Journal Article Detecting illicit leakage of information in operating systems* 1996 • Journal of Computer Security • 4(2-3):123-148 Shieh S-P, Gligor VD
Conference Characteristics of role-based access control 1995 • Proceedings of the ACM Workshop on Role-Based Access Control • 9-14 Gligor V
Chapter On the Security Effectiveness of Cryptographic Protocols 1995 • Dependable Computing and Fault-Tolerant Systems • 9:139-157 Kailar R, Gligor VD, Gong L
Chapter Reasoning about Message Integrity 1995 • Dependable Computing and Fault-Tolerant Systems • 9:109-137 Kailar R, Gligor VD, Stubblebine SG
Journal Article On Inter-Realm Authentication in Large Distributed Systems 1993 • Journal of Computer Security • 2(2-3):137-157 Gligor VD, Luan S-W, Pato JN
Conference Protocol design for integrity protection 1993 • Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy • 41-53 Stubblebine SG, Gligor VD
Conference Formal methods and automated tool for timing-channel identification in tcb source code 1992 • Lecture Notes in Computer Science • 648:57-75 He J, Gligor VD
Journal Article Towards a Theory of Penetration-Resistant Systems and Its Applications 1992 • Journal of Computer Security • 1(2):133-158 Gupta S, Gligor VD
Conference Trusted RUBIX architecture and policy model interpretation 1992 • Proceedings - Annual Computer Security Applications Conference, ACSAC • 97-110 Testa CJ, Wilner BD, Gligor VD
Conference A pattern-oriented intrusion-detection model and its applications 1991 327-342 Shieh SW, Gligor VD
Conference Logics for cryptographic protocols-virtues and limitations 1991 • Proceedings of the Computer Security Foundations Workshop • 219-226 Gligor VD, Kailar R, Stubblebine S, Gong L
Conference On belief evolution in authentication protocols 1991 • Proceedings of the Computer Security Foundations Workshop • 103-116 Kailar R, Gligor VD
Conference On inter-realm authentication in large distributed systems 1991 1-2 Gligor VD, Luan S-W, Pato JN
Conference Towards a theory of penetration-resistant systems and its applications 1991 • Proceedings of the Computer Security Foundations Workshop • 62-78 Gupta S, Gligor VD
Journal Article A fault-tolerant protocol for atomic broadcast 1990 • IEEE Transactions on Parallel and Distributed Systems • 1(3):271-285 Luan S-W, Gligor VD
Journal Article A SPECIFICATION AND VERIFICATION METHOD FOR PREVENTING DENIAL OF SERVICE 1990 • IEEE Transactions on Software Engineering • 16(6):581-592 YU CF, GLIGOR VD
Conference Auditing the use of covert storage channels in secure systems 1990 285-295 Shieh S-PW, Gligor VD
Conference Information-flow analysis for covert-channel identification in multilevel secure operating systems 1990 • Proceedings of the Computer Security Foundations Workshop • 139-148 He J, Gligor VD
Conference On replay detection in distributed systems 1990 • Distributed Computing Systems • 188-195 Luan S-W, Gligor VD
Conference On the formal specification and verification of a multiparty session protocol 1990 216-233 Cheng P-C, Gligor VD
Journal Article ON THE IDENTIFICATION OF COVERT STORAGE CHANNELS IN SECURE SYSTEMS 1990 • IEEE Transactions on Software Engineering • 16(6):569-580 TSAI CR, GLIGOR VD, CHANDERSEKARAN CS
Conference A bandwidth computation model for covert storage channels and its applications 1988 108-121 Tsai C-R, Gligor VD