Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Gligor, Virgil Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 3 of 3 reviews    
  Design and implementation of Secure Xenix
Gligor V., Chandersekaran C., Chapman R. (ed), Dotterer L., Hecht M., Jiang W., Johri A., Luckenbaugh G., Vasudevan N. IEEE Transactions on Software Engineering SE-13(2): 208-220, 1987.  Type: Article

This research paper describes the modifications made to Xenix to provide a more secure operating system. It lays out the design considerations involved and how these affect the modifications to the computer. The abstract details are bu...
...
Nov 1 1987  
  A new security testing method and its application to the Secure Xenix Kernel
Gligor V., Chandersekaran C., Jiang W., Johri A., Luckenbaugh G., Reich L. IEEE Transactions on Software Engineering SE-13(2): 169-183, 1987.  Type: Article

This paper describes a set of principles and methods for validating, via testing, security properties of a security kernel. A basic objective is to reduce the number of tests needed by combining the advantages of “black-box&a...
...
Oct 1 1987  
  The verification of the protection mechanisms of high-level language machines
Gligor V. International Journal of Parallel Programming 12(4): 211-246, 1983.  Type: Article

This paper discusses a methodology for the (informal) verification of processor-supported protection mechanisms of high-level language architectures (e.g., INTEL iAPX 432). The methodology takes an abstract model representation of t...
...
Feb 1 1985  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy