1997 |
11 | | William D. Young,
William R. Bevier:
Mathematical Modeling and Analysis of an External Memory Manager.
FME 1997: 237-257 |
10 | | Richard L. Ford,
William R. Bevier,
Richard T. Simon,
Lawrence M. Smith:
The Specification-Based Testing of a Trusted Kernel: MK++.
ICFEM 1997: 151-160 |
1995 |
9 | EE | William R. Bevier,
Richard M. Cohen,
William D. Young:
Connection policies and controlled interference.
CSFW 1995: 167-176 |
8 | | William R. Bevier,
William D. Young:
A State-Machine Approach to Non-Interference.
Journal of Computer Security 3(1): 55-70 (1995) |
1994 |
7 | | William D. Young,
William R. Bevier:
A State-Based Approach to Non-Interference.
CSFW 1994: 11-21 |
1992 |
6 | | William R. Bevier,
William D. Young:
Machine Checked Proofs of the Design of a Fault-Tolerance Circuit.
Formal Asp. Comput. 4(6A): 755-775 (1992) |
1991 |
5 | | William R. Bevier,
Jørgen F. Søgaard-Andersen:
Mechanically Checked Proofs of Kernel Specification.
CAV 1991: 70-82 |
1989 |
4 | EE | William R. Bevier:
Kit: A Study in Operating System Verification.
IEEE Trans. Software Eng. 15(11): 1382-1396 (1989) |
3 | | William R. Bevier,
Warren A. Hunt Jr.,
J. Strother Moore,
William D. Young:
An Approach to Systems Verification.
J. Autom. Reasoning 5(4): 411-428 (1989) |
2 | | William R. Bevier:
Kit and the Short Stack.
J. Autom. Reasoning 5(4): 519-530 (1989) |
1987 |
1 | | William R. Bevier,
Warren A. Hunt Jr.,
William D. Young:
Toward Verified Execution Environments.
IEEE Symposium on Security and Privacy 1987: 106-115 |