dblp.uni-trier.dewww.uni-trier.de

William D. Young

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2006
20EEDavid S. Hardin, Eric W. Smith, William D. Young: A robust machine code proof framework for highly secure applications. ACL2 2006: 11-20
2005
19EEWilliam D. Young: Introducing Abstractions via Rewriting. CHARME 2005: 402-405
1997
18 William D. Young, William R. Bevier: Mathematical Modeling and Analysis of an External Memory Manager. FME 1997: 237-257
17EEWilliam D. Young: Comparing Verification Systems: Interactive Consistency in ACL2. IEEE Trans. Software Eng. 23(4): 214-223 (1997)
1995
16EEWilliam R. Bevier, Richard M. Cohen, William D. Young: Connection policies and controlled interference. CSFW 1995: 167-176
15 William R. Bevier, William D. Young: A State-Machine Approach to Non-Interference. Journal of Computer Security 3(1): 55-70 (1995)
1994
14 William D. Young, William R. Bevier: A State-Based Approach to Non-Interference. CSFW 1994: 11-21
1992
13 Bishop Brock, Warren A. Hunt Jr., William D. Young: Introduction to a Formally Defined Hardware Description Language. TPCD 1992: 3-35
12 William R. Bevier, William D. Young: Machine Checked Proofs of the Design of a Fault-Tolerance Circuit. Formal Asp. Comput. 4(6A): 755-775 (1992)
1991
11EEWilliam D. Young: Formal Methods versus Software Engineering: Is There a Conflict? Symposium on Testing, Analysis, and Verification 1991: 188-189
10 Donald I. Good, William D. Young: Mathematical Methods for Digital Systems Development. VDM Europe (2) 1991: 406-430
1989
9EEWilliam D. Young: Verified Compilation in micro-Gypsy. Symposium on Testing, Analysis, and Verification 1989: 20-26
8 William R. Bevier, Warren A. Hunt Jr., J. Strother Moore, William D. Young: An Approach to Systems Verification. J. Autom. Reasoning 5(4): 411-428 (1989)
7 William D. Young: A Mechanically Verified Code Generator. J. Autom. Reasoning 5(4): 493-518 (1989)
1987
6 William R. Bevier, Warren A. Hunt Jr., William D. Young: Toward Verified Execution Environments. IEEE Symposium on Security and Privacy 1987: 106-115
5 William D. Young, John McHugh: Coding for a Believable Specification to Implementation Mapping. IEEE Symposium on Security and Privacy 1987: 140-149
4 J. Thomas Haigh, William D. Young: Extending the Noninterference Version of MLS for SAT. IEEE Trans. Software Eng. 13(2): 141-150 (1987)
3 J. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young: An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. IEEE Trans. Software Eng. 13(2): 157-168 (1987)
1986
2 J. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young: An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. IEEE Symposium on Security and Privacy 1986: 14-24
1 J. Thomas Haigh, William D. Young: Extending the Non-Interference Version of MLS for SAT. IEEE Symposium on Security and Privacy 1986: 60-60

Coauthor Index

1William R. Bevier [6] [8] [12] [14] [15] [16] [18]
2Bishop Brock [13]
3Richard M. Cohen [16]
4Donald I. Good [10]
5J. Thomas Haigh [1] [2] [3] [4]
6David S. Hardin [20]
7Warren A. Hunt Jr. [6] [8] [13]
8Richard A. Kemmerer [2] [3]
9John McHugh [2] [3] [5]
10J. Strother Moore [8]
11Eric W. Smith [20]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)