, ISBN 978-3-540-69172-3 [contents] - 2005
- [j19]Haowen Chan, Virgil D. Gligor, Adrian Perrig, Gautam Muralidharan:
On the Distribution and Revocation of Cryptographic Keys in Sensor Networks. IEEE Trans. Dependable Secur. Comput. 2(3): 233-247 (2005) - [c61]Jonathan Katz, Philip D. MacKenzie, Gelareh Taban, Virgil D. Gligor:
Two-Server Password-Only Authenticated Key Exchange. ACNS 2005: 1-16 - [c60]Rakeshbabu Bobba, Serban I. Gavrila, Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva:
Administering Access Control in Dynamic Coalitions. LISA 2005: 249-261 - [c59]Virgil D. Gligor:
Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks. MADNES 2005: 1 - [c58]Mike Burmester, Virgil D. Gligor, Evangelos Kranakis, J. D. Tygar, Yuliang Zheng:
Panel: Authentication in Constrained Environments. MADNES 2005: 186-191 - [c57]Virgil D. Gligor:
Advances in sensor and ad-hoc network security: perspective and status. SASN 2005: 68 - [c56]Bryan Parno, Adrian Perrig, Virgil D. Gligor:
Distributed Detection of Node Replication Attacks in Sensor Networks. S&P 2005: 49-63 - [c55]Virgil D. Gligor:
On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike). Security Protocols Workshop 2005: 276-283 - [c54]Virgil D. Gligor:
Emergent properties in ad-hoc networks: a security perspective. Workshop on Wireless Security 2005: 55 - 2004
- [c53]Virgil D. Gligor:
Security of Emergent Properties in Ad-Hoc Networks (Transcript of Discussion). Security Protocols Workshop 2004: 256-266 - [c52]Himanshu Khurana, Virgil D. Gligor:
A Model for Access Negotiations in Dynamic Coalitions. WETICE 2004: 205-210 - 2003
- [c51]Omer Horvitz, Virgil D. Gligor:
Weak Key Authenticity and the Computational Completeness of Formal Encryption. CRYPTO 2003: 530-547 - [c50]Himanshu Khurana, Serban I. Gavrila, Rakeshbabu Bobba, Radostina K. Koleva, Anuja Sonalker, Emilian Dinu, Virgil D. Gligor, John S. Baras:
Integrated Security Services for Dynamic Coalitions. DISCEX (2) 2003: 38-40 - [c49]Rakeshbabu Bobba, Laurent Eschenauer, Virgil D. Gligor, William A. Arbaugh:
Bootstrapping security associations for routing in mobile ad-hoc networks. GLOBECOM 2003: 1511-1515 - [c48]Virgil D. Gligor:
Guaranteeing Access in Spite of Distributed Service-Flooding Attacks. Security Protocols Workshop 2003: 80-96 - [c47]Virgil D. Gligor:
Guaranteeing Access in Spite of Distributed Service-Flooding Attacks (Discussion). Security Protocols Workshop 2003: 97-105 - 2002
- [c46]Laurent Eschenauer, Virgil D. Gligor:
A key-management scheme for distributed sensor networks. CCS 2002: 41-47 - [c45]Himanshu Khurana, Virgil D. Gligor, John Linn:
Reasoning about Joint Administration of Access Policies for Coalition Resources. ICDCS 2002: 429-438 - [c44]Laurent Eschenauer, Virgil D. Gligor, John S. Baras:
On Trust Establishment in Mobile Ad-Hoc Networks. Security Protocols Workshop 2002: 47-66 - [e1]Agnes Hui Chan, Virgil D. Gligor:
Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings. Lecture Notes in Computer Science 2433, Springer 2002, ISBN 3-540-44270-7 [contents] - 2001
- [c43]Peter Y. A. Ryan, John D. McLean, Jonathan K. Millen, Virgil D. Gligor:
Non-Interference: Who Needs It? CSFW 2001: 237-238 - [c42]Virgil D. Gligor, Pompiliu Donescu:
Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes. FSE 2001: 92-108 - [c41]Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva, Vijay G. Bharadwaj, John S. Baras:
On the Negotiation of Access Control Policies. Security Protocols Workshop 2001: 188-201 - [c40]Virgil D. Gligor:
Negotiation of Access Control Policies (Transcript of Discussion). Security Protocols Workshop 2001: 202-212 - 2000
- [c39]Crispin Cowan, Steve Beattie, Greg Kroah-Hartman, Calton Pu, Perry Wagle, Virgil D. Gligor:
SubDomain: Parsimonious Server Security. LISA 2000: 355-368 - [c38]Himanshu Khurana, Virgil D. Gligor:
Review and Revocation of Access Privileges Distributed with PKI Certificates. Security Protocols Workshop 2000: 100-112 - [c37]Virgil D. Gligor:
Review and Revocation of Access Privileges Distributed with PKI Certificates (Transcript of Discussion). Security Protocols Workshop 2000: 113-124 - [c36]Virgil D. Gligor, Matt Blaze, John Ioannidis:
Denial of Service - Panel Discussion. Security Protocols Workshop 2000: 194-203
1990 – 1999
- 1999
- [c35]Virgil D. Gligor:
20 Years of Operating Systems Security. S&P 1999: 108-110 - [c34]Virgil D. Gligor, Pompiliu Donescu:
Integrity-Aware PCBC Encryption Schemes. Security Protocols Workshop 1999: 153-171 - 1998
- [c33]Virgil D. Gligor, Serban I. Gavrila, David F. Ferraiolo:
On the Formal Definition of Separation-of-Duty Policies and their Composition. S&P 1998: 172-183 - [c32]Virgil D. Gligor, Serban I. Gavrila:
Application-Oriented Security Policies and Their Composition (Position Paper). Security Protocols Workshop 1998: 67-74 - [c31]Virgil D. Gligor:
Application-Oriented Security Policies and Their Composition (Transcript of Discussion). Security Protocols Workshop 1998: 75-82 - [c30]Virgil D. Gligor, Peter Landrock, T. Mark A. Lomas, Raphael Yahalom, John P. Warne:
Discussion Session: Differences Between Academic and Commercial Security. Security Protocols Workshop 1998: 177-192 - [c29]Roger M. Needham, E. Stewart Lee, Joan Feigenbaum, Virgil D. Gligor, Bruce Christianson:
Panel Session - Future Directions. Security Protocols Workshop 1998: 227-239 - 1997
- [j18]Shiuh-Pyng Shieh, Virgil D. Gligor:
On a Pattern-Oriented Model for Intrusion Detection. IEEE Trans. Knowl. Data Eng. 9(4): 661-667 (1997) - 1996
- [j17]Shiuh-Pyng Shieh, Virgil D. Gligor:
Detecting Illicit Leakage of Information in Operating Systems. J. Comput. Secur. 4(2/3): 123-148 (1996) - 1995
- [c28]Virgil D. Gligor:
Characteristics of role-based access control. ACM Workshop on Role-Based Access Control 1995 - 1993
- [j16]Virgil D. Gligor, Shyh-Wei Luan, Joseph N. Pato:
On Inter-Realm Authentication in Large Distributed Systems. J. Comput. Secur. 2(2-3): 137-158 (1993) - [c27]Stuart G. Stubblebine, Virgil D. Gligor:
Protocol design for integrity protection. S&P 1993: 41-53 - 1992
- [j15]Sarbari Gupta, Virgil D. Gligor:
Towards a Theory of Penetration-Resistant Systems and its Applications. J. Comput. Secur. 1(2): 133-158 (1992) - [c26]C. J. Testa, B. D. Wilner, Virgil D. Gligor:
Trusted RUBIX architecture and policy model interpretation. ACSAC 1992: 97-110 - [c25]Jingsha He, Virgil D. Gligor:
Formal Methods and Automated Tool for Timing-Channel Identification in TCB Source Code. ESORICS 1992: 57-76 - [c24]Virgil D. Gligor, Shyh-Wei Luan, Joseph N. Pato:
On inter-realm authentication in large distributed systems. S&P 1992: 2-17 - [c23]Stuart G. Stubblebine, Virgil D. Gligor:
On message integrity in cryptographic protocols. S&P 1992: 85-104 - 1991
- [c22]Sarbari Gupta, Virgil D. Gligor:
Towards a Theory of Penetration-Resistant Systems and its Applications. CSFW 1991: 62-78 - [c21]Rajashekar Kailar, Virgil D. Gligor:
On Belief Evolution in Authentication Protocols. CSFW 1991: 103-116 - [c20]Virgil D. Gligor, Rajashekar Kailar, Stuart G. Stubblebine, Li Gong:
Logics for Cryptographic Protocols - Virtues and Limitations. CSFW 1991: 219-226 - [c19]Shiuh-Pyng Shieh, Virgil D. Gligor:
A Pattern-Oriented Intrusion-Detection Model and Its Applications. S&P 1991: 327-342 - 1990
- [j14]Shyh-Wei Luan, Virgil D. Gligor:
A Fault-Tolerant Protocol for Atomic Broadcast. IEEE Trans. Parallel Distributed Syst. 1(3): 271-285 (1990) - [j13]Chii-Ren Tsai, Virgil D. Gligor, C. Sekar Chandersekaran:
On the Identification of Covert Storage Channels in Secure Systems. IEEE Trans. Software Eng. 16(6): 569-580 (1990) - [j12]Che-Fn Yu, Virgil D. Gligor:
A Specification and Verification Method for Preventing Denial of Service. IEEE Trans. Software Eng. 16(6): 581-592 (1990) - [c18]Jingsha He, Virgil D. Gligor:
Information-Flow Analysis for Covert-Channel Identification in Multilevel Secure Operating Systems. CSFW 1990: 139-149 - [c17]Shyh-Wei Luan, Virgil D. Gligor:
On Replay Detection in Distributed Systems. ICDCS 1990: 188-195 - [c16]Pau-Chen Cheng, Virgil D. Gligor:
On the Formal Specification and Verification of a Multiparty Session Protocol. S&P 1990: 216-233 - [c15]Shiuh-Pyng Shieh, Virgil D. Gligor:
Auditing the Use of Covert Storage Channels in Secure Systems. S&P 1990: 285-295
1980 – 1989
- 1988
- [c14]Chii-Ren Tsai, Virgil D. Gligor:
A bandwidth computation model for covert storage channels and its applications. S&P 1988: 108-121 - [c13]Che-Fu Yu, Virgil D. Gligor:
A formal specification and verification method for the prevention of denial of service. S&P 1988: 187-202 - [c12]Shyh-Wei Luan, Virgil D. Gligor:
A Fault-Tolerant Protocol for Atomic Broadcast. SRDS 1988: 112-126 - 1987
- [j11]Virgil D. Gligor, C. Sekar Chandersekaran, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, L. Edward Reich:
A New Security Testing Method and Its Application to the Secure Xenix Kernel. IEEE Trans. Software Eng. 13(2): 169-183 (1987) - [j10]Virgil D. Gligor, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, N. Vasudevan:
Design and Implementation of Secure Xenix. IEEE Trans. Software Eng. 13(2): 208-221 (1987) - [c11]Shau-Ping Lo, Virgil D. Gligor:
A Comparative Analysis of Multiprocessor Scheduling Algorithms. ICDCS 1987: 356-363 - [c10]Shau-Ping Lo, Virgil D. Gligor:
Properties of Multiprocessor Scheduling Algorithms. ICPP 1987: 867-870 - [c9]Chii-Ren Tsai, Virgil D. Gligor, C. Sekar Chandersekaran:
A Formal Method for the Identification of Covert Storage Channels in Source Code. S&P 1987: 74-87 - 1986
- [j9]Virgil D. Gligor, Radu Popescu-Zeletin:
Transaction management in distributed heterogeneous database management systems. Inf. Syst. 11(4): 287-297 (1986) - [c8]Virgil D. Gligor:
On Denial-of-Service in Computer Networks. ICDE 1986: 608-617 - [c7]Virgil D. Gligor, C. Sekar Chandersekaran, W. Cheng, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, L. Edward Reich:
A New Security Testing Method and Its Application to the Secure Xenix Kernel. S&P 1986: 40-59 - [c6]Virgil D. Gligor, E. L. Burch, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Gary L. Luckenbaugh, N. Vasudevan:
On the Design and the Implementation of Secure Xenix Workstations. S&P 1986: 102-117 - 1985
- [j8]Virgil D. Gligor, Peter A. Ng:
Foreword. IEEE Trans. Software Eng. 11(6): 497-501 (1985) - [c5]Virgil D. Gligor:
Analysis of the Hardware Verification of the Honeywell SCOMP. S&P 1985: 32-45 - 1984
- [j7]Virgil D. Gligor, Gary L. Luckenbaugh:
Inteconnecting Heterogeneous Database Management Systems. Computer 17(1): 33-43 (1984) - [j6]Virgil D. Gligor:
A Note on Denial-of-Service in Operating Systems. IEEE Trans. Software Eng. 10(3): 320-324 (1984) - [c4]Virgil D. Gligor, Radu Popescu-Zeletin:
Concurrency Control Issues in Distributed Heterogeneous Database Management Systems. DDSS 1984: 43-56 - 1983
- [j5]Virgil D. Gligor:
The verification of the protection mechanisms of high-level language machines. Int. J. Parallel Program. 12(4): 211-246 (1983) - [c3]Virgil D. Gligor:
A Note on the Denial-of-Service Problem. S&P 1983: 139-149 - 1982
- [j4]Virgil D. Gligor, David Maier:
Finding Augmented-Set Bases. SIAM J. Comput. 11(3): 602-609 (1982) - 1980
- [j3]Virgil D. Gligor, Susan H. Shattuck:
On Deadlock Detection in Distributed Systems. IEEE Trans. Software Eng. 6(5): 435-440 (1980)
1970 – 1979
- 1979
- [j2]Virgil D. Gligor:
Review and Revocation of Access Privileges Distributed Through Capabilities. IEEE Trans. Software Eng. 5(6): 575-586 (1979) - [j1]Virgil D. Gligor, Bruce G. Lindsay:
Object Migration and Authentication. IEEE Trans. Software Eng. 5(6): 607-611 (1979) - [c2]Virgil D. Gligor:
Architectural Implementations of Abstract Data Type Implementation. ISCA 1979: 20-30 - 1978
- [c1]Virgil D. Gligor, David Maier:
Representing Data Bases in Segmented Name Spaces. JCDKB 1978: 295-
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint