2009 | ||
---|---|---|
61 | EE | Mark Reith, Jianwei Niu, William H. Winsborough: Toward practical analysis for trust management policy. ASIACCS 2009: 310-321 |
60 | EE | Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough: A conceptual framework for Group-Centric secure information sharing. ASIACCS 2009: 384-387 |
2008 | ||
59 | EE | Sruthi Bandhakavi, William H. Winsborough, Marianne Winslett: A Trust Management Approach for Flexible Policy Management in Security-Typed Languages. CSF 2008: 33-47 |
58 | EE | Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough: Stale-safe security properties for group-based secure information sharing. FMSE 2008: 53-62 |
57 | EE | Mark Reith, Jianwei Niu, William H. Winsborough: Role-based trust management security policy analysis and correction environment (RT-SPACE). ICSE Companion 2008: 929-930 |
56 | EE | Keith Irwin, Ting Yu, William H. Winsborough: Enforcing security properties in task-based systems. SACMAT 2008: 41-50 |
55 | EE | Timothy W. Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough, Bhavani M. Thuraisingham: ROWLBAC: representing role based access control in OWL. SACMAT 2008: 73-82 |
54 | EE | Keith Irwin, Ting Yu, William H. Winsborough: Avoiding information leakage in security-policy-aware planning. WPES 2008: 85-94 |
53 | EE | S. Jha, Ninghui Li, Mahesh V. Tripunitara, Qihua Wang, William H. Winsborough: Towards Formal Verification of Role-Based Access Control Policies. IEEE Trans. Dependable Sec. Comput. 5(4): 242-255 (2008) |
2007 | ||
52 | EE | Marcin Czenko, Sandro Etalle, Dongyi Li, William H. Winsborough: An Introduction to the Role Based Trust Management Framework RT. FOSAD 2007: 246-281 |
51 | EE | Mark Reith, Jianwei Niu, William H. Winsborough: Apply Model Checking to Security Analysis in Trust Management. ICDE Workshops 2007: 734-743 |
50 | EE | Sruthi Bandhakavi, William H. Winsborough, Marianne Winslett: Informal presentation: a trust management perspective on managing policy updates in security-typed languages. PLAS 2007: 73-74 |
49 | EE | Sandro Etalle, William H. Winsborough: A posteriori compliance control. SACMAT 2007: 11-20 |
48 | EE | William H. Winsborough, Anna Cinzia Squicciarini, Elisa Bertino: Information carrying identity proof trees. WPES 2007: 76-79 |
2006 | ||
47 | Ketil Stølen, William H. Winsborough, Fabio Martinelli, Fabio Massacci: Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings Springer 2006 | |
46 | EE | Keith Irwin, Ting Yu, William H. Winsborough: On the modeling and analysis of obligations. ACM Conference on Computer and Communications Security 2006: 134-143 |
45 | EE | Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann: Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems. DBSec 2006: 163-178 |
44 | EE | Ziqing Mao, Ninghui Li, William H. Winsborough: Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper). ICICS 2006: 159-173 |
43 | EE | William H. Winsborough, Ninghui Li: Safety in automated trust negotiation. ACM Trans. Inf. Syst. Secur. 9(3): 352-390 (2006) |
2005 | ||
42 | EE | Jiangtao Li, Ninghui Li, William H. Winsborough: Automated trust negotiation using cryptographic credentials. ACM Conference on Computer and Communications Security 2005: 46-57 |
41 | EE | Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann: Email feedback: a policy-based approach to overcoming false positives. FMSE 2005: 73-82 |
40 | EE | Sandro Etalle, William H. Winsborough: Integrity constraints in trust management. SACMAT 2005: 1-10 |
39 | EE | Danfeng Yao, Michael Shin, Roberto Tamassia, William H. Winsborough: Visualization of Automated Trust Negotiation. VizSEC 2005: 8 |
38 | EE | Sandro Etalle, William H. Winsborough: Integrity Constraints in Trust Management CoRR abs/cs/0503061: (2005) |
37 | EE | Ninghui Li, John C. Mitchell, William H. Winsborough: Beyond proof-of-compliance: security analysis in trust management. J. ACM 52(3): 474-514 (2005) |
2004 | ||
36 | EE | William H. Winsborough, Ninghui Li: Safety in Automated Trust Negotiation. IEEE Symposium on Security and Privacy 2004: 147-160 |
35 | EE | Saket Kaushik, Paul Ammann, Duminda Wijesekera, William H. Winsborough, Ronald W. Ritchey: A Policy Driven Approach to Email Services. POLICY 2004: 169- |
34 | EE | Roberto Tamassia, Danfeng Yao, William H. Winsborough: Role-based cascaded delegation. SACMAT 2004: 146-155 |
2003 | ||
33 | EE | William H. Winsborough, Jay Jacobs: Automated Trust Negotiation in Attribute-based Access Control. DISCEX (2) 2003: 252- |
32 | EE | William H. Winsborough, Jay Jacobs: Automated Trust Negotiation Technology with Attribute-based Access Control. DISCEX (2) 2003: 60- |
31 | EE | William H. Winsborough: A Logic Programming View of Authorization in Distributed Systems. ICLP 2003: 20-46 |
