An integrated approach to safety and security based on systems theory W Young, NG Leveson Communications of the ACM 57 (2), 31-35, 2014 | 349 | 2014 |
An approach to systems verification WR Bevier, WA Hunt, JS Moore, WD Young Journal of Automated Reasoning 5, 411-428, 1989 | 230 | 1989 |
Systems thinking for safety and security W Young, N Leveson Proceedings of the 29th annual computer security applications conference, 1-8, 2013 | 218 | 2013 |
Extending the noninterference version of MLS for SAT JT Haigh, WD Young IEEE Transactions on Software Engineering, 141-150, 1987 | 200 | 1987 |
A mechanically verified code generator WD Young Journal of Automated Reasoning 5, 493-518, 1989 | 126 | 1989 |
An experience using two covert channel analysis techniques on a real system design JT Haigh, RA Kemmerer, J McHugh, WD Young IEEE Transactions on Software Engineering, 157-168, 1987 | 95 | 1987 |
Secure Ada Target: Issues, system design, and verification WE Boebert, RY Kaln, WD Young, SA Hansohn 1985 IEEE Symposium on Security and Privacy, 176-176, 1985 | 64 | 1985 |
A verified code generator for a subset of Gypsy WD Young University of Texas at Austin, 1988 | 63 | 1988 |
Secure computing: The secure Ada Target approach. WE Boebert, RY Kain, WD Young ADVANCES IN COMPUTER SYSTEM SECURITY., 1988, 3, 1988 | 57 | 1988 |
A robust machine code proof framework for highly secure applications DS Hardin, EW Smith, WD Young Proceedings of the sixth international workshop on the ACL2 theorem prover …, 2006 | 54 | 2006 |
The proof of correctness of a fault-tolerant circuit design WR Bevier, WD Young Dependable Computing for Critical Applications 2, 243-260, 1990 | 38 | 1990 |
A state-based approach to noninterference WR Bevier, WD Young Journal of Computer Security 3 (1), 55-70, 1995 | 37 | 1995 |
Verifiable computer security and hardware: Issues WD Young Computational Logic, Incorporated, 1991 | 36 | 1991 |
Toward verified execution environments WR Bevier, WA Hunt, WD Young 1987 IEEE Symposium on Security and Privacy, 106-106, 1987 | 36 | 1987 |
Coding for a believable specification to implementation mapping WD Young, J Mchugh 1987 IEEE Symposium on Security and Privacy, 140-140, 1987 | 35 | 1987 |
Conceptual systems security requirements analysis: Aerial refueling case study M Span, LO Mailloux, RF Mills, W Young IEEE Access 6, 46668-46682, 2018 | 33 | 2018 |
Connection policies and controlled interference WR Bevier, RM Cohen, WD Young Proceedings The Eighth IEEE Computer Security Foundations Workshop, 167-176, 1995 | 32 | 1995 |
Introduction to a formally defined hardware description language B Brock, WA Hunt Jr, WD Young Proceedings of the IFIP TC10/WG 10.2 International Conference on Theorem …, 1992 | 32 | 1992 |
Methods for evaluating reference desk performance WF Young RQ, 69-75, 1985 | 31 | 1985 |
Proving a computer system secure. WD Young, WE Boebert, RY Kain ADVANCES IN COMPUTER SYSTEM SECURITY., 1988, 3, 1988 | 30 | 1988 |