William Winsborough
#184,824
Most Influential Person Now
American computer scientist
William Winsborough's AcademicInfluence.com Rankings
William Winsboroughcomputer-science Degrees
Computer Science
#11887
World Rank
#12651
Historical Rank
Operating Systems
#23
World Rank
#24
Historical Rank
Database
#8976
World Rank
#9438
Historical Rank

Download Badge
Computer Science
William Winsborough's Degrees
- PhD Computer Science Stanford University
- Masters Computer Science Stanford University
- Bachelors Computer Science University of Texas at Austin
Similar Degrees You Can Earn
Why Is William Winsborough Influential?
(Suggest an Edit or Addition)According to Wikipedia, William H. Winsborough was an American computer scientist, having taught at University of Texas at San Antonio and an Elected Fellow of the American Association for the Advancement of Science.
William Winsborough's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Design of a role-based trust-management framework (2002) (879)
- Automated trust negotiation (2000) (482)
- Distributed Credential Chain Discovery in Trust Management (2003) (368)
- Towards practical automated trust negotiation (2002) (269)
- ROWLBAC: representing role based access control in OWL (2008) (254)
- Automated trust negotiation using cryptographic credentials (2005) (185)
- Safety in automated trust negotiation (2004) (181)
- Beyond proof-of-compliance: security analysis in trust management (2005) (166)
- Towards Formal Verification of Role-Based Access Control Policies (2008) (129)
- On the modeling and analysis of obligations (2006) (111)
- Prop revisited: propositional formula as abstract domain for groundness analysis (1991) (110)
- Distributed credential chain discovery in trust management: extended abstract (2001) (106)
- Models for coalition-based access control (CBAC) (2002) (102)
- Beyond proof-of-compliance: safety and availability analysis in trust management (2003) (96)
- Protecting sensitive attributes in automated trust negotiation (2002) (92)
- Multiple Specialization using Minimal-Function Graph Semantics (1992) (83)
- A posteriori compliance control (2007) (79)
- Optimal Groundness Analysis Using Propositional Logic (1996) (65)
- Role-based cascaded delegation (2004) (54)
- Analysis of Shared Data Structures for Compile-Time Garbage (1990) (50)
- Foundations for group-centric secure information sharing models (2009) (49)
- Internet Credential Acceptance Policies (1997) (46)
- Comparison of Abstract Interpretations (1992) (43)
- A conceptual framework for Group-Centric secure information sharing (2009) (37)
- Authenticated Dictionaries for Fresh Attribute Credentials (2003) (37)
- The Quotient of an Abstract Interpretation (1998) (36)
- Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule (2013) (34)
- Negotiating Disclosure of Sensitive Credentials (1999) (33)
- Group-Centric Secure Information-Sharing Models for Isolated Groups (2011) (33)
- Path-Dependent Reachability Analysis for Multiple Specialization (1989) (29)
- Efficient Analysis of Concurrent Constraint Logic Programs (1993) (29)
- Copy Avoidance through Compile-Time Analysis and Local Reuse (1991) (28)
- Live-structure dataflow analysis for Prolog (1994) (27)
- Stale-safe security properties for group-based secure information sharing (2008) (25)
- Transparent And-Parallelism in the Presence of Shared Free Variables (1988) (24)
- A Trust Management Approach for Flexible Policy Management in Security-Typed Languages (2008) (23)
- Towards a framework for group-centric secure collaboration (2009) (21)
- On the management of user obligations (2011) (20)
- Towards Static Flow-Based Declassification for Legacy and Untrusted Programs (2010) (20)
- An Introduction to the Role Based Trust Management Framework RT (2007) (20)
- Apply Model Checking to Security Analysis in Trust Management (2007) (16)
- Automated trust negotiation using cryptographic credentials (2009) (16)
- Role Based Access Control and OWL (2008) (16)
- Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper) (2006) (16)
- Enforcing security properties in task-based systems (2008) (15)
- Visualization of automated trust negotiation (2005) (15)
- Multiple Specialization of Logic Programs with Run-Time Test (1990) (14)
- A policy driven approach to email services (2004) (14)
- Automatic, transparent parallelization of logic programs at compile time (1988) (12)
- The Quotient of an Abstract Interpretation for Comparing Static Analyses (1994) (12)
- Group-Centric Models for Secure and Agile Information Sharing (2010) (11)
- Compile-time memory reuse in logic programming languages through update in place (1999) (11)
- Automated trust negotiation in attribute-based access control (2003) (11)
- Automated trust negotiation technology with attribute-based access control (2003) (10)
- Toward practical authorization-dependent user obligation systems (2010) (10)
- Integrity constraints in trust management (2005) (10)
- A Confluent Semantic Basis for the Analysis of Concurrent Constraint Logic Programs (1997) (10)
- Assigning Responsibility for Failed Obligations (2008) (10)
- Update In Place: Overview of the Siva Project (1993) (9)
- Engineering Trust Management into Software Models (2007) (9)
- Demand Transformation Analysis for Concurrent Constraint Programs (2000) (9)
- Independently Verifiable Decentralized Role-Based Delegation (2010) (8)
- Email feedback: a policy-based approach to overcoming false positives (2005) (7)
- Toward Formal Verification of Role-Based Access Control Policies (2008) (7)
- Semantically Transparent Selective Reset for AND Parallel Interpreters Based on the Origin of Failures (1987) (6)
- Toward practical analysis for trust management policy (2009) (6)
- Role-based trust management security policy analysis and correction environment (RT-SPACE) (2008) (5)
- Using OWL to Model Role Based Access Control (2008) (5)
- Avoiding information leakage in security-policy-aware planning (2008) (4)
- A live-structure data-flow analysis for Prolog: design and evaluation (1993) (4)
- Formal Models for Group-Centric Secure Information Sharing (2009) (4)
- Enforceable and Verifiable Stale-Safe Security Properties in Distributed Systems (2011) (4)
- Proceedings of the 4th international conference on Trust Management (2006) (3)
- Trust Management: 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings (Lecture Notes in Computer Science) (2006) (3)
- Maintaining control while delegating trust: Integrity constraints in trust management (2009) (3)
- Ensuring authorization privileges for cascading user obligations (2012) (3)
- Failure Feedback for User Obligation Systems (2010) (3)
- Annotated Structure Shape Graphs for Abstract Analysis of Prolog (1996) (3)
- Type graph unification (1992) (3)
- Towards Practical Privacy Policy Enforcement (2011) (2)
- Information carrying identity proof trees (2007) (2)
- A live-structure data-flow analysis for Prolog: theory (1993) (2)
- Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems (2006) (2)
- Formal verification of security properties in trust management policy (2014) (2)
- Static analysis of logic programs to detect run-time garbage cells (1992) (1)
- Implementation and Performance Analysis of the Role-Based Trust Management System, RTC (2010) (1)
- Informal presentation: a trust management perspective on managing policy updates in security-typed languages (2007) (1)
- Implementation and Performance Analysis of the Role-based Trust Management System , RT C (2010) (1)
- Refinement-based design of a group-centric secure information sharing model (2012) (1)
- The privacy in the time of the internet: secrecy vs transparency (2012) (1)
- Compile-time memory reuse in single-assignment programming languages: updating recursive data structures in place (1996) (1)
- Source-level transforms for multiple specialization of horn clauses (extended abstract) (1988) (1)
- Efficient Analysis of Reactive Properties of Concurrent Constraint Logic Programs (1992) (1)
- A Logic Programming View of Authorization in Distributed Systems (2003) (0)
- Database Issues in Trust Management and Trust Negotiation (2008) (0)
- Session details: Policies (2007) (0)
- Research Statement Recent Accomplishments (2004) (0)
- Advanced Security Proxy Technology for High Confidence Networks: Advances in Trust Negotiation (2002) (0)
- Security policy analysis in a trust management environment (2009) (0)
- Implementation and Performance Analysis of the Role-Based Trust Management System, RT (2010) (0)
- A framework for private statistics between two participants (2007) (0)
- Trust Management in Open Systems (TMOS) (2002) (0)
- A Hierarchical Release Control Policy Framework (2004) (0)
- Role-based Cascaded Delegation : Model and Implementation (0)
- Obligations that require and affect authorizations (2008) (0)
This paper list is powered by the following services:
Other Resources About William Winsborough
What Schools Are Affiliated With William Winsborough?
William Winsborough is affiliated with the following schools: