2009 |
61 | EE | Mark Reith,
Jianwei Niu,
William H. Winsborough:
Toward practical analysis for trust management policy.
ASIACCS 2009: 310-321 |
60 | EE | Ram Krishnan,
Ravi S. Sandhu,
Jianwei Niu,
William H. Winsborough:
A conceptual framework for Group-Centric secure information sharing.
ASIACCS 2009: 384-387 |
2008 |
59 | EE | Sruthi Bandhakavi,
William H. Winsborough,
Marianne Winslett:
A Trust Management Approach for Flexible Policy Management in Security-Typed Languages.
CSF 2008: 33-47 |
58 | EE | Ram Krishnan,
Jianwei Niu,
Ravi S. Sandhu,
William H. Winsborough:
Stale-safe security properties for group-based secure information sharing.
FMSE 2008: 53-62 |
57 | EE | Mark Reith,
Jianwei Niu,
William H. Winsborough:
Role-based trust management security policy analysis and correction environment (RT-SPACE).
ICSE Companion 2008: 929-930 |
56 | EE | Keith Irwin,
Ting Yu,
William H. Winsborough:
Enforcing security properties in task-based systems.
SACMAT 2008: 41-50 |
55 | EE | Timothy W. Finin,
Anupam Joshi,
Lalana Kagal,
Jianwei Niu,
Ravi S. Sandhu,
William H. Winsborough,
Bhavani M. Thuraisingham:
ROWLBAC: representing role based access control in OWL.
SACMAT 2008: 73-82 |
54 | EE | Keith Irwin,
Ting Yu,
William H. Winsborough:
Avoiding information leakage in security-policy-aware planning.
WPES 2008: 85-94 |
53 | EE | S. Jha,
Ninghui Li,
Mahesh V. Tripunitara,
Qihua Wang,
William H. Winsborough:
Towards Formal Verification of Role-Based Access Control Policies.
IEEE Trans. Dependable Sec. Comput. 5(4): 242-255 (2008) |
2007 |
52 | EE | Marcin Czenko,
Sandro Etalle,
Dongyi Li,
William H. Winsborough:
An Introduction to the Role Based Trust Management Framework RT.
FOSAD 2007: 246-281 |
51 | EE | Mark Reith,
Jianwei Niu,
William H. Winsborough:
Apply Model Checking to Security Analysis in Trust Management.
ICDE Workshops 2007: 734-743 |
50 | EE | Sruthi Bandhakavi,
William H. Winsborough,
Marianne Winslett:
Informal presentation: a trust management perspective on managing policy updates in security-typed languages.
PLAS 2007: 73-74 |
49 | EE | Sandro Etalle,
William H. Winsborough:
A posteriori compliance control.
SACMAT 2007: 11-20 |
48 | EE | William H. Winsborough,
Anna Cinzia Squicciarini,
Elisa Bertino:
Information carrying identity proof trees.
WPES 2007: 76-79 |
2006 |
47 | | Ketil Stølen,
William H. Winsborough,
Fabio Martinelli,
Fabio Massacci:
Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings
Springer 2006 |
46 | EE | Keith Irwin,
Ting Yu,
William H. Winsborough:
On the modeling and analysis of obligations.
ACM Conference on Computer and Communications Security 2006: 134-143 |
45 | EE | Saket Kaushik,
William H. Winsborough,
Duminda Wijesekera,
Paul Ammann:
Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems.
DBSec 2006: 163-178 |
44 | EE | Ziqing Mao,
Ninghui Li,
William H. Winsborough:
Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper).
ICICS 2006: 159-173 |
43 | EE | William H. Winsborough,
Ninghui Li:
Safety in automated trust negotiation.
ACM Trans. Inf. Syst. Secur. 9(3): 352-390 (2006) |
2005 |
42 | EE | Jiangtao Li,
Ninghui Li,
William H. Winsborough:
Automated trust negotiation using cryptographic credentials.
