Virgil D. Gligor
American computer scientist
Virgil D. Gligor's AcademicInfluence.com Rankings
Download Badge
Computer Science
Virgil D. Gligor's Degrees
- PhD Computer Science University of California, Berkeley
- Masters Computer Science University of California, Berkeley
- Bachelors Mathematics University of California, Berkeley
Similar Degrees You Can Earn
Why Is Virgil D. Gligor Influential?
(Suggest an Edit or Addition)According to Wikipedia, Virgil Dorin Gligor is a Romanian-American professor of electrical and computer engineering who specializes in the research of network security and applied cryptography. Education and Career Gligor was born in Zalău and lived in Bucharest, Romania, until his late teens. He received his high school degree and baccalaureate at the Gheorghe Lazăr National College. After completing the first year as a student in the Faculty of Automatic Control and Computer Science at Politehnica University of Bucharest, he earned a national scholarship to study in the United States, where he received his B.Sc., M.Sc., and Ph.D. degrees from the University of California at Berkeley. While a graduate student he was a Lecturer in EECS at the University of California, Santa Barbara. Between 1976 and 2007 he taught at the University of Maryland, College Park, and since 2008 he has been a Professor in the Department of Electrical and Computer Engineering at Carnegie Mellon University . Until 2015, he was also the co-director of CyLab, CMU’s security and privacy research institute. He was a visiting professor at University of Cambridge, UK, ETH Zurich and EPF Lausanne in Switzerland, SMU in Singapore, and a long-time consultant to Burroughs and IBM corporations. He served on Microsoft’s Trusted Computing Academic Advisory Board and SAP’s Security Advisory Board. He has been an advisory board member of several security and privacy institutes including those of Johns Hopkins University and Pennsylvania State University in the US, CISPA Saarbrucken, Germany, and KTH Stockholm, Sweden.
Virgil D. Gligor's Published Works
Published Works
- A key-management scheme for distributed sensor networks (2002) (4158)
- Distributed detection of node replication attacks in sensor networks (2005) (834)
- TrustVisor: Efficient TCB Reduction and Attestation (2010) (619)
- On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks (2008) (446)
- MiniSec: A Secure Sensor Network Communication Architecture (2007) (431)
- On Trust Establishment in Mobile Ad-Hoc Networks (2002) (312)
- On the formal definition of separation-of-duty policies and their composition (1998) (249)
- A guide to understanding covert channel analysis of trusted systems (1993) (231)
- On the distribution and revocation of cryptographic keys in sensor networks (2005) (224)
- Securing Vehicular Communications - Assumptions, Requirements, and Principles (2006) (216)
- The Crossfire Attack (2013) (215)
- Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes (2001) (211)
- Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure (2013) (156)
- Analysis of complex contagions in random multiplex networks (2012) (153)
- SubDomain: Parsimonious Server Security (2000) (143)
- A fault-tolerant protocol for atomic broadcast (1988) (132)
- Building Verifiable Trusted Path on Commodity x86 Computers (2012) (130)
- A Note on Denial-of-Service in Operating Systems (1984) (123)
- Two-server password-only authenticated key exchange (2005) (113)
- On message integrity in cryptographic protocols (1992) (105)
- CoDef: collaborative defense against large-scale link-flooding attacks (2013) (96)
- Bootstrapping security associations for routing in mobile ad-hoc networks (2003) (95)
- SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks (2016) (92)
- Transaction management in distributed heterogeneous database management systems (1986) (88)
- A Note on the Denial-of-Service Problem (1983) (88)
- On Deadlock Detection in Distributed Systems (1980) (86)
