The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

William D. Young: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. J. Thomas Haigh, William D. Young
    Extending the Noninterference Version of MLS for SAT. [Citation Graph (2, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:2, pp:141-150 [Journal]
  2. J. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young
    An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. [Citation Graph (1, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:2, pp:157-168 [Journal]
  3. William D. Young
    Introducing Abstractions via Rewriting. [Citation Graph (0, 0)][DBLP]
    CHARME, 2005, pp:402-405 [Conf]
  4. William R. Bevier, Richard M. Cohen, William D. Young
    Connection policies and controlled interference. [Citation Graph (0, 0)][DBLP]
    CSFW, 1995, pp:167-176 [Conf]
  5. William D. Young, William R. Bevier
    A State-Based Approach to Non-Interference. [Citation Graph (0, 0)][DBLP]
    CSFW, 1994, pp:11-21 [Conf]
  6. Donald I. Good, William D. Young
    Mathematical Methods for Digital Systems Development. [Citation Graph (0, 0)][DBLP]
    VDM Europe (2), 1991, pp:406-430 [Conf]
  7. William D. Young, William R. Bevier
    Mathematical Modeling and Analysis of an External Memory Manager. [Citation Graph (0, 0)][DBLP]
    FME, 1997, pp:237-257 [Conf]
  8. William D. Young
    Verified Compilation in micro-Gypsy. [Citation Graph (0, 0)][DBLP]
    Symposium on Testing, Analysis, and Verification, 1989, pp:20-26 [Conf]
  9. William D. Young
    Formal Methods versus Software Engineering: Is There a Conflict? [Citation Graph (0, 0)][DBLP]
    Symposium on Testing, Analysis, and Verification, 1991, pp:188-189 [Conf]
  10. William R. Bevier, Warren A. Hunt Jr., William D. Young
    Toward Verified Execution Environments. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:106-115 [Conf]
  11. J. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young
    An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:14-24 [Conf]
  12. J. Thomas Haigh, William D. Young
    Extending the Non-Interference Version of MLS for SAT. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:60-60 [Conf]
  13. William D. Young, John McHugh
    Coding for a Believable Specification to Implementation Mapping. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:140-149 [Conf]
  14. Bishop Brock, Warren A. Hunt Jr., William D. Young
    Introduction to a Formally Defined Hardware Description Language. [Citation Graph (0, 0)][DBLP]
    TPCD, 1992, pp:3-35 [Conf]
  15. David S. Hardin, Eric W. Smith, William D. Young
    A robust machine code proof framework for highly secure applications. [Citation Graph (0, 0)][DBLP]
    ACL2, 2006, pp:11-20 [Conf]
  16. William R. Bevier, William D. Young
    Machine Checked Proofs of the Design of a Fault-Tolerance Circuit. [Citation Graph (0, 0)][DBLP]
    Formal Asp. Comput., 1992, v:4, n:6A, pp:755-775 [Journal]
  17. William R. Bevier, Warren A. Hunt Jr., J. Strother Moore, William D. Young
    An Approach to Systems Verification. [Citation Graph (0, 0)][DBLP]
    J. Autom. Reasoning, 1989, v:5, n:4, pp:411-428 [Journal]
  18. William D. Young
    A Mechanically Verified Code Generator. [Citation Graph (0, 0)][DBLP]
    J. Autom. Reasoning, 1989, v:5, n:4, pp:493-518 [Journal]
  19. William R. Bevier, William D. Young
    A State-Machine Approach to Non-Interference. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1995, v:3, n:1, pp:55-70 [Journal]
  20. William D. Young
    Comparing Verification Systems: Interactive Consistency in ACL2. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1997, v:23, n:4, pp:214-223 [Journal]

  21. Mechanized Information Flow Analysis through Inductive Assertions. [Citation Graph (, )][DBLP]


Search in 0.035secs, Finished in 0.036secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002