ACM Conference on Computer and Communications Security 2005: 46-57 |
41 | EE | Saket Kaushik,
William H. Winsborough,
Duminda Wijesekera,
Paul Ammann:
Email feedback: a policy-based approach to overcoming false positives.
FMSE 2005: 73-82 |
40 | EE | Sandro Etalle,
William H. Winsborough:
Integrity constraints in trust management.
SACMAT 2005: 1-10 |
39 | EE | Danfeng Yao,
Michael Shin,
Roberto Tamassia,
William H. Winsborough:
Visualization of Automated Trust Negotiation.
VizSEC 2005: 8 |
38 | EE | Sandro Etalle,
William H. Winsborough:
Integrity Constraints in Trust Management
CoRR abs/cs/0503061: (2005) |
37 | EE | Ninghui Li,
John C. Mitchell,
William H. Winsborough:
Beyond proof-of-compliance: security analysis in trust management.
J. ACM 52(3): 474-514 (2005) |
2004 |
36 | EE | William H. Winsborough,
Ninghui Li:
Safety in Automated Trust Negotiation.
IEEE Symposium on Security and Privacy 2004: 147-160 |
35 | EE | Saket Kaushik,
Paul Ammann,
Duminda Wijesekera,
William H. Winsborough,
Ronald W. Ritchey:
A Policy Driven Approach to Email Services.
POLICY 2004: 169- |
34 | EE | Roberto Tamassia,
Danfeng Yao,
William H. Winsborough:
Role-based cascaded delegation.
SACMAT 2004: 146-155 |
2003 |
33 | EE | William H. Winsborough,
Jay Jacobs:
Automated Trust Negotiation in Attribute-based Access Control.
DISCEX (2) 2003: 252- |
32 | EE | William H. Winsborough,
Jay Jacobs:
Automated Trust Negotiation Technology with Attribute-based Access Control.
DISCEX (2) 2003: 60- |
31 | EE | William H. Winsborough:
A Logic Programming View of Authorization in Distributed Systems.
ICLP 2003: 20-46 |
30 | EE | Ninghui Li,
William H. Winsborough,
John C. Mitchell:
Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management.
IEEE Symposium on Security and Privacy 2003: 123-139 |
29 | EE | Michael T. Goodrich,
Michael Shin,
Roberto Tamassia,
William H. Winsborough:
Authenticated Dictionaries for Fresh Attribute Credentials.
iTrust 2003: 332-347 |
28 | | Ninghui Li,
William H. Winsborough,
John C. Mitchell:
Distributed Credential Chain Discovery in Trust Management.
Journal of Computer Security 11(1): 35-86 (2003) |
2002 |
27 | EE | Ninghui Li,
John C. Mitchell,
William H. Winsborough:
Design of a Role-Based Trust-Management Framework.
IEEE Symposium on Security and Privacy 2002: 114-130 |
26 | EE | William H. Winsborough,
Ninghui Li:
Towards Practical Automated Trust Negotiation.
POLICY 2002: 92-103 |
25 | EE | Eve Cohen,
Roshan K. Thomas,
William H. Winsborough,
Deborah Shands:
Models for coalition-based access control (CBAC).
SACMAT 2002: 97-106 |
24 | EE | William H. Winsborough,
Ninghui Li:
Protecting sensitive attributes in automated trust negotiation.
WPES 2002: 41-51 |
2001 |
23 | EE | Ninghui Li,
William H. Winsborough,
John C. Mitchell:
Distributed credential chain discovery in trust management: extended abstract.
ACM Conference on Computer and Communications Security 2001: 156-165 |
2000 |
22 | | Moreno Falaschi,
Patrick Hicks,
William H. Winsborough:
Demand Transformation Analysis for Concurrent Constraint Programs.
J. Log. Program. 42(3): 185-215 (2000) |
1999 |
21 | EE | Gudjon Gudjonsson,
William H. Winsborough:
Compile-time memory reuse in logic programming languages through update in place.
