2013
109Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure. Tiffany Hyun-Jin Kim, Lin-Shung Huang, Adrian Perrig, Collin Jackson, Virgil D. Gligor. WWW 2013, 679-690. Web SearchBibTeXDownload
2012
108On the foundations of trust in networks of humans and computers. Virgil D. Gligor. ACM Conference on Computer and Communications Security 2012, 1. Web SearchBibTeXDownload
107Discovering records of private VoIP calls without wiretapping. Chang-Han Jong, Virgil D. Gligor. ASIACCS 2012, 67-68. Web SearchBibTeXDownload
106Analysis of complex contagions in random multiplex networks. Osman Yagan, Virgil D. Gligor. CoRR (abs/1204.0491) (2012). Web SearchBibTeXDownload
105k-Connectivity in Secure Wireless Sensor Networks with Physical Link Constraints - The On/Off Channel Model. Jun Zhao, Osman Yagan, Virgil D. Gligor. CoRR (abs/1206.1531) (2012). Web SearchBibTeXDownload
104Building Verifiable Trusted Path on Commodity x86 Computers. Zongwei Zhou, Virgil D. Gligor, James Newsome, Jonathan M. McCune. IEEE Symposium on Security and Privacy 2012, 616-630. Web SearchBibTeXDownload
103Two-server password-only authenticated key exchange. Jonathan Katz, Philip D. MacKenzie, Gelareh Taban, Virgil D. Gligor. J. Comput. Syst. Sci. (78): 651-669 (2012). Web SearchBibTeXDownload
102Street-Level Trust Semantics for Attribute Authentication. Tiffany Hyun-Jin Kim, Virgil D. Gligor, Adrian Perrig. Security Protocols Workshop 2012, 96-115. Web SearchBibTeXDownload
101Street-Level Trust Semantics for Attribute Authentication (Transcript of Discussion). Virgil D. Gligor. Security Protocols Workshop 2012, 116-125. Web SearchBibTeXDownload
100Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms. Amit Vasudevan, Bryan Parno, Ning Qu, Virgil D. Gligor, Adrian Perrig. TRUST 2012, 34-54. Web SearchBibTeXDownload
99Private communication detection: a stochastic approach. Chang-Han Jong, Virgil D. Gligor. WISEC 2012, 75-86. Web SearchBibTeXDownload
2011
98A Picture is Worth a Thousand Words: Improving Usability and Robustness of Online Recommendation Systems. Tiffany Hyun-Jin Kim, Virgil D. Gligor, Adrian Perrig. ICCCN 2011, 1-6. Web SearchBibTeXDownload
97Network fault localization with small TCB. Xin Zhang, Zongwei Zhou, Geoffrey Hasker, Adrian Perrig, Virgil D. Gligor. ICNP 2011, 143-154. Web SearchBibTeXDownload
96Towards a Theory of Trust in Networks of Humans and Computers. Virgil D. Gligor, Jeannette M. Wing. Security Protocols Workshop 2011, 223-242. Web SearchBibTeXDownload
95Towards a Theory of Trust in Networks of Humans and Computers (Transcript of Discussion). Virgil D. Gligor. Security Protocols Workshop 2011, 243-257. Web SearchBibTeXDownload
2010
94Dependable connection setup for network capabilities. Soo Bum Lee, Virgil D. Gligor, Adrian Perrig. DSN 2010, 301-310. Web SearchBibTeXDownload
93FLoc : Dependable Link Access for Legitimate Traffic in Flooding Attacks. Soo Bum Lee, Virgil D. Gligor. ICDCS 2010, 327-338. Web SearchBibTeXDownload
92TrustVisor: Efficient TCB Reduction and Attestation. Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil D. Gligor, Adrian Perrig. IEEE Symposium on Security and Privacy 2010, 143-158. Web SearchBibTeXDownload
91Architectures for practical security. Virgil D. Gligor. SACMAT 2010, 161-162. Web SearchBibTeXDownload
2009
90Privacy-Preserving Relationship Path Discovery in Social Networks. Ghita Mezzour, Adrian Perrig, Virgil D. Gligor, Panos Papadimitratos. CANS 2009, 189-208. Web SearchBibTeXDownload
89Privacy-Preserving Integrity-Assured Data Aggregation in Sensor Networks. Gelareh Taban, Virgil D. Gligor. CSE (3) 2009, 168-175. Web SearchBibTeXDownload
88Brief Encounters with a Random Key Graph. Virgil D. Gligor, Adrian Perrig, Jun Zhao. Security Protocols Workshop 2009, 157-161. Web SearchBibTeXDownload
