The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

William H. Winsborough: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Agostino Cortesi, Gilberto Filé, William H. Winsborough
    The Quotient of an Abstract Interpretation for Comparing Static Analyses. [Citation Graph (0, 0)][DBLP]
    GULP-PRODE (1), 1994, pp:372-387 [Conf]
  2. Kent E. Seamons, William H. Winsborough, Marianne Winslett
    Internet Credential Acceptance Policies. [Citation Graph (0, 0)][DBLP]
    APPIA-GULP-PRODE, 1997, pp:415-432 [Conf]
  3. Jiangtao Li, Ninghui Li, William H. Winsborough
    Automated trust negotiation using cryptographic credentials. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:46-57 [Conf]
  4. Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann
    Email feedback: a policy-based approach to overcoming false positives. [Citation Graph (0, 0)][DBLP]
    FMSE, 2005, pp:73-82 [Conf]
  5. Ninghui Li, William H. Winsborough, John C. Mitchell
    Distributed credential chain discovery in trust management: extended abstract. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:156-165 [Conf]
  6. Keith Irwin, Ting Yu, William H. Winsborough
    On the modeling and analysis of obligations. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:134-143 [Conf]
  7. Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann
    Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:163-178 [Conf]
  8. William H. Winsborough, Jay Jacobs
    Automated Trust Negotiation Technology with Attribute-based Access Control. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:60-0 [Conf]
  9. William H. Winsborough, Jay Jacobs
    Automated Trust Negotiation in Attribute-based Access Control. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:252-0 [Conf]
  10. Michael Codish, Moreno Falaschi, Kim Marriott, William H. Winsborough
    Efficient Analysis of Concurrent Constraint Logic Programs. [Citation Graph (0, 0)][DBLP]
    ICALP, 1993, pp:633-644 [Conf]
  11. Agostino Cortesi, Gilberto Filé, William H. Winsborough
    Comparison of Abstract Interpretations. [Citation Graph (0, 0)][DBLP]
    ICALP, 1992, pp:521-532 [Conf]
  12. Ziqing Mao, Ninghui Li, William H. Winsborough
    Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper). [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:159-173 [Conf]
  13. Moreno Falaschi, Patrick Hicks, William H. Winsborough
    Demand Transformation Analysis for Concurrent Constraint Programs. [Citation Graph (0, 0)][DBLP]
    JICSLP, 1996, pp:333-347 [Conf]
  14. Dean Jacobs, Anno Langen, William H. Winsborough
    Multiple Specialization of Logic Programs with Run-Time Test. [Citation Graph (0, 0)][DBLP]
    ICLP, 1990, pp:717-731 [Conf]
  15. Anne Mulkers, William H. Winsborough, Maurice Bruynooghe
    Analysis of Shared Data Structures for Compile-Time Garbage. [Citation Graph (0, 0)][DBLP]
    ICLP, 1990, pp:747-762 [Conf]
  16. William H. Winsborough
    A Logic Programming View of Authorization in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    ICLP, 2003, pp:20-46 [Conf]
  17. William H. Winsborough, Annika Wærn
    Transparent And-Parallelism in the Presence of Shared Free Variables. [Citation Graph (0, 0)][DBLP]
    ICLP/SLP, 1988, pp:749-764 [Conf]
  18. Michael T. Goodrich, Michael Shin, Roberto Tamassia, William H. Winsborough
    Authenticated Dictionaries for Fresh Attribute Credentials. [Citation Graph (0, 0)][DBLP]
    iTrust, 2003, pp:332-347 [Conf]
  19. Agostino Cortesi, Gilberto Filé, William H. Winsborough
    Prop revisited: Propositional Formula as Abstract Domain for Groundness Analysis [Citation Graph (0, 0)][DBLP]
    LICS, 1991, pp:322-327 [Conf]
  20. Geoffrey Weyer, William H. Winsborough
    Annotated Structure Shape Graphs for Abstract Analysis of Prolog. [Citation Graph (0, 0)][DBLP]
    PLILP, 1996, pp:92-106 [Conf]
  21. Saket Kaushik, Paul Ammann, Duminda Wijesekera, William H. Winsborough, Ronald W. Ritchey
    A Policy Driven Approach to Email Services. [Citation Graph (0, 0)][DBLP]
    POLICY, 2004, pp:169-0 [Conf]
  22. William H. Winsborough, Ninghui Li
    Towards Practical Automated Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    POLICY, 2002, pp:92-103 [Conf]
  23. Eve Cohen, Roshan K. Thomas, William H. Winsborough, Deborah Shands
    Models for coalition-based access control (CBAC). [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:97-106 [Conf]
  24. Sandro Etalle, William H. Winsborough
    Integrity constraints in trust management. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:1-10 [Conf]
  25. Roberto Tamassia, Danfeng Yao, William H. Winsborough
    Role-based cascaded delegation. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:146-155 [Conf]
  26. Michael Codish, Moreno Falaschi, Kim Marriott, William H. Winsborough
    Efficient Analysis of Reactive Properties of Concurrent Constraint Logic Programs. [Citation Graph (0, 0)][DBLP]
    WSA, 1992, pp:35-42 [Conf]
  27. Ian T. Foster, William H. Winsborough
    Copy Avoidance through Compile-Time Analysis and Local Reuse. [Citation Graph (0, 0)][DBLP]
    ISLP, 1991, pp:455-469 [Conf]
  28. Gudjon Gudjonsson, William H. Winsborough
    Update In Place: Overview of the Siva Project. [Citation Graph (0, 0)][DBLP]
    ILPS, 1993, pp:94-113 [Conf]
  29. William H. Winsborough
    Semantically Transparent Selective Reset for AND Parallel Interpreters Based on the Origin of Failures. [Citation Graph (0, 0)][DBLP]
    SLP, 1987, pp:134-152 [Conf]
  30. William H. Winsborough
    Path-Dependent Reachability Analysis for Multiple Specialization. [Citation Graph (0, 0)][DBLP]
    NACLP, 1989, pp:133-153 [Conf]
  31. Ninghui Li, William H. Winsborough, John C. Mitchell
    Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:123-139 [Conf]
  32. Ninghui Li, John C. Mitchell, William H. Winsborough
    Design of a Role-Based Trust-Management Framework. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:114-130 [Conf]
  33. William H. Winsborough, Ninghui Li
    Safety in Automated Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:147-160 [Conf]
  34. Danfeng Yao, Michael Shin, Roberto Tamassia, William H. Winsborough
    Visualization of Automated Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2005, pp:8- [Conf]
  35. William H. Winsborough, Ninghui Li
    Protecting sensitive attributes in automated trust negotiation. [Citation Graph (0, 0)][DBLP]
    WPES, 2002, pp:41-51 [Conf]
  36. Ninghui Li, John C. Mitchell, William H. Winsborough
    Beyond proof-of-compliance: security analysis in trust management. [Citation Graph (0, 0)][DBLP]
    J. ACM, 2005, v:52, n:3, pp:474-514 [Journal]
  37. Ninghui Li, William H. Winsborough, John C. Mitchell
    Distributed Credential Chain Discovery in Trust Management. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:1, pp:35-86 [Journal]
  38. Michael Codish, Moreno Falaschi, Kim Marriott, William H. Winsborough
    A Confluent Semantic Basis for the Analysis of Concurrent Constraint Logic Programs. [Citation Graph (0, 0)][DBLP]
    J. Log. Program., 1997, v:30, n:1, pp:53-81 [Journal]
  39. Agostino Cortesi, Gilberto Filé, William H. Winsborough
    Optimal Groundness Analysis Using Propositional Logic. [Citation Graph (0, 0)][DBLP]
    J. Log. Program., 1996, v:27, n:2, pp:137-167 [Journal]
  40. Moreno Falaschi, Patrick Hicks, William H. Winsborough
    Demand Transformation Analysis for Concurrent Constraint Programs. [Citation Graph (0, 0)][DBLP]
    J. Log. Program., 2000, v:42, n:3, pp:185-215 [Journal]
  41. William H. Winsborough
    Multiple Specialization using Minimal-Function Graph Semantics. [Citation Graph (0, 0)][DBLP]
    J. Log. Program., 1992, v:13, n:2&3, pp:259-290 [Journal]
  42. Agostino Cortesi, Gilberto Filé, William H. Winsborough
    The Quotient of an Abstract Interpretation. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1998, v:202, n:1-2, pp:163-192 [Journal]
  43. William H. Winsborough, Ninghui Li
    Safety in automated trust negotiation. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2006, v:9, n:3, pp:352-390 [Journal]
  44. Gudjon Gudjonsson, William H. Winsborough
    Compile-time memory reuse in logic programming languages through update in place. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1999, v:21, n:3, pp:430-501 [Journal]
  45. Anne Mulkers, William H. Winsborough, Maurice Bruynooghe
    Live-Structure Dataflow Analysis for Prolog. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1994, v:16, n:2, pp:205-258 [Journal]
  46. Marcin Czenko, Sandro Etalle, Dongyi Li, William H. Winsborough
    An Introduction to the Role Based Trust Management Framework RT. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2007, pp:246-281 [Conf]
  47. Sandro Etalle, William H. Winsborough
    A posteriori compliance control. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:11-20 [Conf]
  48. Sandro Etalle, William H. Winsborough
    Integrity Constraints in Trust Management [Citation Graph (0, 0)][DBLP]
    CoRR, 2005, v:0, n:, pp:- [Journal]

  49. Stale-safe security properties for group-based secure information sharing. [Citation Graph (, )][DBLP]


  50. Toward practical analysis for trust management policy. [Citation Graph (, )][DBLP]


  51. A conceptual framework for Group-Centric secure information sharing. [Citation Graph (, )][DBLP]


  52. Toward practical authorization-dependent user obligation systems. [Citation Graph (, )][DBLP]


  53. A Trust Management Approach for Flexible Policy Management in Security-Typed Languages. [Citation Graph (, )][DBLP]


  54. Apply Model Checking to Security Analysis in Trust Management. [Citation Graph (, )][DBLP]


  55. Role-based trust management security policy analysis and correction environment (RT-SPACE). [Citation Graph (, )][DBLP]


  56. Group-Centric Models for Secure and Agile Information Sharing. [Citation Graph (, )][DBLP]


  57. Informal presentation: a trust management perspective on managing policy updates in security-typed languages. [Citation Graph (, )][DBLP]


  58. Enforcing security properties in task-based systems. [Citation Graph (, )][DBLP]


  59. ROWLBAC: representing role based access control in OWL. [Citation Graph (, )][DBLP]


  60. Foundations for group-centric secure information sharing models. [Citation Graph (, )][DBLP]


  61. Towards Static Flow-Based Declassification for Legacy and Untrusted Programs. [Citation Graph (, )][DBLP]


  62. Information carrying identity proof trees. [Citation Graph (, )][DBLP]


  63. Avoiding information leakage in security-policy-aware planning. [Citation Graph (, )][DBLP]


  64. Towards a framework for group-centric secure collaboration. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.008secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002