dblp.uni-trier.dewww.uni-trier.de

William H. Winsborough Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
62EEMark Reith, Jianwei Niu, William H. Winsborough: Toward practical analysis for trust management policy. ASIACCS 2009: 310-321
61EERam Krishnan, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough: A conceptual framework for Group-Centric secure information sharing. ASIACCS 2009: 384-387
60EERam Krishnan, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough: Foundations for group-centric secure information sharing models. SACMAT 2009: 115-124
2008
59EESruthi Bandhakavi, William H. Winsborough, Marianne Winslett: A Trust Management Approach for Flexible Policy Management in Security-Typed Languages. CSF 2008: 33-47
58EERam Krishnan, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough: Stale-safe security properties for group-based secure information sharing. FMSE 2008: 53-62
57EEMark Reith, Jianwei Niu, William H. Winsborough: Role-based trust management security policy analysis and correction environment (RT-SPACE). ICSE Companion 2008: 929-930
56EEKeith Irwin, Ting Yu, William H. Winsborough: Enforcing security properties in task-based systems. SACMAT 2008: 41-50
55EETimothy W. Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough, Bhavani M. Thuraisingham: ROWLBAC: representing role based access control in OWL. SACMAT 2008: 73-82
54EEKeith Irwin, Ting Yu, William H. Winsborough: Avoiding information leakage in security-policy-aware planning. WPES 2008: 85-94
53EES. Jha, Ninghui Li, Mahesh V. Tripunitara, Qihua Wang, William H. Winsborough: Towards Formal Verification of Role-Based Access Control Policies. IEEE Trans. Dependable Sec. Comput. 5(4): 242-255 (2008)
2007
52EEMarcin Czenko, Sandro Etalle, Dongyi Li, William H. Winsborough: An Introduction to the Role Based Trust Management Framework RT. FOSAD 2007: 246-281
51EEMark Reith, Jianwei Niu, William H. Winsborough: Apply Model Checking to Security Analysis in Trust Management. ICDE Workshops 2007: 734-743
50EESruthi Bandhakavi, William H. Winsborough, Marianne Winslett: Informal presentation: a trust management perspective on managing policy updates in security-typed languages. PLAS 2007: 73-74
49EESandro Etalle, William H. Winsborough: A posteriori compliance control. SACMAT 2007: 11-20
48EEWilliam H. Winsborough, Anna Cinzia Squicciarini, Elisa Bertino: Information carrying identity proof trees. WPES 2007: 76-79
2006
47 Ketil Stølen, William H. Winsborough, Fabio Martinelli, Fabio Massacci: Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings Springer 2006
46EEKeith Irwin, Ting Yu, William H. Winsborough: On the modeling and analysis of obligations. ACM Conference on Computer and Communications Security 2006: 134-143
45EESaket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann: Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems. DBSec 2006: 163-178
44EEZiqing Mao, Ninghui Li, William H. Winsborough: Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper). ICICS 2006: 159-173
43EEWilliam H. Winsborough, Ninghui Li: Safety in automated trust negotiation. ACM Trans. Inf. Syst. Secur. 9(3): 352-390 (2006)
2005
42EEJiangtao Li, Ninghui Li, William H. Winsborough: Automated trust negotiation using cryptographic credentials. ACM Conference on Computer and Communications Security 2005: 46-57
41EESaket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann: Email feedback: a policy-based approach to overcoming false positives. FMSE 2005: 73-82
40EESandro Etalle, William H. Winsborough: Integrity constraints in trust management. SACMAT 2005: 1-10
39EEDanfeng Yao, Michael Shin, Roberto Tamassia, William H. Winsborough: Visualization of Automated Trust Negotiation. VizSEC 2005: 8
38EESandro Etalle, William H. Winsborough: Integrity Constraints in Trust Management CoRR abs/cs/0503061: (2005)
37EENinghui Li, John C. Mitchell, William H. Winsborough: Beyond proof-of-compliance: security analysis in trust management. J. ACM 52(3): 474-514 (2005)
2004
36EEWilliam H. Winsborough, Ninghui Li: Safety in Automated Trust Negotiation. IEEE Symposium on Security and Privacy 2004: 147-160
35EESaket Kaushik, Paul Ammann, Duminda Wijesekera, William H. Winsborough, Ronald W. Ritchey: A Policy Driven Approach to Email Services. POLICY 2004: 169-
34EERoberto Tamassia, Danfeng Yao, William H. Winsborough: Role-based cascaded delegation. SACMAT 2004: 146-155
2003
33EEWilliam H. Winsborough, Jay Jacobs: Automated Trust Negotiation in Attribute-based Access Control. DISCEX (2) 2003: 252-
32EEWilliam H. Winsborough, Jay Jacobs: Automated Trust Negotiation Technology with Attribute-based Access Control. DISCEX (2) 2003: 60-
31EEWilliam H. Winsborough: A Logic Programming View of Authorization in Distributed Systems. ICLP 2003: 20-46
30EENinghui Li, William H. Winsborough, John C. Mitchell: Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management. IEEE Symposium on Security and Privacy 2003: 123-139
29EEMichael T. Goodrich, Michael Shin, Roberto Tamassia, William H. Winsborough: Authenticated Dictionaries for Fresh Attribute Credentials. iTrust 2003: 332-347
28 Ninghui Li, William H. Winsborough, John C. Mitchell: Distributed Credential Chain Discovery in Trust Management. Journal of Computer Security 11(1): 35-86 (2003)
2002
27EENinghui Li, John C. Mitchell, William H. Winsborough: Design of a Role-Based Trust-Management Framework. IEEE Symposium on Security and Privacy 2002: 114-130
26EEWilliam H. Winsborough, Ninghui Li: Towards Practical Automated Trust Negotiation. POLICY 2002: 92-103
25EEEve Cohen, Roshan K. Thomas, William H. Winsborough, Deborah Shands: Models for coalition-based access control (CBAC). SACMAT 2002: 97-106
24EEWilliam H. Winsborough, Ninghui Li: Protecting sensitive attributes in automated trust negotiation. WPES 2002: 41-51
2001
23EENinghui Li, William H. Winsborough, John C. Mitchell: Distributed credential chain discovery in trust management: extended abstract. ACM Conference on Computer and Communications Security 2001: 156-165
2000
22 Moreno Falaschi, Patrick Hicks, William H. Winsborough: Demand Transformation Analysis for Concurrent Constraint Programs. J. Log. Program. 42(3): 185-215 (2000)
1999
21EEGudjon Gudjonsson, William H. Winsborough: Compile-time memory reuse in logic programming languages through update in place. ACM Trans. Program. Lang. Syst. 21(3): 430-501 (1999)
1998
20EEAgostino Cortesi, Gilberto Filé, William H. Winsborough: The Quotient of an Abstract Interpretation. Theor. Comput. Sci. 202(1-2): 163-192 (1998)
1997
19 Kent E. Seamons, William H. Winsborough, Marianne Winslett: Internet Credential Acceptance Policies. APPIA-GULP-PRODE 1997: 415-432
18 Michael Codish, Moreno Falaschi, Kim Marriott, William H. Winsborough: A Confluent Semantic Basis for the Analysis of Concurrent Constraint Logic Programs. J. Log. Program. 30(1): 53-81 (1997)
1996
17 Moreno Falaschi, Patrick Hicks, William H. Winsborough: Demand Transformation Analysis for Concurrent Constraint Programs. JICSLP 1996: 333-347
16EEGeoffrey Weyer, William H. Winsborough: Annotated Structure Shape Graphs for Abstract Analysis of Prolog. PLILP 1996: 92-106
15 Agostino Cortesi, Gilberto Filé, William H. Winsborough: Optimal Groundness Analysis Using Propositional Logic. J. Log. Program. 27(2): 137-167 (1996)
