Virgil D. Gligor

Virgil D. Gligor

Virgil D. Gligor (1949) received his B.Sc., M.Sc., and Ph.D. degrees from the University of California at Berkeley. He has been at the University of Maryland since 1976, and is currently a Professor of Electrical and Computer Engineering. Over the past 30 years, his research interests ranged from access control mechanisms, penetration analysis, and denial-of-service protection to cryptographic protocols and applied cryptography. He published over one hundred research articles and technical papers. He was a consultant to Burroughs (1977-1981) and IBM (1984-1999) Corporations, and is currently serving on Microsoft's Trustworthy Computing Academic Advisory Board (2003-present). He served the profession as the chair of co-chair of several international conferences and symposia including IEEE Security and Privacy Symposium, Internet Society's Network and Distributed Systems Security Symposium, IEEE Dependable Computing for Critical Applications, and IEEE-ACM Symposium on Reliability in Distributed Software and Databases. He received the outstanding paper award at the 1988 IEEE Symposium on Security and Privacy, and the best paper award at the 13th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises. He was a member of several US Government INFOSEC Study Groups that set research agendas in information security, and served on a National Research Council panel on information security (1987-1988). He was an Editorial Board member of Information Systems (1984 - 1993), Journal of Computer Security (1991 - 2000), and is currently an Editorial Board member of the ACM Transactions on Information System Security, of the IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Computers, and IEEE Transactions on Mobile Computing. Gligor is the chair of the ACM Special Interest on Security, Audit, and Control. He is the recipient of the 2006 National Information Systems Security Award jointly granted by NIST and NSA in the US. In January 2008, Professor Gligor commences his new appointment at Carnegie Mellon University.

Publications

2007

  • Virgil D. Gligor: On the evolution of adversary models in security protocols: from the beginning to sensor networks. ASIACCS 2007: 3
  • Mark Luk, Ghita Mezzour, Adrian Perrig, Virgil D. Gligor: MiniSec: a secure sensor network communication architecture. IPSN 2007: 479-488

2006

  • Levente Buttyán, Virgil D. Gligor, Dirk Westhoff: Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers Springer 2006
  • Virgil D. Gligor: Emergent properties in ad-hoc networks: a security perspective. ASIACCS 2006: 1
  • Virgil D. Gligor, Thomas Haigh, Dick Kemmerer, Carl E. Landwehr, Steven B. Lipner, John D. McLean: Information Assurance Technology Forecast 2005. IEEE Security & Privacy 4(1): 62-69 (2006)

2005

  • Jonathan Katz, Philip D. MacKenzie, Gelareh Taban, Virgil D. Gligor: Two-Server Password-Only Authenticated Key Exchange. ACNS 2005: 1-16
  • Bryan Parno, Adrian Perrig, Virgil D. Gligor: Distributed Detection of Node Replication Attacks in Sensor Networks. IEEE Symposium on Security and Privacy 2005: 49-63
  • Rakeshbabu Bobba, Serban I. Gavrila, Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva: Administering Access Control in Dynamic Coalitions. LISA 2005: 249-261
  • Virgil D. Gligor: Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks. MADNES 2005: 1
  • Mike Burmester, Virgil D. Gligor, Evangelos Kranakis, J. D. Tygar, Yuliang Zheng: Panel: Authentication in Constrained Environments. MADNES 2005: 186-191
  • Virgil D. Gligor: Advances in sensor and ad-hoc network security: perspective and status. SASN 2005: 68
  • Haowen Chan, Virgil D. Gligor, Adrian Perrig, Gautam Muralidharan: On the Distribution and Revocation of Cryptographic Keys in Sensor Networks. IEEE Trans. Dependable Sec. Comput. 2(3): 233-247 (2005)

2004

  • Virgil D. Gligor: Security of Emergent Properties in Ad-Hoc Networks (Transcript of Discussion). Security Protocols Workshop 2004: 256-266
  • Himanshu Khurana, Virgil D. Gligor: A Model for Access Negotiations in Dynamic Coalitions. WETICE 2004: 205-210

2003

  • Omer Horvitz, Virgil D. Gligor: Weak Key Authenticity and the Computational Completeness of Formal Encryption. CRYPTO 2003: 530-547
  • Himanshu Khurana, Serban I. Gavrila, Rakeshbabu Bobba, Radostina K. Koleva, Anuja Sonalker, Emilian Dinu, Virgil D. Gligor, John S. Baras: Integrated Security Services for Dynamic Coalitions. DISCEX (2) 2003: 38-40
  • Virgil D. Gligor: Guaranteeing Access in Spite of Distributed Service-Flooding Attacks. Security Protocols Workshop 2003: 80-96
  • Virgil D. Gligor: Guaranteeing Access in Spite of Distributed Service-Flooding Attacks (Discussion). Security Protocols Workshop 2003: 97-105

