关注
William D. Young
William D. Young
Lecturer and Research Scientist, University of Texas at Austin
在 cs.utexas.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
An integrated approach to safety and security based on systems theory
W Young, NG Leveson
Communications of the ACM 57 (2), 31-35, 2014
3492014
An approach to systems verification
WR Bevier, WA Hunt, JS Moore, WD Young
Journal of Automated Reasoning 5, 411-428, 1989
2301989
Systems thinking for safety and security
W Young, N Leveson
Proceedings of the 29th annual computer security applications conference, 1-8, 2013
2182013
Extending the noninterference version of MLS for SAT
JT Haigh, WD Young
IEEE Transactions on Software Engineering, 141-150, 1987
2001987
A mechanically verified code generator
WD Young
Journal of Automated Reasoning 5, 493-518, 1989
1261989
An experience using two covert channel analysis techniques on a real system design
JT Haigh, RA Kemmerer, J McHugh, WD Young
IEEE Transactions on Software Engineering, 157-168, 1987
951987
Secure Ada Target: Issues, system design, and verification
WE Boebert, RY Kaln, WD Young, SA Hansohn
1985 IEEE Symposium on Security and Privacy, 176-176, 1985
641985
A verified code generator for a subset of Gypsy
WD Young
University of Texas at Austin, 1988
631988
Secure computing: The secure Ada Target approach.
WE Boebert, RY Kain, WD Young
ADVANCES IN COMPUTER SYSTEM SECURITY., 1988, 3, 1988
571988
A robust machine code proof framework for highly secure applications
DS Hardin, EW Smith, WD Young
Proceedings of the sixth international workshop on the ACL2 theorem prover …, 2006
542006
The proof of correctness of a fault-tolerant circuit design
WR Bevier, WD Young
Dependable Computing for Critical Applications 2, 243-260, 1990
381990
A state-based approach to noninterference
WR Bevier, WD Young
Journal of Computer Security 3 (1), 55-70, 1995
371995
Verifiable computer security and hardware: Issues
WD Young
Computational Logic, Incorporated, 1991
361991
Toward verified execution environments
WR Bevier, WA Hunt, WD Young
1987 IEEE Symposium on Security and Privacy, 106-106, 1987
361987
Coding for a believable specification to implementation mapping
WD Young, J Mchugh
1987 IEEE Symposium on Security and Privacy, 140-140, 1987
351987
Conceptual systems security requirements analysis: Aerial refueling case study
M Span, LO Mailloux, RF Mills, W Young
IEEE Access 6, 46668-46682, 2018
332018
Connection policies and controlled interference
WR Bevier, RM Cohen, WD Young
Proceedings The Eighth IEEE Computer Security Foundations Workshop, 167-176, 1995
321995
Introduction to a formally defined hardware description language
B Brock, WA Hunt Jr, WD Young
Proceedings of the IFIP TC10/WG 10.2 International Conference on Theorem …, 1992
321992
Methods for evaluating reference desk performance
WF Young
RQ, 69-75, 1985
311985
Proving a computer system secure.
WD Young, WE Boebert, RY Kain
ADVANCES IN COMPUTER SYSTEM SECURITY., 1988, 3, 1988
301988
系统目前无法执行此操作,请稍后再试。
文章 1–20