2009 | ||
---|---|---|
62 | Mark Reith, Jianwei Niu, William H. Winsborough: Toward practical analysis for trust management policy. ASIACCS 2009: 310-321 | |
61 | Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough: A conceptual framework for Group-Centric secure information sharing. ASIACCS 2009: 384-387 | |
60 | Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough: Foundations for group-centric secure information sharing models. SACMAT 2009: 115-124 | |
2008 | ||
59 | Sruthi Bandhakavi, William H. Winsborough, Marianne Winslett: A Trust Management Approach for Flexible Policy Management in Security-Typed Languages. CSF 2008: 33-47 | |
58 | Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough: Stale-safe security properties for group-based secure information sharing. FMSE 2008: 53-62 | |
57 | Mark Reith, Jianwei Niu, William H. Winsborough: Role-based trust management security policy analysis and correction environment (RT-SPACE). ICSE Companion 2008: 929-930 | |
56 | Keith Irwin, Ting Yu, William H. Winsborough: Enforcing security properties in task-based systems. SACMAT 2008: 41-50 | |
55 | Timothy W. Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough, Bhavani M. Thuraisingham: ROWLBAC: representing role based access control in OWL. SACMAT 2008: 73-82 | |
54 | Keith Irwin, Ting Yu, William H. Winsborough: Avoiding information leakage in security-policy-aware planning. WPES 2008: 85-94 | |
53 | S. Jha, Ninghui Li, Mahesh V. Tripunitara, Qihua Wang, William H. Winsborough: Towards Formal Verification of Role-Based Access Control Policies. IEEE Trans. Dependable Sec. Comput. 5(4): 242-255 (2008) | |
2007 | ||
52 | Marcin Czenko, Sandro Etalle, Dongyi Li, William H. Winsborough: An Introduction to the Role Based Trust Management Framework RT. FOSAD 2007: 246-281 | |
51 | Mark Reith, Jianwei Niu, William H. Winsborough: Apply Model Checking to Security Analysis in Trust Management. ICDE Workshops 2007: 734-743 | |
50 | Sruthi Bandhakavi, William H. Winsborough, Marianne Winslett: Informal presentation: a trust management perspective on managing policy updates in security-typed languages. PLAS 2007: 73-74 | |
49 | Sandro Etalle, William H. Winsborough: A posteriori compliance control. SACMAT 2007: 11-20 | |
48 | William H. Winsborough, Anna Cinzia Squicciarini, Elisa Bertino: Information carrying identity proof trees. WPES 2007: 76-79 | |
2006 | ||
47 | Ketil Stølen, William H. Winsborough, Fabio Martinelli, Fabio Massacci: Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings Springer 2006 | |
46 | Keith Irwin, Ting Yu, William H. Winsborough: On the modeling and analysis of obligations. ACM Conference on Computer and Communications Security 2006: 134-143 | |
45 | Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann: Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems. DBSec 2006: 163-178 | |
44 | Ziqing Mao, Ninghui Li, William H. Winsborough: Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper). ICICS 2006: 159-173 | |
43 | William H. Winsborough, Ninghui Li: Safety in automated trust negotiation. ACM Trans. Inf. Syst. Secur. 9(3): 352-390 (2006) | |
2005 | ||
42 | Jiangtao Li, Ninghui Li, William H. Winsborough: Automated trust negotiation using cryptographic credentials. ACM Conference on Computer and Communications Security 2005: 46-57 | |
41 | Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann: Email feedback: a policy-based approach to overcoming false positives. FMSE 2005: 73-82 | |
40 | Sandro Etalle, William H. Winsborough: Integrity constraints in trust management. SACMAT 2005: 1-10 | |
39 | Danfeng Yao, Michael Shin, Roberto Tamassia, William H. Winsborough: Visualization of Automated Trust Negotiation. VizSEC 2005: 8 | |
38 | Sandro Etalle, William H. Winsborough: Integrity Constraints in Trust Management CoRR abs/cs/0503061: (2005) | |
37 | Ninghui Li, John C. Mitchell, William H. Winsborough: Beyond proof-of-compliance: security analysis in trust management. J. ACM 52(3): 474-514 (2005) | |
2004 | ||
36 | William H. Winsborough, Ninghui Li: Safety in Automated Trust Negotiation. IEEE Symposium on Security and Privacy 2004: 147-160 | |
35 | Saket Kaushik, Paul Ammann, Duminda Wijesekera, William H. Winsborough, Ronald W. Ritchey: A Policy Driven Approach to Email Services. POLICY 2004: 169- | |
34 | Roberto Tamassia, Danfeng Yao, William H. Winsborough: Role-based cascaded delegation. SACMAT 2004: 146-155 | |
2003 | ||
33 | William H. Winsborough, Jay Jacobs: Automated Trust Negotiation in Attribute-based Access Control. DISCEX (2) 2003: 252- | |
32 | William H. Winsborough, Jay Jacobs: Automated Trust Negotiation Technology with Attribute-based Access Control. DISCEX (2) 2003: 60- | |
31 | William H. Winsborough: A Logic Programming View of Authorization in Distributed Systems. ICLP 2003: 20-46 | |