1994
14 Agostino Cortesi, Gilberto Filé, William H. Winsborough: The Quotient of an Abstract Interpretation for Comparing Static Analyses. GULP-PRODE (1) 1994: 372-387
13EEAnne Mulkers, William H. Winsborough, Maurice Bruynooghe: Live-Structure Dataflow Analysis for Prolog. ACM Trans. Program. Lang. Syst. 16(2): 205-258 (1994)
1993
12EEMichael Codish, Moreno Falaschi, Kim Marriott, William H. Winsborough: Efficient Analysis of Concurrent Constraint Logic Programs. ICALP 1993: 633-644
11 Gudjon Gudjonsson, William H. Winsborough: Update In Place: Overview of the Siva Project. ILPS 1993: 94-113
1992
10EEAgostino Cortesi, Gilberto Filé, William H. Winsborough: Comparison of Abstract Interpretations. ICALP 1992: 521-532
9 Michael Codish, Moreno Falaschi, Kim Marriott, William H. Winsborough: Efficient Analysis of Reactive Properties of Concurrent Constraint Logic Programs. WSA 1992: 35-42
8 William H. Winsborough: Multiple Specialization using Minimal-Function Graph Semantics. J. Log. Program. 13(2&3): 259-290 (1992)
1991
7 Ian T. Foster, William H. Winsborough: Copy Avoidance through Compile-Time Analysis and Local Reuse. ISLP 1991: 455-469
6 Agostino Cortesi, Gilberto Filé, William H. Winsborough: Prop revisited: Propositional Formula as Abstract Domain for Groundness Analysis LICS 1991: 322-327
1990
5 Dean Jacobs, Anno Langen, William H. Winsborough: Multiple Specialization of Logic Programs with Run-Time Test. ICLP 1990: 717-731
4 Anne Mulkers, William H. Winsborough, Maurice Bruynooghe: Analysis of Shared Data Structures for Compile-Time Garbage. ICLP 1990: 747-762
1989
3 William H. Winsborough: Path-Dependent Reachability Analysis for Multiple Specialization. NACLP 1989: 133-153
1988
2 William H. Winsborough, Annika Wærn: Transparent And-Parallelism in the Presence of Shared Free Variables. ICLP/SLP 1988: 749-764
1987
1 William H. Winsborough: Semantically Transparent Selective Reset for AND Parallel Interpreters Based on the Origin of Failures. SLP 1987: 134-152

Coauthor Index

1Paul Ammann [35] [41] [45]
2Sruthi Bandhakavi [50] [59]
3Elisa Bertino [48]
4Maurice Bruynooghe [4] [13]
5Michael Codish [9] [12] [18]
6Eve Cohen [25]
7Agostino Cortesi [6] [10] [14] [15] [20]
8Marcin Czenko [52]
9Sandro Etalle [38] [40] [49] [52]
10Moreno Falaschi [9] [12] [17] [18] [22]
11Gilberto Filé [6] [10] [14] [15] [20]
12Timothy W. Finin (Tim Finin) [55]
13Ian T. Foster [7]
14Michael T. Goodrich [29]
15Gudjon Gudjonsson [11] [21]
16Patrick Hicks [17] [22]
17Keith Irwin [46] [54] [56]
18Dean Jacobs [5]
19Jay Jacobs [32] [33]
20S. Jha [53]
21Anupam Joshi [55]
22Lalana Kagal [55]
23Saket Kaushik [35] [41] [45]
24Ram Krishnan [58] [60] [61]
25Anno Langen [5]
26Dongyi Li [52]
27Jiangtao Li [42]
28Ninghui Li [23] [24] [26] [27] [28] [30] [36] [37] [42] [43] [44] [53]
29Ziqing Mao [44]
30Kim Marriott [9] [12] [18]
31Fabio Martinelli [47]
32Fabio Massacci [47]
33John C. Mitchell [23] [27] [28] [30] [37]
34Anne Mulkers [4] [13]
35Jianwei Niu [51] [55] [57] [58] [60] [61] [62]
36Mark Reith [51] [57] [62]
37Ronald W. Ritchey [35]
38Ravi S. Sandhu [55] [58] [60] [61]
39Kent E. Seamons [19]
40Deborah Shands [25]
41Michael Shin [29] [39]
42Anna Cinzia Squicciarini [48]
43Ketil Stølen [47]
44Roberto Tamassia [29] [34] [39]
45Roshan K. Thomas [25]
46Bhavani M. Thuraisingham [55]
47Mahesh V. Tripunitara [53]
48Qihua Wang [53]
49Annika Wærn (Annika Waern) [2]
50Geoffrey Weyer [16]
51Duminda Wijesekera [35] [41] [45]
52Marianne Winslett [19] [50] [59]
53Danfeng Yao (Danfeng (Daphne) Yao) [34] [39]
54Ting Yu [46] [54] [56]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)