30 | EE | Ninghui Li, William H. Winsborough, John C. Mitchell: Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management. IEEE Symposium on Security and Privacy 2003: 123-139 |
29 | EE | Michael T. Goodrich, Michael Shin, Roberto Tamassia, William H. Winsborough: Authenticated Dictionaries for Fresh Attribute Credentials. iTrust 2003: 332-347 |
28 | Ninghui Li, William H. Winsborough, John C. Mitchell: Distributed Credential Chain Discovery in Trust Management. Journal of Computer Security 11(1): 35-86 (2003) | |
2002 | ||
27 | EE | Ninghui Li, John C. Mitchell, William H. Winsborough: Design of a Role-Based Trust-Management Framework. IEEE Symposium on Security and Privacy 2002: 114-130 |
26 | EE | William H. Winsborough, Ninghui Li: Towards Practical Automated Trust Negotiation. POLICY 2002: 92-103 |
25 | EE | Eve Cohen, Roshan K. Thomas, William H. Winsborough, Deborah Shands: Models for coalition-based access control (CBAC). SACMAT 2002: 97-106 |
24 | EE | William H. Winsborough, Ninghui Li: Protecting sensitive attributes in automated trust negotiation. WPES 2002: 41-51 |
2001 | ||
23 | EE | Ninghui Li, William H. Winsborough, John C. Mitchell: Distributed credential chain discovery in trust management: extended abstract. ACM Conference on Computer and Communications Security 2001: 156-165 |
2000 | ||
22 | Moreno Falaschi, Patrick Hicks, William H. Winsborough: Demand Transformation Analysis for Concurrent Constraint Programs. J. Log. Program. 42(3): 185-215 (2000) | |
1999 | ||
21 | EE | Gudjon Gudjonsson, William H. Winsborough: Compile-time memory reuse in logic programming languages through update in place. ACM Trans. Program. Lang. Syst. 21(3): 430-501 (1999) |
1998 | ||
20 | EE | Agostino Cortesi, Gilberto Filé, William H. Winsborough: The Quotient of an Abstract Interpretation. Theor. Comput. Sci. 202(1-2): 163-192 (1998) |
1997 | ||
19 | Kent E. Seamons, William H. Winsborough, Marianne Winslett: Internet Credential Acceptance Policies. APPIA-GULP-PRODE 1997: 415-432 | |
18 | Michael Codish, Moreno Falaschi, Kim Marriott, William H. Winsborough: A Confluent Semantic Basis for the Analysis of Concurrent Constraint Logic Programs. J. Log. Program. 30(1): 53-81 (1997) | |
1996 | ||
17 | Moreno Falaschi, Patrick Hicks, William H. Winsborough: Demand Transformation Analysis for Concurrent Constraint Programs. JICSLP 1996: 333-347 | |
16 | Geoffrey Weyer, William H. Winsborough: Annotated Structure Shape Graphs for Abstract Analysis of Prolog. PLILP 1996: 92-106 | |
15 | Agostino Cortesi, Gilberto Filé, William H. Winsborough: Optimal Groundness Analysis Using Propositional Logic. J. Log. Program. 27(2): 137-167 (1996) | |
1994 | ||
14 | Agostino Cortesi, Gilberto Filé, William H. Winsborough: The Quotient of an Abstract Interpretation for Comparing Static Analyses. GULP-PRODE (1) 1994: 372-387 | |
13 | EE | Anne Mulkers, William H. Winsborough, Maurice Bruynooghe: Live-Structure Dataflow Analysis for Prolog. ACM Trans. Program. Lang. Syst. 16(2): 205-258 (1994) |
1993 | ||
12 | Michael Codish, Moreno Falaschi, Kim Marriott, William H. Winsborough: Efficient Analysis of Concurrent Constraint Logic Programs. ICALP 1993: 633-644 | |
11 | Gudjon Gudjonsson, William H. Winsborough: Update In Place: Overview of the Siva Project. ILPS 1993: 94-113 | |
1992 | ||
10 | Agostino Cortesi, Gilberto Filé, William H. Winsborough: Comparison of Abstract Interpretations. ICALP 1992: 521-532 | |
9 | Michael Codish, Moreno Falaschi, Kim Marriott, William H. Winsborough: Efficient Analysis of Reactive Properties of Concurrent Constraint Logic Programs. WSA 1992: 35-42 | |
8 | William H. Winsborough: Multiple Specialization using Minimal-Function Graph Semantics. J. Log. Program. 13(2&3): 259-290 (1992) | |
1991 | ||
7 | Ian T. Foster, William H. Winsborough: Copy Avoidance through Compile-Time Analysis and Local Reuse. ISLP 1991: 455-469 | |
6 | Agostino Cortesi, Gilberto Filé, William H. Winsborough: Prop revisited: Propositional Formula as Abstract Domain for Groundness Analysis LICS 1991: 322-327 | |
1990 | ||
5 | Dean Jacobs, Anno Langen, William H. Winsborough: Multiple Specialization of Logic Programs with Run-Time Test. ICLP 1990: 717-731 | |
4 | Anne Mulkers, William H. Winsborough, Maurice Bruynooghe: Analysis of Shared Data Structures for Compile-Time Garbage. ICLP 1990: 747-762 | |
1989 | ||
3 | William H. Winsborough: Path-Dependent Reachability Analysis for Multiple Specialization. NACLP 1989: 133-153 | |
1988 | ||
2 | William H. Winsborough, Annika Wærn: Transparent And-Parallelism in the Presence of Shared Free Variables. ICLP/SLP 1988: 749-764 | |
1987 | ||
1 | William H. Winsborough: Semantically Transparent Selective Reset for AND Parallel Interpreters Based on the Origin of Failures. SLP 1987: 134-152 |