ACM Trans. Program. Lang. Syst. 21(3): 430-501 (1999) |
1998 |
20 | EE | Agostino Cortesi,
Gilberto Filé,
William H. Winsborough:
The Quotient of an Abstract Interpretation.
Theor. Comput. Sci. 202(1-2): 163-192 (1998) |
1997 |
19 | | Kent E. Seamons,
William H. Winsborough,
Marianne Winslett:
Internet Credential Acceptance Policies.
APPIA-GULP-PRODE 1997: 415-432 |
18 | | Michael Codish,
Moreno Falaschi,
Kim Marriott,
William H. Winsborough:
A Confluent Semantic Basis for the Analysis of Concurrent Constraint Logic Programs.
J. Log. Program. 30(1): 53-81 (1997) |
1996 |
17 | | Moreno Falaschi,
Patrick Hicks,
William H. Winsborough:
Demand Transformation Analysis for Concurrent Constraint Programs.
JICSLP 1996: 333-347 |
16 | | Geoffrey Weyer,
William H. Winsborough:
Annotated Structure Shape Graphs for Abstract Analysis of Prolog.
PLILP 1996: 92-106 |
15 | | Agostino Cortesi,
Gilberto Filé,
William H. Winsborough:
Optimal Groundness Analysis Using Propositional Logic.
J. Log. Program. 27(2): 137-167 (1996) |
1994 |
14 | | Agostino Cortesi,
Gilberto Filé,
William H. Winsborough:
The Quotient of an Abstract Interpretation for Comparing Static Analyses.
GULP-PRODE (1) 1994: 372-387 |
13 | EE | Anne Mulkers,
William H. Winsborough,
Maurice Bruynooghe:
Live-Structure Dataflow Analysis for Prolog.
ACM Trans. Program. Lang. Syst. 16(2): 205-258 (1994) |
1993 |
12 | | Michael Codish,
Moreno Falaschi,
Kim Marriott,
William H. Winsborough:
Efficient Analysis of Concurrent Constraint Logic Programs.
ICALP 1993: 633-644 |
11 | | Gudjon Gudjonsson,
William H. Winsborough:
Update In Place: Overview of the Siva Project.
ILPS 1993: 94-113 |
1992 |
10 | | Agostino Cortesi,
Gilberto Filé,
William H. Winsborough:
Comparison of Abstract Interpretations.
ICALP 1992: 521-532 |
9 | | Michael Codish,
Moreno Falaschi,
Kim Marriott,
William H. Winsborough:
Efficient Analysis of Reactive Properties of Concurrent Constraint Logic Programs.
WSA 1992: 35-42 |
8 | | William H. Winsborough:
Multiple Specialization using Minimal-Function Graph Semantics.
J. Log. Program. 13(2&3): 259-290 (1992) |
1991 |
7 | | Ian T. Foster,
William H. Winsborough:
Copy Avoidance through Compile-Time Analysis and Local Reuse.
ISLP 1991: 455-469 |
6 | | Agostino Cortesi,
Gilberto Filé,
William H. Winsborough:
Prop revisited: Propositional Formula as Abstract Domain for Groundness Analysis
LICS 1991: 322-327 |
1990 |
5 | | Dean Jacobs,
Anno Langen,
William H. Winsborough:
Multiple Specialization of Logic Programs with Run-Time Test.
ICLP 1990: 717-731 |
4 | | Anne Mulkers,
William H. Winsborough,
Maurice Bruynooghe:
Analysis of Shared Data Structures for Compile-Time Garbage.
ICLP 1990: 747-762 |
1989 |
3 | | William H. Winsborough:
Path-Dependent Reachability Analysis for Multiple Specialization.
NACLP 1989: 133-153 |
1988 |
2 | | William H. Winsborough,
Annika Wærn:
Transparent And-Parallelism in the Presence of Shared Free Variables.
ICLP/SLP 1988: 749-764 |
1987 |
1 | | William H. Winsborough:
Semantically Transparent Selective Reset for AND Parallel Interpreters Based on the Origin of Failures.
SLP 1987: 134-152 |