2008
87Position Statement: On the Evolution of Adversary Models in Computer Systems and Networks. Virgil D. Gligor. COMPSAC 2008, 10. Web SearchBibTeXDownload
86Efficient Handling of Adversary Attacks in Aggregation Applications. Gelareh Taban, Virgil D. Gligor. ESORICS 2008, 66-81. Web SearchBibTeXDownload
85On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks. Maxim Raya, Panagiotis Papadimitratos, Virgil D. Gligor, Jean-Pierre Hubaux. INFOCOM 2008, 1238-1246. Web SearchBibTeXDownload
84Surviving Insider Attacks: A Call for System Experiments. Virgil D. Gligor, C. Sekar Chandersekaran. Insider Attack and Cyber Security 2008, 153-164. Web SearchBibTeXDownload
83A New Privacy-Enhanced Matchmaking Protocol. Ji Sun Shin, Virgil D. Gligor. NDSS 2008. Web SearchBibTeXDownload
82Handling New Adversaries in Wireless Ad-Hoc Networks (Transcript of Discussion). Virgil D. Gligor. Security Protocols Workshop 2008, 120-125. Web SearchBibTeXDownload
81Handling New Adversaries in Wireless Ad-Hoc Networks. S. Farshad Bahari, Virgil D. Gligor. Security Protocols Workshop 2008, 118-119. Web SearchBibTeXDownload
2007
80On the evolution of adversary models in security protocols: from the beginning to sensor networks. Virgil D. Gligor. ASIACCS 2007, 3. Web SearchBibTeXDownload
79Guest Editorial Vehicular Networks. Farooq Anjum, S. Choi, Virgil D. Gligor, Ralf Guido Herrtwich, Jean-Pierre Hubaux, P. R. Kumar, Rajeev Shorey, Chin-Tau Lea. IEEE Journal on Selected Areas in Communications (25): 1497-1500 (2007). Web SearchBibTeXDownload
78MiniSec: a secure sensor network communication architecture. Mark Luk, Ghita Mezzour, Adrian Perrig, Virgil D. Gligor. IPSN 2007, 479-488. Web SearchBibTeXDownload
2006
77Emergent properties in ad-hoc networks: a security perspective. Virgil D. Gligor. ASIACCS 2006, 1. Web SearchBibTeXDownload
76Towards a secure and interoperable DRM architecture. Gelareh Taban, Alvaro A. Cárdenas, Virgil D. Gligor. Digital Rights Management Workshop 2006, 69-78. Web SearchBibTeXDownload
75Information Assurance Technology Forecast 2005. Virgil D. Gligor, Thomas Haigh, Dick Kemmerer, Carl E. Landwehr, Steven B. Lipner, John D. McLean. IEEE Security & Privacy (4): 62-69 (2006). Web SearchBibTeXDownload
2005
74Two-Server Password-Only Authenticated Key Exchange. Jonathan Katz, Philip D. MacKenzie, Gelareh Taban, Virgil D. Gligor. ACNS 2005, 1-16. Web SearchBibTeXDownload
73Distributed Detection of Node Replication Attacks in Sensor Networks. Bryan Parno, Adrian Perrig, Virgil D. Gligor. IEEE Symposium on Security and Privacy 2005, 49-63. Web SearchBibTeXDownload
72On the Distribution and Revocation of Cryptographic Keys in Sensor Networks. Haowen Chan, Virgil D. Gligor, Adrian Perrig, Gautam Muralidharan. IEEE Trans. Dependable Sec. Comput. (2): 233-247 (2005). Web SearchBibTeXDownload
71Administering Access Control in Dynamic Coalitions. Rakeshbabu Bobba, Serban I. Gavrila, Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva. LISA 2005, 249-261. Web SearchBibTeXDownload
70Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks. Virgil D. Gligor. MADNES 2005, 1. Web SearchBibTeXDownload
69Panel: Authentication in Constrained Environments. Mike Burmester, Virgil D. Gligor, Evangelos Kranakis, J. D. Tygar, Yuliang Zheng. MADNES 2005, 186-191. Web SearchBibTeXDownload
68Advances in sensor and ad-hoc network security: perspective and status. Virgil D. Gligor. SASN 2005, 68. Web SearchBibTeXDownload
67On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike). Virgil D. Gligor. Security Protocols Workshop 2005, 276-283. Web SearchBibTeXDownload
66Emergent properties in ad-hoc networks: a security perspective. Virgil D. Gligor. Workshop on Wireless Security 2005, 55. Web SearchBibTeXDownload
2004