2002

  • Agnes Hui Chan, Virgil D. Gligor: Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings Springer 2002
  • Laurent Eschenauer, Virgil D. Gligor: A key-management scheme for distributed sensor networks. ACM Conference on Computer and Communications Security 2002: 41-47
  • Himanshu Khurana, Virgil D. Gligor, John Linn: Reasoning about Joint Administration of Access Policies for Coalition Resources. ICDCS 2002: 429-
  • Laurent Eschenauer, Virgil D. Gligor, John S. Baras: On Trust Establishment in Mobile Ad-Hoc Networks. Security Protocols Workshop 2002: 47-66

2001

  • Peter Ryan, John D. McLean, Jonathan K. Millen, Virgil D. Gligor: Non-Interference: Who Needs It? CSFW 2001: 237
  • Virgil D. Gligor, Pompiliu Donescu: Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes. FSE 2001: 92-108
  • Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva, Vijay G. Bharadwaj, John S. Baras: On the Negotiation of Access Control Policies. Security Protocols Workshop 2001: 188-201
  • Virgil D. Gligor: Negotiation of Access Control Policies (Transcript of Discussion). Security Protocols Workshop 2001: 202-212

2000

  • Crispin Cowan, Steve Beattie, Greg Kroah-Hartman, Calton Pu, Perry Wagle, Virgil D. Gligor: SubDomain: Parsimonious Server Security. LISA 2000: 355-368
  • Himanshu Khurana, Virgil D. Gligor: Review and Revocation of Access Privileges Distributed with PKI Certificates. Security Protocols Workshop 2000: 100-112
  • Virgil D. Gligor: Review and Revocation of Access Privileges Distributed with PKI Certificates (Transcript of Discussion). Security Protocols Workshop 2000: 113-124
  • Virgil D. Gligor, Matt Blaze, John Ioannidis: Denial of Service - Panel Discussion. Security Protocols Workshop 2000: 194-203

1999

  • Virgil D. Gligor: 20 Years of Operating Systems Security. IEEE Symposium on Security and Privacy 1999: 108-110
  • Virgil D. Gligor, Pompiliu Donescu: Integrity-Aware PCBC Encryption Schemes. Security Protocols Workshop 1999: 153-171

1998

  • Virgil D. Gligor, Peter Landrock, T. Mark A. Lomas, Raphael Yahalom, John P. Warne: Discussion Session: Differences Between Academic and Commercial Security. Security Protocols Workshop 1998: 177-192
  • Roger M. Needham, E. Stewart Lee, Joan Feigenbaum, Virgil D. Gligor, Bruce Christianson: Panel Session - Future Directions. Security Protocols Workshop 1998: 227-239
  • Virgil D. Gligor, Serban I. Gavrila: Application-Oriented Security Policies and Their Composition (Position Paper). Security Protocols Workshop 1998: 67-74
  • Virgil D. Gligor: Application-Oriented Security Policies and Their Composition (Transcript of Discussion). Security Protocols Workshop 1998: 75-82

1997

  • Shiuh-Pyng Shieh, Virgil D. Gligor: On a Pattern-Oriented Model for Intrusion Detection. IEEE Trans. Knowl. Data Eng. 9(4): 661-667 (1997)

1996

  • Shiuh-Pyng Shieh, Virgil D. Gligor: Detecting Illicit Leakage of Information in Operating Systems. Journal of Computer Security 4(2/3): 123-148 (1996)

1995

  • Virgil D. Gligor: Characteristics of role-based access control. ACM Workshop on Role-Based Access Control 1995

1993

  • Virgil D. Gligor, Shyh-Wei Luan, Joe Pato: On Inter-Realm Authentication in Large Distributed Systems. Journal of Computer Security 2(2-3): 137-158 (1993)

1992

  • Jingsha He, Virgil D. Gligor: Formal Methods and Automated Tool for Timing-Channel Identification in TCB Source Code. ESORICS 1992: 57-76
  • Sarbari Gupta, Virgil D. Gligor: Towards a Theory of Penetration-Resistant Systems and its Applications. Journal of Computer Security 1(2): 133-158 (1992)

1991

  • Rajashekar Kailar, Virgil D. Gligor: On Belief Evolution in Authentication Protocols. CSFW 1991: 103-116
  • Virgil D. Gligor, Rajashekar Kailar, Stuart G. Stubblebine, Li Gong: Logics for Cryptographic Protocols - Virtues and Limitations. CSFW 1991: 219-226
  • Sarbari Gupta, Virgil D. Gligor: Towards a Theory of Penetration-Resistant Systems and its Applications. CSFW 1991: 62-78
  • Shiuh-Pyng Shieh, Virgil D. Gligor: A Pattern-Oriented Intrusion-Detection Model and Its Applications. IEEE Symposium on Security and Privacy 1991: 327-342

1990

  • Jingsha He, Virgil D. Gligor: Information-Flow Analysis for Covert-Channel Identification in Multilevel Secure Operating Systems. CSFW 1990: 139-149
  • Shyh-Wei Luan, Virgil D. Gligor: On Replay Detection in Distributed Systems. ICDCS 1990: 188-195
  • P.-C. Cheng, Virgil D. Gligor: On the Formal Specification and Verification of a Multiparty Session Protocol. IEEE Symposium on Security and Privacy 1990: 216-233
  • Shiuh-Pyng Shieh, Virgil D. Gligor: Auditing the Use of Covert Storage Channels in Secure Systems. IEEE Symposium on Security and Privacy 1990: 285-295
  • Shyh-Wei Luan, Virgil D. Gligor: A Fault-Tolerant Protocol for Atomic Broadcast. IEEE Trans. Parallel Distrib. Syst. 1(3): 271-285 (1990)
  • Chii-Ren Tsai, Virgil D. Gligor, C. Sekar Chandersekaran: On the Identification of Covert Storage Channels in Secure Systems. IEEE Trans. Software Eng. 16(6): 569-580 (1990)
  • Che-Fn Yu, Virgil D. Gligor: A Specification and Verification Method for Preventing Denial of Service. IEEE Trans. Software Eng. 16(6): 581-592 (1990)

1988

  • Shyh-Wei Luan, Virgil D. Gligor: A Fault-Tolerant Protocol for Atomic Broadcast. Symposium on Reliable Distributed Systems 1988: 112-126

1987

  • Shau-Ping Lo, Virgil D. Gligor: A Comparative Analysis of Multiprocessor Scheduling Algorithms. ICDCS 1987: 356-363
  • Shau-Ping Lo, Virgil D. Gligor: Properties of Multiprocessor Scheduling Algorithms. ICPP 1987: 867-870
  • Chii-Ren Tsai, Virgil D. Gligor, C. Sekar Chandersekaran: A Formal Method for the Identification of Covert Storage Channels in Source Code. IEEE Symposium on Security and Privacy 1987: 74-87
  • Virgil D. Gligor, C. Sekar Chandersekaran, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, L. Edward Reich: A New Security Testing Method and Its Application to the Secure Xenix Kernel. IEEE Trans. Software Eng. 13(2): 169-183 (1987)
  • Virgil D. Gligor, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, N. Vasudevan: Design and Implementation of Secure Xenix. IEEE Trans. Software Eng. 13(2): 208-221 (1987)

1986

  • Virgil D. Gligor: On Denial-of-Service in Computer Networks. ICDE 1986: 608-617
  • Virgil D. Gligor, E. L. Burch, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Gary L. Luckenbaugh, N. Vasudevan: On the Design and the Implementation of Secure Xenix Workstations. IEEE Symposium on Security and Privacy 1986: 102-117
  • Virgil D. Gligor, C. Sekar Chandersekaran, W. Cheng, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, L. Edward Reich: A New Security Testing Method and Its Application to the Secure Xenix Kernel. IEEE Symposium on Security and Privacy 1986: 40-59
  • Virgil D. Gligor, Radu Popescu-Zeletin: Transaction management in distributed heterogeneous database management systems. Inf. Syst. 11(4): 287-297 (1986)

1985

  • Virgil D. Gligor, Peter A. Ng: Foreword. IEEE Trans. Software Eng. 11(6): 497-501 (1985)

1984

  • Virgil D. Gligor, Radu Popescu-Zeletin: Concurrency Control Issues in Distributed Heterogeneous Database Management Systems. DDSS 1984: 43-56
  • Virgil D. Gligor, Gary L. Luckenbaugh: Inteconnecting Heterogeneous Database Management Systems. IEEE Computer 17(1): 33-43 (1984)
  • Virgil D. Gligor: A Note on Denial-of-Service in Operating Systems. IEEE Trans. Software Eng. 10(3): 320-324 (1984)

1983

  • Virgil D. Gligor: A Note on the Denial-of-Service Problem. IEEE Symposium on Security and Privacy 1983: 139-149

1982

  • Virgil D. Gligor, David Maier: Finding Augmented-Set Bases. SIAM J. Comput. 11(3): 602-609 (1982)

1980

  • Virgil D. Gligor, Susan H. Shattuck: On Deadlock Detection in Distributed Systems. IEEE Trans. Software Eng. 6(5): 435-440 (1980)

1979

  • Virgil D. Gligor: Architectural Implementations of Abstract Data Type Implementation. ISCA 1979: 20-30
  • Virgil D. Gligor: Review and Revocation of Access Privileges Distributed Through Capabilities. IEEE Trans. Software Eng. 5(6): 575-586 (1979)
  • Virgil D. Gligor, Bruce G. Lindsay: Object Migration and Authentication. IEEE Trans. Software Eng. 5(6): 607-611 (1979)

1978

  • Virgil D. Gligor, David Maier: Representing Data Bases in Segmented Name Spaces. JCDKB 1978: 295

Search another word or see Virgil D. Gligoron Dictionary | Thesaurus |Spanish
Copyright © 2014 Dictionary.com, LLC. All rights reserved.
  • Please Login or Sign Up to use the Recent Searches feature