William H. Winsborough
According to our database1,
William H. Winsborough
authored at least 78 papers
between 1987 and 2014.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2014
J. Comput. Secur., 2014
2013
Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
2012
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
2011
ACM Trans. Inf. Syst. Secur., 2011
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011
2010
IEEE Trans. Syst. Man Cybern. Part A, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the Computer Network Security, 2010
Implementation and Performance Analysis of the Role-Based Trust Management System, <i>RT</i><sup><i>C</i></sup>.
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
2009
ACM Trans. Inf. Syst. Secur., 2009
Maintaining control while delegating trust: Integrity constraints in trust management.
ACM Trans. Inf. Syst. Secur., 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
2008
Proceedings of the Handbook of Database Security - Applications and Trends, 2008
IEEE Trans. Dependable Secur. Comput., 2008
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Proceedings of the Fourth OWLED Workshop on OWL: Experiences and Directions, 2008
Proceedings of the Trust Management II, 2008
Role-based trust management security policy analysis and correction environment (RT-SPACE).
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008
A Trust Management Approach for Flexible Policy Management in Security-Typed Languages.
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, 2008
2007
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
Informal presentation: a trust management perspective on managing policy updates in security-typed languages.
Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, 2007
Proceedings of the International Workshop on Modeling in Software Engineering, 2007
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007
Proceedings of the Foundations of Security Analysis and Design IV, 2007
2006
Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006
Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems.
Proceedings of the Data and Applications Security XX, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
2005
Proceedings of the 2nd IEEE Workshop on Visualization for Computer Security, 2005
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005
Proceedings of the 2005 ACM workshop on Formal methods in security engineering, 2005
2004
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004
2003
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003
Proceedings of the Trust Management, First International Conference, 2003
Proceedings of the Logic Programming, 19th International Conference, 2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
2002
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, 2002
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002
2001
Proceedings of the CCS 2001, 2001
2000
J. Log. Program., 2000
1999
ACM Trans. Program. Lang. Syst., 1999
1998
1997
J. Log. Program., 1997
Internet Credential Acceptance Policies.
Proceedings of the 1997 Joint Conf. on Declarative Programming, 1997
1996
Proceedings of the Programming Languages: Implementations, 1996
1994
The Quotient of an Abstract Interpretation for Comparing Static Analyses.
Proceedings of the 1994 Joint Conference on Declarative Programming, 1994
1993
Update In Place: Overview of the Siva Project.
Proceedings of the Logic Programming, 1993
Proceedings of the Automata, Languages and Programming, 20nd International Colloquium, 1993
1992
J. Log. Program., 1992
Efficient Analysis of Reactive Properties of Concurrent Constraint Logic Programs.
Proceedings of the Actes WSA'92 Workshop on Static Analysis (Bordeaux, 1992
Proceedings of the Automata, Languages and Programming, 19th International Colloquium, 1992
1991
Copy Avoidance through Compile-Time Analysis and Local Reuse.
Proceedings of the Logic Programming, Proceedings of the 1991 International Symposium, San Diego, California, USA, Oct. 28, 1991
Proceedings of the Sixth Annual Symposium on Logic in Computer Science (LICS '91), 1991
1990
Analysis of Shared Data Structures for Compile-Time Garbage.
Proceedings of the Logic Programming, 1990
Multiple Specialization of Logic Programs with Run-Time Test.
Proceedings of the Logic Programming, 1990
1989
Path-Dependent Reachability Analysis for Multiple Specialization.
Proceedings of the Logic Programming, 1989
1988
Transparent And-Parallelism in the Presence of Shared Free Variables.
Proceedings of the Logic Programming, 1988
1987
Semantically Transparent Selective Reset for AND Parallel Interpreters Based on the Origin of Failures.
Proceedings of the 1987 Symposium on Logic Programming, San Francisco, California, USA, August 31, 1987