65Security of Emergent Properties in Ad-Hoc Networks (Transcript of Discussion). Virgil D. Gligor. Security Protocols Workshop 2004, 256-266. Web SearchBibTeXDownload
64A Model for Access Negotiations in Dynamic Coalitions. Himanshu Khurana, Virgil D. Gligor. WETICE 2004, 205-210. Web SearchBibTeXDownload
2003
63Weak Key Authenticity and the Computational Completeness of Formal Encryption. Omer Horvitz, Virgil D. Gligor. CRYPTO 2003, 530-547. Web SearchBibTeXDownload
62Integrated Security Services for Dynamic Coalitions. Himanshu Khurana, Serban I. Gavrila, Rakeshbabu Bobba, Radostina K. Koleva, Anuja Sonalker, Emilian Dinu, Virgil D. Gligor, John S. Baras. DISCEX (2) 2003, 38-40. Web SearchBibTeXDownload
61Bootstrapping security associations for routing in mobile ad-hoc networks. Rakeshbabu Bobba, Laurent Eschenauer, Virgil D. Gligor, William A. Arbaugh. GLOBECOM 2003, 1511-1515. Web SearchBibTeXDownload
60Guaranteeing Access in Spite of Distributed Service-Flooding Attacks. Virgil D. Gligor. Security Protocols Workshop 2003, 80-96. Web SearchBibTeXDownload
59Guaranteeing Access in Spite of Distributed Service-Flooding Attacks (Discussion). Virgil D. Gligor. Security Protocols Workshop 2003, 97-105. Web SearchBibTeXDownload
2002
58A key-management scheme for distributed sensor networks. Laurent Eschenauer, Virgil D. Gligor. ACM Conference on Computer and Communications Security 2002, 41-47. Web SearchBibTeXDownload
57Reasoning about Joint Administration of Access Policies for Coalition Resources. Himanshu Khurana, Virgil D. Gligor, John Linn. ICDCS 2002, 429. Web SearchBibTeXDownload
56On Trust Establishment in Mobile Ad-Hoc Networks. Laurent Eschenauer, Virgil D. Gligor, John S. Baras. Security Protocols Workshop 2002, 47-66. Web SearchBibTeXDownload
2001
55Non-Interference: Who Needs It?. Peter Ryan, John D. McLean, Jonathan K. Millen, Virgil D. Gligor. CSFW 2001, 237. Web SearchBibTeXDownload
54Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes. Virgil D. Gligor, Pompiliu Donescu. FSE 2001, 92-108. Web SearchBibTeXDownload
53On the Negotiation of Access Control Policies. Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva, Vijay G. Bharadwaj, John S. Baras. Security Protocols Workshop 2001, 188-201. Web SearchBibTeXDownload
52Negotiation of Access Control Policies (Transcript of Discussion). Virgil D. Gligor. Security Protocols Workshop 2001, 202-212. Web SearchBibTeXDownload
2000
51SubDomain: Parsimonious Server Security. Crispin Cowan, Steve Beattie, Greg Kroah-Hartman, Calton Pu, Perry Wagle, Virgil D. Gligor. LISA 2000, 355-368. Cited by 91Web SearchBibTeXDownload
50Review and Revocation of Access Privileges Distributed with PKI Certificates. Himanshu Khurana, Virgil D. Gligor. Security Protocols Workshop 2000, 100-112. Web SearchBibTeXDownload
49Denial of Service - Panel Discussion. Virgil D. Gligor, Matt Blaze, John Ioannidis. Security Protocols Workshop 2000, 194-203. Web SearchBibTeXDownload
48Review and Revocation of Access Privileges Distributed with PKI Certificates (Transcript of Discussion). Virgil D. Gligor. Security Protocols Workshop 2000, 113-124. Web SearchBibTeXDownload
1999
4720 Years of Operating Systems Security. Virgil D. Gligor. IEEE Symposium on Security and Privacy 1999, 108-110. Web SearchBibTeXDownload
46Integrity-Aware PCBC Encryption Schemes. Virgil D. Gligor, Pompiliu Donescu. Security Protocols Workshop 1999, 153-171. Web SearchBibTeXDownload
1998
45On the Formal Definition of Separation-of-Duty Policies and their Composition. Virgil D. Gligor, Serban I. Gavrila, David F. Ferraiolo. IEEE Symposium on Security and Privacy 1998, 172-183. Web SearchBibTeXDownload
44Panel Session - Future Directions. Roger M. Needham, E. Stewart Lee, Joan Feigenbaum, Virgil D. Gligor, Bruce Christianson. Security Protocols Workshop 1998, 227-239. Web SearchBibTeXDownload