- Proceedings of the 2012 ACM conference on Computer and communications security (2012) (84)
- Towards a secure and interoperable DRM architecture (2006) (83)
- Non-interference, who needs it? (2001) (81)
- KeyNote : Trust management for public-key infrastructures. Discussion (1999) (75)
- PrivateRide: A Privacy-Enhanced Ride-Hailing Service (2017) (73)
- On a Pattern-Oriented Model for Intrusion Detection (1997) (70)
- A Specification and Verification Method for Preventing Denial of Service (1990) (70)
- On the Identification of Covert Storage Channels in Secure Systems (1990) (64)
- $k$ -Connectivity in Random Key Graphs With Unreliable Links (2012) (63)
- A Formal Method for the Identification of Covert Storage Channels in Source Code (1987) (62)
- Interconnecting Heterogeneous Database Management Systems (1986) (61)
- Privacy-Preserving Relationship Path Discovery in Social Networks (2009) (60)
- Towards a Theory of Trust in Networks of Humans and Computers (2011) (57)
- A formal specification and verification method for the prevention of denial of service (1988) (53)
- On belief evolution in authentication protocols (1991) (52)
- Dancing with Giants: Wimpy Kernels for On-Demand Isolated I/O (2014) (51)
- Design and Implementation of Secure Xenix (1987) (51)
- On the strengths of connectivity and robustness in general random intersection graphs (2014) (51)
- A bandwidth computation model for covert storage channels and its applications (1988) (49)
- Logics for cryptographic protocols-virtues and limitations (1991) (47)
- On inter-realm authentication in large distributed systems (1992) (47)
- Review and Revocation of Access Privileges Distributed Through Capabilities (1979) (45)
- Routing Bottlenecks in the Internet: Causes, Exploits, and Countermeasures (2014) (44)
- Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms (2012) (44)
- Efficient TCB Reduction and Attestation (2009) (43)
- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks (2003) (42)
- A pattern-oriented intrusion-detection model and its applications (1991) (40)
- On the formal specification and verification of a multiparty session protocol (1990) (36)
- Concurrency Control Issues in Distributed Heterogeneous Database Management Systems (1984) (35)
- On secure and reliable communications in wireless sensor networks: Towards k-connectivity under a random pairwise key predistribution scheme (2014) (35)
- Characteristics of role-based access control (1996) (34)
- Security of Emergent Properties in Ad-Hoc Networks (Transcript of Discussion) (2004) (33)
- Privacy-Preserving Integrity-Assured Data Aggregation in Sensor Networks (2009) (32)
- Secure k-connectivity in wireless sensor networks under an on/off channel model (2013) (32)
- On Connectivity and Robustness in Random Intersection Graphs (2017) (32)
- Connectivity in secure wireless sensor networks under transmission constraints (2014) (31)
- On topological properties of wireless sensor networks under the q-composite key predistribution scheme with on/off channels (2014) (31)
- Lockdown: A Safe and Practical Environment for Security Applications (CMU-CyLab-09-011) (2009) (31)
- On the Negotiation of Access Control Policies (2001) (30)
- On the Design and the Implementation of Secure Xenix Workstations (1986) (30)
- Weak Key Authenticity and the Computational Completeness of Formal Encryption (2003) (30)
- Toward $k$ -Connectivity of the Random Graph Induced by a Pairwise Key Predistribution Scheme With Unreliable Links (2014) (30)
- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks (Discussion) (2003) (29)
- KISS: "Key It Simple and Secure" Corporate Key Management (2013) (28)
- Reasoning about joint administration of access policies for coalition resources (2002) (28)
- A New Privacy-Enhanced Matchmaking Protocol (2013) (28)
- A Comparative Analysis of Multiprocessor Scheduling Algorithms (1987) (27)
- On k-Connectivity and Minimum Vertex Degree in Random s-Intersection Graphs (2014) (27)
- Network fault localization with small TCB (2011) (27)
- Trusted Display on Untrusted Commodity Platforms (2015) (26)
- k-Connectivity in Secure Wireless Sensor Networks with Physical Link Constraints - The On/Off Channel Model (2012) (25)
- FLoc : Dependable Link Access for Legitimate Traffic in Flooding Attacks (2010) (25)
- Security and Privacy in Ad-Hoc and Sensor Networks (2008) (24)
- Assessment of the real-time requirements for programming environments and languages (1983) (24)
- STRIDE: sanctuary trail -- refuge from internet DDoS entrapment (2013) (21)
- Integrity-Aware PCBC Encryption Schemes (1999) (21)
- Efficient Handling of Adversary Attacks in Aggregation Applications (2008) (20)
- Integrated security services for dynamic coalitions (2003) (19)
- Establishing Software Root of Trust Unconditionally (2019) (19)
- Brief Encounters with a Random Key Graph (2009) (19)
- Object Migration and Authentication (1979) (19)
- $k$ -Connectivity in Random $K$ -Out Graphs Intersecting Erdős-Rényi Graphs (2017) (19)
- On Denial-of-Service in Computer Networks (1986) (18)
- Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction (2015) (18)
- Information-flow analysis for covert-channel identification in multilevel secure operating systems (1990) (17)
- A model for access negotiations in dynamic coalitions (2004) (17)
- RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication (2013) (17)
- Auditing the use of covert storage channels in secure systems (1990) (16)
- Exact analysis of k-connectivity in secure sensor networks with unreliable links (2014) (16)
- Topological Properties of Wireless Sensor Networks Under the Q-Composite Key Predistribution Scheme With Unreliable Links (CMU-CyLab-14-002) (2014) (15)
- Review and Revocation of Access Privileges Distributed with PKI Certificates (2000) (15)
- Designing secure and reliable wireless sensor networks under a pairwise key predistribution scheme (2015) (13)
- The Case for In-Network Replay Suppression (2017) (13)
- Analysis of the Hardware Verification of the Honeywell SCOMP (1985) (13)
- On Message Integrity in Symmetric Encryption (2000) (13)
- A New Security Testing Method and Its Application to the Secure Xenix Kernel (1986) (12)
- Handling New Adversaries in Secure Mobile Ad-Hoc Networks (2007) (12)
- Application-Oriented Security Policies and Their Composition (Position Paper) (1998) (12)
- On inter-realm authentication in large distributed systems (1991) (11)
- Towards a theory of penetration-resistant systems and its applications (1991) (11)
- Security Limitations of Virtualization and How to Overcome Them (2010) (10)
- Protocol design for integrity protection (1993) (10)
- Negotiation and management of coalition resources (2002) (10)
- On replay detection in distributed systems (1990) (10)
- On the Security Effectiveness of Cryptographic Protocols (1995) (10)
- Random intersection graphs and their applications in security, wireless communication, and social networks (2015) (10)
- Administering Access Control in Dynamic Coalitions (2005) (8)
- GeoPKI: Converting Spatial Trust into Certificate Trust (2012) (8)
- Proceedings of the Workshop of the Federal Criteria for Information Technology Security (1994) (8)
- Application-oriented security policies and their composition. Discussion. Author's reply (1999) (8)
- Emergent properties in ad-hoc networks: a security perspective (2005) (8)
- Application-oriented security policies and their composition. Discussion. Author's reply (1999) (8)
- On asymptotically exact probability of $k$-connectivity in random key graphs intersecting Erdős-Rényi graphs (2014) (8)
- 20 years of operating systems security (1999) (8)
- Guest Editorial Vehicular Networks (2007) (8)
- Dancing with the Adversary: A Tale of Wimps and Giants (2014) (7)
- Street-Level Trust Semantics for Attribute Authentication (2012) (7)
- Dependable connection setup for network capabilities (2010) (7)
- Properties of Multiprocessor Scheduling Algorithms (1987) (7)
