Search the dblp DataBase
William D. Young :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
J. Thomas Haigh , William D. Young Extending the Noninterference Version of MLS for SAT. [Citation Graph (2, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:141-150 [Journal ] J. Thomas Haigh , Richard A. Kemmerer , John McHugh , William D. Young An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. [Citation Graph (1, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:157-168 [Journal ] William D. Young Introducing Abstractions via Rewriting. [Citation Graph (0, 0)][DBLP ] CHARME, 2005, pp:402-405 [Conf ] William R. Bevier , Richard M. Cohen , William D. Young Connection policies and controlled interference. [Citation Graph (0, 0)][DBLP ] CSFW, 1995, pp:167-176 [Conf ] William D. Young , William R. Bevier A State-Based Approach to Non-Interference. [Citation Graph (0, 0)][DBLP ] CSFW, 1994, pp:11-21 [Conf ] Donald I. Good , William D. Young Mathematical Methods for Digital Systems Development. [Citation Graph (0, 0)][DBLP ] VDM Europe (2), 1991, pp:406-430 [Conf ] William D. Young , William R. Bevier Mathematical Modeling and Analysis of an External Memory Manager. [Citation Graph (0, 0)][DBLP ] FME, 1997, pp:237-257 [Conf ] William D. Young Verified Compilation in micro-Gypsy. [Citation Graph (0, 0)][DBLP ] Symposium on Testing, Analysis, and Verification, 1989, pp:20-26 [Conf ] William D. Young Formal Methods versus Software Engineering: Is There a Conflict? [Citation Graph (0, 0)][DBLP ] Symposium on Testing, Analysis, and Verification, 1991, pp:188-189 [Conf ] William R. Bevier , Warren A. Hunt Jr. , William D. Young Toward Verified Execution Environments. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1987, pp:106-115 [Conf ] J. Thomas Haigh , Richard A. Kemmerer , John McHugh , William D. Young An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1986, pp:14-24 [Conf ] J. Thomas Haigh , William D. Young Extending the Non-Interference Version of MLS for SAT. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1986, pp:60-60 [Conf ] William D. Young , John McHugh Coding for a Believable Specification to Implementation Mapping. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1987, pp:140-149 [Conf ] Bishop Brock , Warren A. Hunt Jr. , William D. Young Introduction to a Formally Defined Hardware Description Language. [Citation Graph (0, 0)][DBLP ] TPCD, 1992, pp:3-35 [Conf ] David S. Hardin , Eric W. Smith , William D. Young A robust machine code proof framework for highly secure applications. [Citation Graph (0, 0)][DBLP ] ACL2, 2006, pp:11-20 [Conf ] William R. Bevier , William D. Young Machine Checked Proofs of the Design of a Fault-Tolerance Circuit. [Citation Graph (0, 0)][DBLP ] Formal Asp. Comput., 1992, v:4, n:6A, pp:755-775 [Journal ] William R. Bevier , Warren A. Hunt Jr. , J. Strother Moore , William D. Young An Approach to Systems Verification. [Citation Graph (0, 0)][DBLP ] J. Autom. Reasoning, 1989, v:5, n:4, pp:411-428 [Journal ] William D. Young A Mechanically Verified Code Generator. [Citation Graph (0, 0)][DBLP ] J. Autom. Reasoning, 1989, v:5, n:4, pp:493-518 [Journal ] William R. Bevier , William D. Young A State-Machine Approach to Non-Interference. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1995, v:3, n:1, pp:55-70 [Journal ] William D. Young Comparing Verification Systems: Interactive Consistency in ACL2. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1997, v:23, n:4, pp:214-223 [Journal ] Mechanized Information Flow Analysis through Inductive Assertions. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.002secs