43Application-Oriented Security Policies and Their Composition (Position Paper). Virgil D. Gligor, Serban I. Gavrila. Security Protocols Workshop 1998, 67-74. Web SearchBibTeXDownload
42Application-Oriented Security Policies and Their Composition (Transcript of Discussion). Virgil D. Gligor. Security Protocols Workshop 1998, 75-82. Web SearchBibTeXDownload
41Discussion Session: Differences Between Academic and Commercial Security. Virgil D. Gligor, Peter Landrock, T. Mark A. Lomas, Raphael Yahalom, John P. Warne. Security Protocols Workshop 1998, 177-192. Web SearchBibTeXDownload
1997
40On a Pattern-Oriented Model for Intrusion Detection. Shiuh-Pyng Shieh, Virgil D. Gligor. IEEE Trans. Knowl. Data Eng. (9): 661-667 (1997). Web SearchBibTeXDownload
1996
39Detecting Illicit Leakage of Information in Operating Systems. Shiuh-Pyng Shieh, Virgil D. Gligor. Journal of Computer Security (4): 123-148 (1996). Web SearchBibTeXDownload
1995
38Characteristics of role-based access control. Virgil D. Gligor. ACM Workshop on Role-Based Access Control 1995. Web SearchBibTeXDownload
1993
37On Inter-Realm Authentication in Large Distributed Systems. Virgil D. Gligor, Shyh-Wei Luan, Joe Pato. Journal of Computer Security (2): 137-158 (1993). Web SearchBibTeXDownload
1992
36Formal Methods and Automated Tool for Timing-Channel Identification in TCB Source Code. Jingsha He, Virgil D. Gligor. ESORICS 1992, 57-76. Web SearchBibTeXDownload
35Towards a Theory of Penetration-Resistant Systems and its Applications. Sarbari Gupta, Virgil D. Gligor. Journal of Computer Security (1): 133-158 (1992). Web SearchBibTeXDownload
1991
34On Belief Evolution in Authentication Protocols. Rajashekar Kailar, Virgil D. Gligor. CSFW 1991, 103-116. Web SearchBibTeX
33Towards a Theory of Penetration-Resistant Systems and its Applications. Sarbari Gupta, Virgil D. Gligor. CSFW 1991, 62-78. Web SearchBibTeX
32Logics for Cryptographic Protocols - Virtues and Limitations. Virgil D. Gligor, Rajashekar Kailar, Stuart G. Stubblebine, Li Gong. CSFW 1991, 219-226. Web SearchBibTeX
31A Pattern-Oriented Intrusion-Detection Model and Its Applications. Shiuh-Pyng Shieh, Virgil D. Gligor. IEEE Symposium on Security and Privacy 1991, 327-342. Web SearchBibTeX
1990
30Information-Flow Analysis for Covert-Channel Identification in Multilevel Secure Operating Systems. Jingsha He, Virgil D. Gligor. CSFW 1990, 139-149. Web SearchBibTeX
29On Replay Detection in Distributed Systems. Shyh-Wei Luan, Virgil D. Gligor. ICDCS 1990, 188-195. Web SearchBibTeX
28On the Formal Specification and Verification of a Multiparty Session Protocol. P.-C. Cheng, Virgil D. Gligor. IEEE Symposium on Security and Privacy 1990, 216-233. Web SearchBibTeX
27Auditing the Use of Covert Storage Channels in Secure Systems. Shiuh-Pyng Shieh, Virgil D. Gligor. IEEE Symposium on Security and Privacy 1990, 285-295. Web SearchBibTeX
26A Fault-Tolerant Protocol for Atomic Broadcast. Shyh-Wei Luan, Virgil D. Gligor. IEEE Trans. Parallel Distrib. Syst. (1): 271-285 (1990). Web SearchBibTeXDownload
25On the Identification of Covert Storage Channels in Secure Systems. Chii-Ren Tsai, Virgil D. Gligor, C. Sekar Chandersekaran. IEEE Trans. Software Eng. (16): 569-580 (1990). Web SearchBibTeXDownload
24A Specification and Verification Method for Preventing Denial of Service. Che-Fn Yu, Virgil D. Gligor. IEEE Trans. Software Eng. (16): 581-592 (1990). Web SearchBibTeXDownload
1988
23A formal specification and verification method for the prevention of denial of service. Che-Fu Yu, Virgil D. Gligor. IEEE Symposium on Security and Privacy 1988, 187-202. Web SearchBibTeXDownload
