Conference A Formal Specification and Verification Method for the Prevention of Denial of Service in Ada Services 1988 Yu C-F, Gligor VD
Conference A model for secure distributed computations in a heterogeneous environment 1988 233-241 Cheng P-C, Gligor VD
Journal Article A NEW SECURITY TESTING METHOD AND ITS APPLICATION TO THE SECURE XENIX KERNEL 1987 • IEEE Transactions on Software Engineering • 13(2):169-183 GLIGOR VD, CHANDERSEKARAN CS, JIANG WD, JOHRI A, LUCKENBAUGH GL, REICH LE
Conference COMPARATIVE ANALYSIS OF MULTIPROCESSOR SCHEDULING ALGORITHMS. 1987 • Distributed Computing Systems • 356-363 Lo SP, Gligor VD
Journal Article DESIGN AND IMPLEMENTATION OF SECURE XENIX 1987 • IEEE Transactions on Software Engineering • 13(2):208-221 GLIGOR VD, CHANDERSEKARAN CS, CHAPMAN RS, DOTTERER LJ, HECHT MS, JIANG WD, JOHRI A, LUCKENBAUGH GL, VASUDEVAN N
Conference PROPERTIES OF MULTIPROCESSOR SCHEDULING ALGORITHMS. 1987 • Proceedings of the International Conference on Parallel Processing • 867-870 Lo SP, Gligor VD
Conference NEW SECURITY TESTING METHOD AND ITS APPLICATION TO THE SECURE XENIX KERNEL. 1986 • Proceedings of the Symposium on Security and Privacy • 40-58 Gligor VD, Chandersekaran CS, Cheng W, Jiang WD, Johri A, Luckenbaugh GL, Reich LE
Conference ON THE DESIGN AND THE IMPLEMENTATION OF SECURE XENIX WORKSTATIONS. 1986 • Proceedings of the Symposium on Security and Privacy • 102-117 Gligor VD, Burch EL, Chandersekaran CS, Chapman RS, Dotterer LJ, Hecht MS, Jiang WD, Luckenbaugh GL, Vasudevan N
Journal Article Transaction management in distributed heterogeneous database management systems 1986 • Information Systems • 11(4):287-297 Gligor V, Popescu-Zeletin R
Conference CONCURRENCY CONTROL ISSUES IN DISTRIBUTED HETEROGENEOUS DATABASE MANAGEMENT SYSTEMS. 1985 43-56 Gligor VD, Popescu-Zeletin R
Journal Article A NOTE ON DENIAL-OF-SERVICE IN OPERATING-SYSTEMS 1984 • IEEE Transactions on Software Engineering • 10(3):320-324 GLIGOR VD
Journal Article INTERCONNECTING HETEROGENEOUS DATABASE-MANAGEMENT SYSTEMS 1984 • Computer • 17(1):33-43 GLIGOR VD, LUCKENBAUGH GL
Conference ASSESSMENT OF THE REAL-TIME REQUIREMENTS FOR PROGRAMMING ENVIRONMENTS AND LANGUAGES. 1983 3-19 Gligor VD, Luckenbaugh GL
Journal Article DISTRIBUTED DATABASE-MANAGEMENT SYSTEMS - AN ARCHITECTURAL PERSPECTIVE 1983 • JOURNAL OF TELECOMMUNICATION NETWORKS • 2(3):249-270 GLIGOR VD, FONG E
Conference NOTE ON THE DENIAL-OF-SERVICE PROBLEM. 1983 • Proceedings of the Symposium on Security and Privacy • 139-149 Gligor VD
Journal Article THE VERIFICATION OF THE PROTECTION MECHANISMS OF HIGH-LEVEL LANGUAGE MACHINES 1983 • International Journal of Parallel Programming • 12(4):211-246 GLIGOR VD
Journal Article Finding Augmented-Set Bases 1982 • SIAM journal on computing (Print) • 11(3):602-609 Gligor V, Maier D
Journal Article ON DEADLOCK DETECTION IN DISTRIBUTED SYSTEMS 1980 • IEEE Transactions on Software Engineering • 6(5):435-440 GLIGOR VD, SHATTUCK SH
Conference Architectural implications of abstract data type implementation 1979 • Proceedings / Annual International Symposium on Computer Architecture. International Symposium on Computer Architecture • 20-30 Gligor VD
Journal Article OBJECT MIGRATION AND AUTHENTICATION 1979 • IEEE Transactions on Software Engineering • 5(6):607-611 GLIGOR VD, LINDSAY BG
Journal Article REVIEW AND REVOCATION OF ACCESS PRIVILEGES DISTRIBUTED THROUGH CAPABILITIES 1979 • IEEE Transactions on Software Engineering • 5(6):575-586 GLIGOR VD
Journal Article REPRESENTING DATA BASES IN SEGMENTED NAME SPACES. 1978 • Proceedings of The Western Snow Conference • 295-317 Gligor V, Maier D
Conference A Formal Method for the Identification of Covert Storage Channels in Source Code • IEEE Security and Privacy • 74-74 Tsai C-R, Gligor VD, Chandersekaran CS
Conference A New Security Testing Method and its Application to the Secure Xenix Kernel • IEEE Security and Privacy • 40-40 Gligor VD, Chandersekaran CS, Cheng W, Jiang WD, Johri A, Luckenbaugh GL, Reich LE