关注
William D. Young
William D. Young
Lecturer and Research Scientist, University of Texas at Austin
在 cs.utexas.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
An integrated approach to safety and security based on systems theory
W Young, NG Leveson
Communications of the ACM 57 (2), 31-35, 2014
3652014
Systems thinking for safety and security
W Young, N Leveson
Proceedings of the 29th annual computer security applications conference, 1-8, 2013
2362013
An approach to systems verification
WR Bevier, WA Hunt, JS Moore, WD Young
Journal of Automated Reasoning 5, 411-428, 1989
2341989
Extending the noninterference version of MLS for SAT
JT Haigh, WD Young
IEEE Transactions on Software Engineering, 141-150, 1987
2031987
A mechanically verified code generator
WD Young
Journal of Automated Reasoning 5, 493-518, 1989
1261989
An experience using two covert channel analysis techniques on a real system design
JT Haigh, RA Kemmerer, J McHugh, WD Young
IEEE Transactions on Software Engineering, 157-168, 1987
961987
Secure Ada Target: Issues, system design, and verification
WE Boebert, RY Kaln, WD Young, SA Hansohn
1985 IEEE Symposium on Security and Privacy, 176-176, 1985
661985
A verified code generator for a subset of Gypsy
WD Young
University of Texas at Austin, 1988
631988
Secure computing: The secure Ada Target approach.
WE Boebert, RY Kain, WD Young
ADVANCES IN COMPUTER SYSTEM SECURITY., 1988, 3, 1988
571988
A robust machine code proof framework for highly secure applications
DS Hardin, EW Smith, WD Young
Proceedings of the sixth international workshop on the ACL2 theorem prover …, 2006
552006
The proof of correctness of a fault-tolerant circuit design
WR Bevier, WD Young
Dependable Computing for Critical Applications 2, 243-260, 1990
381990
A state-based approach to noninterference
WR Bevier, WD Young
Journal of Computer Security 3 (1), 55-70, 1995
371995
Conceptual systems security requirements analysis: Aerial refueling case study
M Span, LO Mailloux, RF Mills, W Young
IEEE Access 6, 46668-46682, 2018
362018
Verifiable computer security and hardware: Issues
WD Young
Computational Logic, Incorporated, 1991
361991
Toward verified execution environments
WR Bevier, WA Hunt, WD Young
1987 IEEE Symposium on Security and Privacy, 106-106, 1987
361987
Coding for a believable specification to implementation mapping
WD Young, J Mchugh
1987 IEEE Symposium on Security and Privacy, 140-140, 1987
361987
Connection policies and controlled interference
WR Bevier, RM Cohen, WD Young
Proceedings The Eighth IEEE Computer Security Foundations Workshop, 167-176, 1995
321995
Introduction to a formally defined hardware description language
B Brock, WA Hunt Jr, WD Young
Proceedings of the IFIP TC10/WG 10.2 International Conference on Theorem …, 1992
321992
Methods for evaluating reference desk performance
WF Young
RQ, 69-75, 1985
311985
REVEREND ROBOT: AUTOMATION AND CLERGY: with Mohammad Yaqub Chaudhary,“Augmented Reality, Artificial Intelligence, and the Re‐Enchantment of the World”; and William Young …
W Young
Zygon® 54 (2), 479-500, 2019
302019
系统目前无法执行此操作,请稍后再试。
文章 1–20