Seguir
William D. Young
William D. Young
Lecturer and Research Scientist, University of Texas at Austin
Email confirmado em cs.utexas.edu
Título
Citado por
Citado por
Ano
An integrated approach to safety and security based on systems theory
W Young, NG Leveson
Communications of the ACM 57 (2), 31-35, 2014
3452014
An approach to systems verification
WR Bevier, WA Hunt, JS Moore, WD Young
Journal of Automated Reasoning 5, 411-428, 1989
2261989
Systems thinking for safety and security
W Young, N Leveson
Proceedings of the 29th annual computer security applications conference, 1-8, 2013
2162013
Extending the noninterference version of MLS for SAT
JT Haigh, WD Young
IEEE Transactions on Software Engineering, 141-150, 1987
1981987
A mechanically verified code generator
WD Young
Journal of Automated Reasoning 5, 493-518, 1989
1271989
An experience using two covert channel analysis techniques on a real system design
JT Haigh, RA Kemmerer, J McHugh, WD Young
IEEE Transactions on Software Engineering, 157-168, 1987
941987
A verified code generator for a subset of Gypsy
WD Young
University of Texas at Austin, 1988
641988
Secure Ada Target: Issues, system design, and verification
WE Boebert, RY Kaln, WD Young, SA Hansohn
1985 IEEE Symposium on Security and Privacy, 176-176, 1985
641985
A robust machine code proof framework for highly secure applications
DS Hardin, EW Smith, WD Young
Proceedings of the sixth international workshop on the ACL2 theorem prover …, 2006
552006
Secure computing: The secure Ada Target approach.
WE Boebert, RY Kain, WD Young
ADVANCES IN COMPUTER SYSTEM SECURITY., 1988, 3, 1988
541988
The proof of correctness of a fault-tolerant circuit design
WR Bevier, WD Young
Dependable Computing for Critical Applications 2, 243-260, 1990
381990
A state-based approach to noninterference
WR Bevier, WD Young
Journal of Computer Security 3 (1), 55-70, 1995
371995
Toward verified execution environments
WR Bevier, WA Hunt, WD Young
1987 IEEE Symposium on Security and Privacy, 106-106, 1987
371987
Verifiable computer security and hardware: Issues
WD Young
Computational Logic, Incorporated, 1991
361991
Coding for a believable specification to implementation mapping
WD Young, J Mchugh
1987 IEEE Symposium on Security and Privacy, 140-140, 1987
351987
Connection policies and controlled interference
WR Bevier, RM Cohen, WD Young
Proceedings The Eighth IEEE Computer Security Foundations Workshop, 167-176, 1995
321995
Introduction to a formally defined hardware description language
B Brock, WA Hunt Jr, WD Young
Proceedings of the IFIP TC10/WG 10.2 International Conference on Theorem …, 1992
321992
Conceptual systems security requirements analysis: Aerial refueling case study
M Span, LO Mailloux, RF Mills, W Young
IEEE Access 6, 46668-46682, 2018
312018
Proving a computer system secure.
WD Young, WE Boebert, RY Kain
ADVANCES IN COMPUTER SYSTEM SECURITY., 1988, 3, 1988
301988
Methods for evaluating reference desk performance
WF Young
RQ, 69-75, 1985
301985
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20