William H. Winsborough

According to our database1, William H. Winsborough authored at least 82 papers between 1987 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2014
Formal verification of security properties in trust management policy.
Journal of Computer Security, 2014

2013
Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

2012
Ensuring authorization privileges for cascading user obligations.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Refinement-based design of a group-centric secure information sharing model.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

The privacy in the time of the internet: secrecy vs transparency.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
Group-Centric Secure Information-Sharing Models for Isolated Groups.
ACM Trans. Inf. Syst. Secur., 2011

On the management of user obligations.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

2010
Independently Verifiable Decentralized Role-Based Delegation.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2010

Towards Static Flow-Based Declassification for Legacy and Untrusted Programs.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Failure Feedback for User Obligation Systems.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Group-Centric Models for Secure and Agile Information Sharing.
Proceedings of the Computer Network Security, 2010

Implementation and Performance Analysis of the Role-Based Trust Management System, RTC.
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010

Toward practical authorization-dependent user obligation systems.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Automated trust negotiation using cryptographic credentials.
ACM Trans. Inf. Syst. Secur., 2009

Maintaining control while delegating trust: Integrity constraints in trust management.
ACM Trans. Inf. Syst. Secur., 2009

Foundations for group-centric secure information sharing models.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Towards a framework for group-centric secure collaboration.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

Toward practical analysis for trust management policy.
Proceedings of the 2009 ACM Symposium on Information, 2009

A conceptual framework for Group-Centric secure information sharing.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Database Issues in Trust Management and Trust Negotiation.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Towards Formal Verification of Role-Based Access Control Policies.
IEEE Trans. Dependable Sec. Comput., 2008

Avoiding information leakage in security-policy-aware planning.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

Enforcing security properties in task-based systems.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

ROWLBAC: representing role based access control in OWL.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Role Based Access Control and OWL.
Proceedings of the Fourth OWLED Workshop on OWL: Experiences and Directions, 2008

Assigning Responsibility for Failed Obligations.
Proceedings of the Trust Management II, 2008

Role-based trust management security policy analysis and correction environment (RT-SPACE).
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008

A Trust Management Approach for Flexible Policy Management in Security-Typed Languages.
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008

Stale-safe security properties for group-based secure information sharing.
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, 2008

2007
Information carrying identity proof trees.
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007

A posteriori compliance control.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Informal presentation: a trust management perspective on managing policy updates in security-typed languages.
Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, 2007

Engineering Trust Management into Software Models.
Proceedings of the International Workshop on Modeling in Software Engineering, 2007

Apply Model Checking to Security Analysis in Trust Management.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007

An Introduction to the Role Based Trust Management Framework RT.
Proceedings of the Foundations of Security Analysis and Design IV, 2007

2006
Safety in automated trust negotiation.
ACM Trans. Inf. Syst. Secur., 2006

Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006

Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems.
Proceedings of the Data and Applications Security XX, 2006

On the modeling and analysis of obligations.
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30, 2006

2005
Beyond proof-of-compliance: security analysis in trust management.
J. ACM, 2005

Integrity Constraints in Trust Management
CoRR, 2005

Visualization of Automated Trust Negotiation.
Proceedings of the IEEE Workshop on Visualization for Computer Security (VizSEC 2005), 2005

Integrity constraints in trust management.
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005

Automated trust negotiation using cryptographic credentials.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

Email feedback: a policy-based approach to overcoming false positives.
Proceedings of the 2005 ACM workshop on Formal methods in security engineering, 2005

2004
A Hierarchical Release Control Policy Framework.
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004

Safety in Automated Trust Negotiation.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

Role-based cascaded delegation.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004

A Policy Driven Approach to Email Services.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

2003
Distributed Credential Chain Discovery in Trust Management.
Journal of Computer Security, 2003

Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

Authenticated Dictionaries for Fresh Attribute Credentials.
Proceedings of the Trust Management, First International Conference, 2003

A Logic Programming View of Authorization in Distributed Systems.
Proceedings of the Logic Programming, 19th International Conference, 2003

Automated Trust Negotiation in Attribute-based Access Control.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

Automated Trust Negotiation Technology with Attribute-based Access Control.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

2002
Protecting sensitive attributes in automated trust negotiation.
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, 2002

Design of a Role-Based Trust-Management Framework.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002

Models for coalition-based access control (CBAC).
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

Towards Practical Automated Trust Negotiation.
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002

2001
Distributed credential chain discovery in trust management: extended abstract.
Proceedings of the CCS 2001, 2001

2000
Demand Transformation Analysis for Concurrent Constraint Programs.
J. Log. Program., 2000

1999
Compile-time memory reuse in logic programming languages through update in place.
ACM Trans. Program. Lang. Syst., 1999

1998
The Quotient of an Abstract Interpretation.
Theor. Comput. Sci., 1998

1997
A Confluent Semantic Basis for the Analysis of Concurrent Constraint Logic Programs.
J. Log. Program., 1997

Internet Credential Acceptance Policies.
Proceedings of the 1997 Joint Conf. on Declarative Programming, 1997

1996
Optimal Groundness Analysis Using Propositional Logic.
J. Log. Program., 1996

Annotated Structure Shape Graphs for Abstract Analysis of Prolog.
Proceedings of the Programming Languages: Implementations, 1996

Demand Transformation Analysis for Concurrent Constraint Programs.
Proceedings of the Logic Programming, 1996

1994
Live-Structure Dataflow Analysis for Prolog.
ACM Trans. Program. Lang. Syst., 1994

The Quotient of an Abstract Interpretation for Comparing Static Analyses.
Proceedings of the 1994 Joint Conference on Declarative Programming, 1994

1993
Update In Place: Overview of the Siva Project.
Proceedings of the Logic Programming, 1993

Efficient Analysis of Concurrent Constraint Logic Programs.
Proceedings of the Automata, Languages and Programming, 20nd International Colloquium, 1993

1992
Multiple Specialization using Minimal-Function Graph Semantics.
J. Log. Program., 1992

Efficient Analysis of Reactive Properties of Concurrent Constraint Logic Programs.
Proceedings of the Actes WSA'92 Workshop on Static Analysis (Bordeaux, 1992

Comparison of Abstract Interpretations.
Proceedings of the Automata, Languages and Programming, 19th International Colloquium, 1992

1991
Copy Avoidance through Compile-Time Analysis and Local Reuse.
Proceedings of the Logic Programming, Proceedings of the 1991 International Symposium, San Diego, California, USA, Oct. 28, 1991

Prop revisited: Propositional Formula as Abstract Domain for Groundness Analysis
Proceedings of the Sixth Annual Symposium on Logic in Computer Science (LICS '91), 1991

1990
Analysis of Shared Data Structures for Compile-Time Garbage.
Proceedings of the Logic Programming, 1990

Multiple Specialization of Logic Programs with Run-Time Test.
Proceedings of the Logic Programming, 1990

1989
Path-Dependent Reachability Analysis for Multiple Specialization.
Proceedings of the Logic Programming, 1989

1988
Transparent And-Parallelism in the Presence of Shared Free Variables.
Proceedings of the Logic Programming, 1988

1987
Semantically Transparent Selective Reset for AND Parallel Interpreters Based on the Origin of Failures.
Proceedings of the 1987 Symposium on Logic Programming, San Francisco, California, USA, August 31, 1987


  Loading...