30 | Ninghui Li, William H. Winsborough, John C. Mitchell: Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management. IEEE Symposium on Security and Privacy 2003: 123-139 | |
29 | Michael T. Goodrich, Michael Shin, Roberto Tamassia, William H. Winsborough: Authenticated Dictionaries for Fresh Attribute Credentials. iTrust 2003: 332-347 | |
28 | Ninghui Li, William H. Winsborough, John C. Mitchell: Distributed Credential Chain Discovery in Trust Management. Journal of Computer Security 11(1): 35-86 (2003) | |
2002 | ||
27 | Ninghui Li, John C. Mitchell, William H. Winsborough: Design of a Role-Based Trust-Management Framework. IEEE Symposium on Security and Privacy 2002: 114-130 | |
26 | William H. Winsborough, Ninghui Li: Towards Practical Automated Trust Negotiation. POLICY 2002: 92-103 | |
25 | Eve Cohen, Roshan K. Thomas, William H. Winsborough, Deborah Shands: Models for coalition-based access control (CBAC). SACMAT 2002: 97-106 | |
24 | William H. Winsborough, Ninghui Li: Protecting sensitive attributes in automated trust negotiation. WPES 2002: 41-51 | |
2001 | ||
23 | Ninghui Li, William H. Winsborough, John C. Mitchell: Distributed credential chain discovery in trust management: extended abstract. ACM Conference on Computer and Communications Security 2001: 156-165 | |
2000 | ||
22 | Moreno Falaschi, Patrick Hicks, William H. Winsborough: Demand Transformation Analysis for Concurrent Constraint Programs. J. Log. Program. 42(3): 185-215 (2000) | |
1999 | ||
21 | Gudjon Gudjonsson, William H. Winsborough: Compile-time memory reuse in logic programming languages through update in place. ACM Trans. Program. Lang. Syst. 21(3): 430-501 (1999) | |
1998 | ||
20 | Agostino Cortesi, Gilberto Filé, William H. Winsborough: The Quotient of an Abstract Interpretation. Theor. Comput. Sci. 202(1-2): 163-192 (1998) | |
1997 | ||
19 | Kent E. Seamons, William H. Winsborough, Marianne Winslett: Internet Credential Acceptance Policies. APPIA-GULP-PRODE 1997: 415-432 | |
18 | Michael Codish, Moreno Falaschi, Kim Marriott, William H. Winsborough: A Confluent Semantic Basis for the Analysis of Concurrent Constraint Logic Programs. J. Log. Program. 30(1): 53-81 (1997) | |
1996 | ||
17 | Moreno Falaschi, Patrick Hicks, William H. Winsborough: Demand Transformation Analysis for Concurrent Constraint Programs. JICSLP 1996: 333-347 | |
16 | Geoffrey Weyer, William H. Winsborough: Annotated Structure Shape Graphs for Abstract Analysis of Prolog. PLILP 1996: 92-106 | |
15 | Agostino Cortesi, Gilberto Filé, William H. Winsborough: Optimal Groundness Analysis Using Propositional Logic. J. Log. Program. 27(2): 137-167 (1996) | |
1994 | ||
14 | Agostino Cortesi, Gilberto Filé, William H. Winsborough: The Quotient of an Abstract Interpretation for Comparing Static Analyses. GULP-PRODE (1) 1994: 372-387 | |
13 | Anne Mulkers, William H. Winsborough, Maurice Bruynooghe: Live-Structure Dataflow Analysis for Prolog. ACM Trans. Program. Lang. Syst. 16(2): 205-258 (1994) | |
1993 | ||
12 | Michael Codish, Moreno Falaschi, Kim Marriott, William H. Winsborough: Efficient Analysis of Concurrent Constraint Logic Programs. ICALP 1993: 633-644 | |
11 | Gudjon Gudjonsson, William H. Winsborough: Update In Place: Overview of the Siva Project. ILPS 1993: 94-113 | |
1992 | ||
10 | Agostino Cortesi, Gilberto Filé, William H. Winsborough: Comparison of Abstract Interpretations. ICALP 1992: 521-532 | |
9 | Michael Codish, Moreno Falaschi, Kim Marriott, William H. Winsborough: Efficient Analysis of Reactive Properties of Concurrent Constraint Logic Programs. WSA 1992: 35-42 | |
8 | William H. Winsborough: Multiple Specialization using Minimal-Function Graph Semantics. J. Log. Program. 13(2&3): 259-290 (1992) | |
1991 | ||
7 | Ian T. Foster, William H. Winsborough: Copy Avoidance through Compile-Time Analysis and Local Reuse. ISLP 1991: 455-469 | |
6 | Agostino Cortesi, Gilberto Filé, William H. Winsborough: Prop revisited: Propositional Formula as Abstract Domain for Groundness Analysis LICS 1991: 322-327 | |
1990 | ||
5 | Dean Jacobs, Anno Langen, William H. Winsborough: Multiple Specialization of Logic Programs with Run-Time Test. ICLP 1990: 717-731 | |
4 | Anne Mulkers, William H. Winsborough, Maurice Bruynooghe: Analysis of Shared Data Structures for Compile-Time Garbage. ICLP 1990: 747-762 | |
1989 | ||
3 | William H. Winsborough: Path-Dependent Reachability Analysis for Multiple Specialization. NACLP 1989: 133-153 | |
1988 | ||
2 | William H. Winsborough, Annika Wærn: Transparent And-Parallelism in the Presence of Shared Free Variables. ICLP/SLP 1988: 749-764 | |
1987 | ||
1 | William H. Winsborough: Semantically Transparent Selective Reset for AND Parallel Interpreters Based on the Origin of Failures. SLP 1987: 134-152 |