Search
for Author
All Reviews
Gligor, Virgil
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
3
of
3
reviews
Design and implementation of Secure Xenix
Gligor V., Chandersekaran C., Chapman R. (ed), Dotterer L., Hecht M., Jiang W., Johri A., Luckenbaugh G., Vasudevan N. IEEE Transactions on Software Engineering SE-13(2): 208-220, 1987. Type: Article
This research paper describes the modifications made to Xenix to provide a more secure operating system. It lays out the design considerations involved and how these affect the modifications to the computer. The abstract details are bu...
...
Nov 1 1987
A new security testing method and its application to the Secure Xenix Kernel
Gligor V., Chandersekaran C., Jiang W., Johri A., Luckenbaugh G., Reich L. IEEE Transactions on Software Engineering SE-13(2): 169-183, 1987. Type: Article
This paper describes a set of principles and methods for validating, via testing, security properties of a security kernel. A basic objective is to reduce the number of tests needed by combining the advantages of “black-box&a...
...
Oct 1 1987
The verification of the protection mechanisms of high-level language machines
Gligor V. International Journal of Parallel Programming 12(4): 211-246, 1983. Type: Article
This paper discusses a methodology for the (informal) verification of processor-supported protection mechanisms of high-level language architectures (e.g., INTEL iAPX 432). The methodology takes an abstract model representation of t...
...
Feb 1 1985
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy