William H. Winsborough - Publications

Affiliations: 
Computer Science The University of Texas at San Antonio, San Antonio, TX, United States 
Area:
Computer Science

38 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2012 Chowdhury O, Pontual M, Winsborough WH, Yu T, Irwin K, Niu J. Ensuring authorization privileges for cascading user obligations Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 33-43. DOI: 10.1145/2295136.2295144  0.368
2011 Krishnan R, Niu J, Sandhu R, Winsborough WH. Group-centric secure information-sharing models for isolated groups Acm Transactions On Information and System Security. 14. DOI: 10.1145/2043621.2043623  0.472
2010 Rocha BPS, Bandhakavi S, Den Hartog J, Winsborough WH, Etalle S. Towards static flow-based declassification for legacy and untrusted programs Proceedings - Ieee Symposium On Security and Privacy. 93-108. DOI: 10.1109/SP.2010.14  0.574
2010 Pontual M, Irwin K, Chowdhury O, Winsborough WH, Yu T. Failure feedback for user obligation systems Proceedings - Socialcom 2010: 2nd Ieee International Conference On Social Computing, Passat 2010: 2nd Ieee International Conference On Privacy, Security, Risk and Trust. 713-720. DOI: 10.1109/SocialCom.2010.111  0.344
2010 Sandhu R, Krishnan R, Niu J, Winsborough WH. Group-centric models for secure and agile information sharing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6258: 55-69. DOI: 10.1007/978-3-642-14706-7_5  0.455
2010 Hobbs TL, Winsborough WH. Implementation and performance analysis of the role-based trust management system, RTC Ifip Advances in Information and Communication Technology. 321: 184-199.  0.555
2009 Etalle S, Winsborough WH. Maintaining control while delegating trust: Integrity constraints in trust management Acm Transactions On Information and System Security. 13. DOI: 10.1145/1609956.1609961  0.601
2009 Li J, Li N, Winsborough WH. Automated trust negotiation using cryptographic credentials Acm Transactions On Information and System Security. 13. DOI: 10.1145/1609956.1609958  0.718
2009 Krishnan R, Niu J, Sandhu R, Winsborough WH. Foundations for group-centric secure information sharing models Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 115-124. DOI: 10.1145/1542207.1542227  0.343
2009 Krishnan R, Sandhu R, Niu J, Winsborough WH. A conceptual framework for Group-Centric secure information sharing Proceedings of the 4th International Symposium On Acm Symposium On Information, Computer and Communications Security, Asiaccs'09. 384-387. DOI: 10.1145/1533057.1533111  0.369
2009 Reith M, Niu J, Winsborough WH. Toward practical analysis for trust management policy Proceedings of the 4th International Symposium On Acm Symposium On Information, Computer and Communications Security, Asiaccs'09. 310-321. DOI: 10.1145/1533057.1533098  0.868
2008 Irwin K, Yu T, Winsborough WH. Avoiding information leakage in security-policy-aware planning Proceedings of the Acm Conference On Computer and Communications Security. 85-94. DOI: 10.1145/1456403.1456418  0.571
2008 Krishnan R, Niu J, Sandhu R, Winsborough WH. Stale-safe security properties for group-based secure information sharing Proceedings of the Acm Conference On Computer and Communications Security. 53-62. DOI: 10.1145/1456396.1456402  0.463
2008 Reith M, Niu J, Winsborough WH. Role-based trust management security policy analysis and correction environment (RT-SPACE) Proceedings - International Conference On Software Engineering. 929-930. DOI: 10.1145/1370175.1370192  0.617
2008 Jha S, Li N, Tripunitara M, Wang Q, Winsborough WH. Toward formal verification of role-based access control policies Ieee Transactions On Dependable and Secure Computing. 5: 242-255. DOI: 10.1109/Tdsc.2007.70225  0.758
2008 Irwin K, Yu T, Winsborough WH. Assigning responsibility for failed obligations Ifip International Federation For Information Processing. 263: 327-342. DOI: 10.1007/978-0-387-09428-1_21  0.415
2007 Winsborough WH, Squicciarini AC, Bertino E. Information carrying identity proof trees Wpes'07 - Proceedings of the 2007 Acm Workshop On Privacy in Electronic Society. 76-79. DOI: 10.1145/1314333.1314348  0.581
