Publications by <!-- THEME DEBUG --> <!-- THEME HOOK: 'views_view_field' --> <!-- 💡 BEGIN CUSTOM TEMPLATE OUTPUT from 'themes/custom/csd/templates/views/views-view-field.html.twig' --> Virgil Gligor <!-- END CUSTOM TEMPLATE OUTPUT from 'themes/custom/csd/templates/views/views-view-field.html.twig' -->

Conference

Information-flow analysis for covert-channel identification in multilevel secure operating systems

1990 • Proceedings of the Computer Security Foundations Workshop • 139-148
He J, Gligor VD

Conference

On replay detection in distributed systems

1990 • Distributed Computing Systems • 188-195
Luan SW, Gligor VD

Conference

BANDWIDTH COMPUTATION MODEL FOR COVERT STORAGE CHANNELS AND ITS APPLICATIONS.

1988 • Proceedings of the Symposium on Security and Privacy • 108-121
Tsai CR, Gligor VD

Conference

Fault-tolerant protocol for atomic broadcast

1988 • Proceedings - Symposium on Reliability in Distributed Software and Database Systems • 112-126
Luan SW, Gligor VD

Conference

FORMAL SPECIFICATION AND VERIFICATION METHOD FOR THE PREVENTION OF DENIAL OF SERVICE.

1988 • Proceedings of the Symposium on Security and Privacy • 187-202
Yu CF, Gligor VD

Conference

Model for secure distributed computations in a heterogeneous environment

1988 233-241
Cheng PC, Gligor VD

Conference

COMPARATIVE ANALYSIS OF MULTIPROCESSOR SCHEDULING ALGORITHMS.

1987 • Distributed Computing Systems • 356-363
Lo SP, Gligor VD

Conference

FORMAL METHOD FOR THE IDENTIFICATION OF COVERT STORAGE CHANNELS IN SOURCE CODE.

1987 • IEEE Security and Privacy • 74-86
Tsai CR, Gligor VD, Chandersekaran CS

Conference

PROPERTIES OF MULTIPROCESSOR SCHEDULING ALGORITHMS.

1987 • Proceedings of the International Conference on Parallel Processing • 867-870
Lo SP, Gligor VD

Conference

NEW SECURITY TESTING METHOD AND ITS APPLICATION TO THE SECURE XENIX KERNEL.

1986 • Proceedings of the Symposium on Security and Privacy • 40-58
Gligor VD, Chandersekaran CS, Cheng W, Jiang WD, Johri A, Luckenbaugh GL, Reich LE

Conference

ON THE DESIGN AND THE IMPLEMENTATION OF SECURE XENIX WORKSTATIONS.

1986 • Proceedings of the Symposium on Security and Privacy • 102-117
Gligor VD, Burch EL, Chandersekaran CS, Chapman RS, Dotterer LJ, Hecht MS, Jiang WD, Luckenbaugh GL, Vasudevan N

Conference

CONCURRENCY CONTROL ISSUES IN DISTRIBUTED HETEROGENEOUS DATABASE MANAGEMENT SYSTEMS.

1985 43-56
Gligor VD, Popescu-Zeletin R

Conference

ASSESSMENT OF THE REAL-TIME REQUIREMENTS FOR PROGRAMMING ENVIRONMENTS AND LANGUAGES.

1983 3-19
Gligor VD, Luckenbaugh GL
Displaying 201 - 225 of 234