| 1997 |
| 11 | | William D. Young,
William R. Bevier:
Mathematical Modeling and Analysis of an External Memory Manager.
FME 1997: 237-257 |
| 10 | | Richard L. Ford,
William R. Bevier,
Richard T. Simon,
Lawrence M. Smith:
The Specification-Based Testing of a Trusted Kernel: MK++.
ICFEM 1997: 151-160 |
| 1995 |
| 9 | EE | William R. Bevier,
Richard M. Cohen,
William D. Young:
Connection policies and controlled interference.
CSFW 1995: 167-176 |
| 8 | | William R. Bevier,
William D. Young:
A State-Machine Approach to Non-Interference.
Journal of Computer Security 3(1): 55-70 (1995) |
| 1994 |
| 7 | | William D. Young,
William R. Bevier:
A State-Based Approach to Non-Interference.
CSFW 1994: 11-21 |
| 1992 |
| 6 | | William R. Bevier,
William D. Young:
Machine Checked Proofs of the Design of a Fault-Tolerance Circuit.
Formal Asp. Comput. 4(6A): 755-775 (1992) |
| 1991 |
| 5 | | William R. Bevier,
Jørgen F. Søgaard-Andersen:
Mechanically Checked Proofs of Kernel Specification.
CAV 1991: 70-82 |
| 1989 |
| 4 | EE | William R. Bevier:
Kit: A Study in Operating System Verification.
IEEE Trans. Software Eng. 15(11): 1382-1396 (1989) |
| 3 | | William R. Bevier,
Warren A. Hunt Jr.,
J. Strother Moore,
William D. Young:
An Approach to Systems Verification.
J. Autom. Reasoning 5(4): 411-428 (1989) |
| 2 | | William R. Bevier:
Kit and the Short Stack.
J. Autom. Reasoning 5(4): 519-530 (1989) |
| 1987 |
| 1 | | William R. Bevier,
Warren A. Hunt Jr.,
William D. Young:
Toward Verified Execution Environments.
IEEE Symposium on Security and Privacy 1987: 106-115 |