22A bandwidth computation model for covert storage channels and its applications. Chii-Ren Tsai, Virgil D. Gligor. IEEE Symposium on Security and Privacy 1988, 108-121. Web SearchBibTeXDownload
21A Fault-Tolerant Protocol for Atomic Broadcast. Shyh-Wei Luan, Virgil D. Gligor. SRDS 1988, 112-126. Web SearchBibTeX
1987
20A Comparative Analysis of Multiprocessor Scheduling Algorithms. Shau-Ping Lo, Virgil D. Gligor. ICDCS 1987, 356-363. Web SearchBibTeX
19Properties of Multiprocessor Scheduling Algorithms. Shau-Ping Lo, Virgil D. Gligor. ICPP 1987, 867-870. Web SearchBibTeX
18A Formal Method for the Identification of Covert Storage Channels in Source Code. Chii-Ren Tsai, Virgil D. Gligor, C. Sekar Chandersekaran. IEEE Symposium on Security and Privacy 1987, 74-87. Web SearchBibTeX
17A New Security Testing Method and Its Application to the Secure Xenix Kernel. Virgil D. Gligor, C. Sekar Chandersekaran, W. Cheng, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, L. Edward Reich. IEEE Trans. Software Eng. (13): 169-183 (1987). Web SearchBibTeXDownload
16Design and Implementation of Secure Xenix. Virgil D. Gligor, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, N. Vasudevan. IEEE Trans. Software Eng. (13): 208-221 (1987). Web SearchBibTeXDownload
1986
15On Denial-of-Service in Computer Networks. Virgil D. Gligor. ICDE 1986, 608-617. Web SearchBibTeX
14On the Design and the Implementation of Secure Xenix Workstations. Virgil D. Gligor, E. L. Burch, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Gary L. Luckenbaugh, N. Vasudevan. IEEE Symposium on Security and Privacy 1986, 102-117. Web SearchBibTeX
13A New Security Testing Method and Its Application to the Secure Xenix Kernel. Virgil D. Gligor, C. Sekar Chandersekaran, W. Cheng, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, L. Edward Reich. IEEE Symposium on Security and Privacy 1986, 40-59. Web SearchBibTeX
12Transaction management in distributed heterogeneous database management systems. Virgil D. Gligor, Radu Popescu-Zeletin. Inf. Syst. (11): 287-297 (1986). Web SearchBibTeXDownload
1984
11Concurrency Control Issues in Distributed Heterogeneous Database Management Systems. Virgil D. Gligor, Radu Popescu-Zeletin. DDSS 1984, 43-56. Web SearchBibTeX
10Inteconnecting Heterogeneous Database Management Systems. Virgil D. Gligor, Gary L. Luckenbaugh. IEEE Computer (17): 33-43 (1984). Web SearchBibTeXDownload
9A Note on Denial-of-Service in Operating Systems. Virgil D. Gligor. IEEE Trans. Software Eng. (10): 320-324 (1984). Web SearchBibTeXDownload
1983
8A Note on the Denial-of-Service Problem. Virgil D. Gligor. IEEE Symposium on Security and Privacy 1983, 139-149. Web SearchBibTeX
7The verification of the protection mechanisms of high-level language machines. Virgil D. Gligor. International Journal of Parallel Programming (12): 211-246 (1983). Web SearchBibTeXDownload
1982
6Finding Augmented-Set Bases. Virgil D. Gligor, David Maier. SIAM J. Comput. (11): 602-609 (1982). Cited by 3Web SearchBibTeXDownload
1980
5On Deadlock Detection in Distributed Systems. Virgil D. Gligor, Susan H. Shattuck. IEEE Trans. Software Eng. (6): 435-440 (1980). Web SearchBibTeXDownload
1979
4Object Migration and Authentication. Virgil D. Gligor, Bruce G. Lindsay. IEEE Trans. Software Eng. (5): 607-611 (1979). Web SearchBibTeXDownload
3Review and Revocation of Access Privileges Distributed Through Capabilities. Virgil D. Gligor. IEEE Trans. Software Eng. (5): 575-586 (1979). Web SearchBibTeXDownload
2Architectural Implementations of Abstract Data Type Implementation. Virgil D. Gligor. ISCA 1979, 20-30. Web SearchBibTeXDownload
1978
1Representing Data Bases in Segmented Name Spaces. Virgil D. Gligor, David Maier. JCDKB 1978, 295. Web SearchBibTeX
from DBLP and Google Scholar
Developed by the Database Group at the University of Wisconsin and Yahoo! Research