2007 Etalle S, Winsborough WH. A posteriori compliance control Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 11-20. DOI: 10.1145/1266840.1266843  0.711
2007 Reith M, Niu J, Winsborough WH. Engineering trust management into software models Proceedings - Icse 2007 Workshops: International Workshop On Modeling in Software Engineering, Mise'07. DOI: 10.1109/MISE.2007.5  0.58
2007 Reith M, Niu J, Winsborough WH. Apply model checking to security analysis in trust management Proceedings - International Conference On Data Engineering. 734-743. DOI: 10.1109/ICDEW.2007.4401061  0.412
2007 Czenko M, Etalle S, Li D, Winsborough WH. An introduction to the role based trust management framework RT Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4677: 246-281.  0.454
2006 Irwin K, Yu T, Winsborough WH. On the modeling and analysis of obligations Proceedings of the Acm Conference On Computer and Communications Security. 134-143. DOI: 10.1145/1180405.1180423  0.678
2006 Winsborough WH, Li N. Safety in automated trust negotiation Acm Transactions On Information and System Security. 9: 352-390. DOI: 10.1145/1178618.1178623  0.637
2006 Kaushik S, Winsborough W, Wijesekera D, Ammann P. Policy transformations for preventing leakage of sensitive information in email systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4127: 163-178. DOI: 10.1007/11805588_12  0.672
2006 Chao Y, Winsborough WH, Jajodia S. A hierarchical release control policy framework Ifip International Federation For Information Processing. 193.  0.367
2005 Li N, Mitchell JC, Winsborough WH. Beyond proof-of-compliance: Security analysis in trust management Journal of the Acm. 52: 474-514. DOI: 10.1145/1066100.1066103  0.586
2005 Yao D, Shin M, Tamassia R, Winsborough WH. Visualization of automated trust negotiation Ieee Workshop On Visualization For Computer Security 2005, Vizsec 05, Proceedings. 65-74. DOI: 10.1109/VIZSEC.2005.1532067  0.308
2005 Firozabadi BS, Winsborough WH, Sahai A. Proceedings of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05): Preface Proceedings - Sixth Ieee International Workshop On Policies For Distributed Systems and Networks, Policy 2005. 2005. DOI: 10.1109/POLICY.2005.28  0.526
2005 Etalle S, Winsborough WH. Integrity constraints in trust management Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 1-10.  0.524
2004 Tamassia R, Yao D, Winsborough WH. Role-based cascaded delegation Proceedings of Acm Symposium On Access Control Models and Technologies (Sacmat 2002). 9: 146-155.  0.321
2003 Li N, Winsborough WH, Mitchell JC. Beyond proof-of-compliance: Safety and availability analysis in trust management Proceedings of the Ieee Computer Society Symposium On Research in Security and Privacy. 123-139. DOI: 10.1109/SECPRI.2003.1199332  0.557
2003 Winsborough WH, Jacobs J. Automated trust negotiation in attribute-based access control Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2003. 2: 252-257. DOI: 10.1109/DISCEX.2003.1194974  0.643
2003 Winsborough WH, Jacobs J. Automated trust negotiation technology with attribute-based access control Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2003. 2: 60-62. DOI: 10.1109/DISCEX.2003.1194916  0.468
2003 Winsborough WH. A logic programming view of authorization in distributed systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2916: 20-46. DOI: 10.1007/978-3-540-24599-5_3  0.501
2002 Li N, Mitchell JC, Winsborough WH. Design of a role-based trust-management framework Proceedings of the Ieee Computer Society Symposium On Research in Security and Privacy. 114-130. DOI: 10.1109/SECPRI.2002.1004366  0.46
2002 Winsborough WH, Li N. Towards practical automated trust negotiation Proceedings - 3rd International Workshop On Policies For Distributed Systems and Networks, Policy 2002. 92-105. DOI: 10.1109/POLICY.2002.1011297  0.634
2002 Winsborough WH, Li N. Protecting sensitive attributes in automated trust negotiation Proceedings of the Acm Conference On Computer and Communications Security. 41-51.  0.625
2000 Winsborough WH, Seamons KE, Jones VE. Automated trust negotiation Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2000. 1: 88-102. DOI: 10.1109/DISCEX.2000.824965  0.558
Show low-probability matches.