- Transparent Key Integrity (TKI): A Proposal for a Public-Key Validation Infrastructure (CMU-CyLab-12-016) (2012) (6)
- On the evolution of adversary models in security protocols: from the beginning to sensor networks (2007) (6)
- Dancing with Giants: Wimpy Kernels for On-Demand I/O Isolation (2015) (6)
- PrivateRide: A Privacy-Preserving and Secure Ride-Hailing Service (2016) (6)
- Efficient TCB Reduction and Attestation (CMU-CyLab-09-003) (2009) (6)
- A Note on NSA's Dual Counter Mode of Encryption (2001) (6)
- Formal Methods and Automated Tool for Timing-Channel Identification in TCB Source Code (1992) (6)
- Emergent properties in ad-hoc networks: a security perspective (2006) (6)
- On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike) (2005) (6)
- Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents (2016) (6)
- Denial of Service - Panel Discussion (2000) (5)
- ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets (2013) (5)
- Architectural implications of abstract data type implementation (1979) (5)
- 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014 (2014) (5)
- Distributed Trust Establishment in MANET’s: Swarm Intelligence (2002) (5)
- Handling New Adversaries in Wireless Ad-Hoc Networks (Transcript of Discussion) (2008) (5)
- Covert Channel Analysis of Trusted Systems. A Guide to Understanding (1993) (5)
- RelationGrams: Tie-Strength Visualization for User-Controlled Online Identity Authentication (CMU-CyLab-11-014) (2011) (4)
- Designing Securely and Reliably Connected Wireless Sensor Networks (2015) (4)
- On the Security Effectiveness of Cryptographic Protocols 1 On the Security Effectiveness of Cryptographic Protocols (1994) (4)
- Detecting Illicit Leakage of Information in Operating Systems (1996) (4)
- Requirements for Root of Trust Establishment (2018) (4)
- Reasoning about Message Integrity (1995) (4)
- Distributed database management systems: an architectural perspective (1983) (4)
- A model for secure distributed computations in a heterogeneous environment (1988) (3)
- Discovering records of private VoIP calls without wiretapping (2012) (3)
- Anonymity Leakage in Private VoIP Networks (2018) (3)
- Inductive analysis of the internet protocol TLS. Discussion. Authors' reply (1999) (3)
- What we can learn from API security: (Transcript of discussion) (2005) (3)
- Results on Vertex Degree and K-Connectivity in Uniform S-Intersection Graphs (CMU-CyLab-14-004) (2014) (3)
- Private communication detection: a stochastic approach (2012) (3)
- Surviving Insider Attacks: A Call for System Experiments (2008) (3)
- Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference (2013) (3)
- A Guide to Understanding Security Testing and Test Documentation in Trusted Systems, Version 1 (1993) (3)
- Finding Augmented-Set Bases (1982) (2)
- Secure wireless networking (2009) (2)
- Negotiation of Access Control Policies (Transcript of Discussion) (2001) (2)
- Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers (2006) (2)
- Information assurance technology forecast 2005 (2006) (2)
- Sanctuary Trail : Refuge from Internet DDoS Entrapment (2012) (2)
- An I/O Separation Model for Formal Verification of Kernel Implementations (2021) (2)
- A Picture is Worth a Thousand Words: Improving Usability and Robustness of Online Recommendation Systems (2011) (2)
- Distributed audit with secure remote procedure calls (1991) (2)
- Monotone Increasing Properties and Their Phase Transitions in Uniform Random Intersection Graphs (2015) (2)
- On the foundations of trust in networks of humans and computers (2012) (2)
- A Guide to Understanding Trusted Facility Management. Version 1 (1989) (2)
- Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008 (2008) (1)
- Street-Level Trust Semantics for Attribute Authentication (Transcript of Discussion) (2012) (1)
- A Formal Specification and Verification Method for the Prevention of Denial of Service in Ada Services (1988) (1)
- TrueNet : Efficient Fault Localization with Small TCB (2011) (1)
- Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks (2005) (1)
- Security Limitations of Virtualization and How to Overcome Them (Transcript of Discussion) (2010) (1)
- Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007 (2007) (1)
- An analysis of penetration vulnerabilities in system software (2001) (1)
- Security and Privacy in Ad-hoc and Sensor Networks: Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers (Lecture Notes in Computer Science) (2007) (1)
- Establishing and Maintaining Root of Trust on Commodity Computer Systems (2019) (1)
- Representing Data Bases in Segmented Name Spaces (1978) (1)
- Dependable Computing for Critical Applications (1998) (1)
- Architectures for practical security (2010) (1)
- Dancing with the Adversary: A Tale of Wimps and Giants (Transcript of Discussion) (2014) (1)
- Establishing Software Root of Trust Unconditionally (CMU-CyLab-18-003) (2021) (1)
- k-Connectivity of Random Key Graphs (2015) (1)
- The Fragility of Adversary Definitions in Cryptographic Protocols (2008) (1)
- Proceedings of the 5th International Conference on Information Security (2002) (1)
- On the negotiation of access control policies. Discussion (2002) (1)
- Accountable Privacy. Authors' reply (2006) (1)
- Handling New Adversaries in Wireless Ad-Hoc Networks (2008) (1)
- Delegating trust. Discussion. Authors' reply (1999) (0)
- Identity and Location. Authors' reply (2006) (0)
- Encapsulating rules of prudent security engineering (position paper). Discussion (2002) (0)
- Formal JVIethods and Automated Tool for Timing-Channel Identification in TCB Source Codet (2013) (0)
- ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets (Transcript of Discussion) (2013) (0)
- DefAT: Dependable Connection Setup for Network Capabilities (2011) (0)
- Controlling Who Tracks Me. Authors'reply (2006) (0)
- MiniSec: ASecureSensorNetwork Communication Architecture (2007) (0)
- IEEE Transactions on Dependable an Secure Computing: Editorial (2008) (0)
- Functional Security Criteria for Distributed Systems (1995) (0)
- Delegation and not-so smart cards. Discussion. Authors' reply (1999) (0)
- An Efficient Key Distribution Scheme in Wireless Sensor Architecture with Arduino and XBee (2019) (0)
- Optimistic Trust with realistic eNvestigators. Discussion. Authors' reply (1999) (0)
- A Rest Stop on the Unending Road to Provable Security (2021) (0)
- Privacy Is Linking Permission to Purpose. Authors' reply (2006) (0)
- Reasoning about Message Integrity 1 Reasoning about Message Integrity (1994) (0)
- The trust shell game. Discussion. Authors' reply (1999) (0)
- Assuring the Safety of Asymmetric Social Protocols (2017) (0)
- Protocols with certified-transfer servers. Discussion (2003) (0)
- Object migration and authentication. [in computer operating systems design] (1979) (0)
- Patent Application Publication Feb . 28 , 2002 Sheet 2 of 4 US 2002 / 0026592 A 1 (2017) (0)
- Establishment in MANET ’ s : Swarm Intelligence (2003) (0)
- Review and Revocation of Access Privileges Distributed with PKI Certificates (Transcript of Discussion) (2000) (0)
- Method and system for controlling base access of extended role in distributed and centralized computer system (1995) (0)
- A new concept in protocols : Verifiable computational delegation. Discussion. Authors' reply (1999) (0)
- Enforcing Dependencies between PKI Certificates in ad-hoc Networks (2001) (0)
- Advances in sensor and ad-hoc network security: perspective and status (2005) (0)
- Secure fingerprinting using public-key cryptography. Discussion. Authors' reply (1999) (0)
- Towards flexible credential negotiation protocols. Commentary. Authors' reply (2005) (0)
- Thisyear's major forumfortechnical interchange on computer networks will explore the planning, implementation, evaluation anduse ofbothlarge andsmallscale computer networks. Important technical advances will bereported andtheprogressofexisting networks will bereviewed. (1979) (0)
- Application-Oriented Security Policies and Their Composition (Transcript of Discussion) (1998) (0)
- Discussion Session: Differences Between Academic and Commercial Security (1998) (0)
- WAR: Wireless Anonymous Routing. Commentary. Authors' reply (2005) (0)
- Proceedings : Fourth Symposium on Reliability in Distributed Software and Database Systems, October 15-17, 1984, Sheraton Inn Northwest Washington, Silver Spring, Maryland (1984) (0)
- Delegation of responsibilities. Discussion. Authors' reply (1999) (0)
- Enforcing security policies for distributed objects applications. Commentary. Authors' reply (2005) (0)
- Overview of the AT&T labs trust-management project. Discussion. Authors' reply (1999) (0)
- Sanctuary Trail: Refuge from Internet DDoS Entrapment (CMU-CyLab-12-013) (2012) (0)
- External consistency and the verification of security protocols. Discussion. Authors' reply (1999) (0)
- APPLICATIONS OF RANDOM INTERSECTION GRAPHS TO SECURE SENSOR NETWORKS – CONNECTIVITY RESULTS (2015) (0)
- DefAT: Dependable Connection Setup for Network Capabilities (CMU-CyLab-11-018) (2011) (0)
- Network Adversary Attacks against Secure Encryption Schemes (2015) (0)
- Table of Contents Volume 3 (1999) (0)
- Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008 (2008) (0)
- Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents (Transcript of Discussion) (2016) (0)
- Security Criteria for Distributed Systems: Functional Requirements. (1995) (0)
- Delegation of signalling rights. Discussion (2003) (0)
- 1 On Message Integrity in Symmetric Encryption (2000) (0)
- Covert channels in secure computer systems (1993) (0)
- Panel: Authentication in Constrained Environments (2005) (0)
- Trusted RUBIX architecture and policy model interpretation (1992) (0)
- Requirements for Root of Trust Establishment (Transcript of Discussion) (2018) (0)
- Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks (2005) (0)
- Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction (Transcript of Discussion) (2015) (0)
- Composition (Position Paper) (1998) (0)
- 2 F eb 2 01 5 Threshold Functions in Random s-Intersection Graphs (0)
- Proceedings of the ACM Workshop on Formal Methods in Security Engineering : From Specifications to Code (FMSE) (2007) (0)
- Method and system for improved access control based on the roles in distributed and centralized computer systems (1994) (0)
- Distributed Immune Systems for Wireless Network Information Assurance (2010) (0)
- Position Statement: On the Evolution of Adversary Models in Computer Systems and Networks (2008) (0)
- 2 On Trust Establishment Differences between the Internet and MANETs (2002) (0)
- Integrity-aware PCBC encryption schemes (Transcript of discussion) (2000) (0)
- Panel session: Is protocol modelling finished? (transcript of discussion). Discussion (2005) (0)
- Winning Against any Adversary on Commodity Computer Systems (2019) (0)
- Third party certification of HTTP service access statistics. Discussion. Authors' reply (1999) (0)
- Panel Session - Future Directions (1998) (0)
- Privacy-preserving Path Discovery in Social Networks (0)
- Applying Specialization to Improve Survivability of OS Kernels (Immunix Project) (2000) (0)
- Network protocol for protected communication (1999) (0)
- Designing Robust and Resilient Tactical MANETs (2014) (0)
- Information Security: 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 – October 2, 2002 Proceedings (2002) (0)
- A curious gap in one-dimensional geometric random graphs between connectivity and the absence of isolated node (2015) (0)
- On the Evolution of Adversary Models in Computer Systems and Networks (2008) (0)
- The verification of the protection mechanisms of high-level language machines (1984) (0)
- Optimal strategies for side-channel leakage in FCFS packet schedulers (2015) (0)
This paper list is powered by the following services:
Other Resources About Virgil D. Gligor
What Schools Are Affiliated With Virgil D. Gligor?
Virgil D. Gligor is affiliated with the following schools: