- Williams, J.G., "The CC Toolbox," 2nd International Common Criteria Conference, Brighton,
UK, July 2001.
Williams, J.G. et al., Common Criteria Profiling Knowledge Base, User Guide, Reports, and
CC Toolbox Version 6.0f, National Information Assurance
Partnership, February 2000, July 2001.
- Williams, J.G., "What does Security Have to Do with Errors in Healthcare?,"
presentation to the Object Management Group, June 1998.
- Williams, J. G., et al., "CORBA Threat-Mitigation Model,"
presented to the Object Management Group, June 1996.
- Williams, J. G., "Sound Information Handling: Application to Errors in
Medicine," Toward an Electronic Patient Record 96, Medical Records
Institute, Vol. 2, pp. 348-355, May 1996.
- Williams, J. G., and L. J. LaPadula, "Modeling External Consistency of
Automated Systems," Journal of High-Integrity Systems, Vol. 1, No. 3,
pp. 249-267, 1995.
- Williams, J. G., and M. D. Abrams, "Security Policy Modeling," in Information
Systems Security: an Integrated Collection of Essays, by Abrams, Podel,
and JaJodia, IEEE, 1994.
- LaPadula, L. J., and J. G. Williams, "Secure Processing From the
Desktop: A Policy for Using Personal Workstations to Process Restricted
Company Information," MP‑94B-16, MITRE, February 1994.
- Abrams, M. D., E. G. Amoroso, L. J. LaPadula, T. F. Lunt, J. G. Williams,
"Report of an Integrity Research Study Group," Computers and
Security, pp. 679-689, Vol. 12, No. 7, November 1993.
J. G., and M. D. Abrams, "From Orange Book to Federal Criteria,"
(tutorial) 8th Symposium on Physical and Electronic Criteria, Princeton,
NJ, August 1993.
L. J., and J. G. Williams, "External Consistency in a Networking
Environment," New Security Paradigms Workshop, Little Compton, RI,
ACM, pp. 131‑137, August 1993.
J. G., "A Shift in Security Modeling Paradigms," New Security
Paradigms Workshop, Little Compton, RI, ACM, pp. 57‑61,
J. G., and LaPadula, L. J., "Automated Support for External
Consistency," Computer Security Foundations Workshop VI, pp. 71-81,
Franconia NH, June 1993.
J. G., A Guide to Understanding Security Modeling in Trusted Systems, NCSC‑TG‑10,
lib. No. S-239, 669, National Computer Security Center, October 1992.
J. G., R. A. Gove, and L. M. Jaworski, "To Bell and Back: Developing a
Formal Security Model for a C2 System", 7th Computer Security
Applications Conference, December 1991.
J. G., and L. J. La Padula, "Toward a Universal Integrity Model" The
Computer Security Foundations Workshop IV, IEEE, June 1991.
J. G., Instantiation Theory: On the Foundations of Automated Deduction,
Lecture Notes in Artificial Intelligence, No. 518, Springer-Verlag, 1991.
J. G., "Modeling Nondisclosure in Terms of the Subject-Instruction Stream,"
Symposium on Research in Security and Privacy, IEEE, May 1991.
J. G., "On the Formalization of Semantic Conventions," The
Journal of Symbolic Logic, Vol. 55, No. 1, March 1990.
J. G., et al., Final Design Assessment Report of Ford Aerospace Corporation Multinet
Gateway System Advanced Development Model, Version 4.0, C22-REPT-01-90,
National Security Agency, June 1989.
J. G., Formally Grounded Software Reasoning Systems: Theory and
MITRE, May 1987.
J. G., "Components of Verification Technology," Proceedings of Verkshop
III, Software Engineering Notes, ACM, April 1985.
J. G., B. G. Claybrook, and A-M. G. Claybrook, "Defining Database Views
as Data Abstractions" IEEE Transactions on Software Engineering, Vol.
SE-11, No. 1, January 1985.
J. G., and C. H. Applebaum, "PVS - Design for a Practical Verification
System," Proceedings ACM'84, October 1984.
J. G., A Logic for Reasoning About Programs, MTP-240, MITRE, January
J. G., "PVS - Formal Semantics, Vol. 1, Combinator Tree Interpretations, MTR 9133
V1, MITRE, December 1983.
J. G., and S. Stahl, LSI Guard Security Specification , MTR-8451,
MITRE, March 1982.
J. G. et al., Verification of the ACCAT Guard Downgrade Trusted Process, Vols. I,
II, III, MTR-8463, MITRE, January 1981, September 1981, January 1982.
J. G., and A-M. G. Discepelo, "A Practical Verification System" , Proceedings
of Verkshop II, April 1981.
J. G., and S. R. Ames, "Demonstrating Security for Trusted Applications
on a Security Kernel Base" 1980 Symposium on Security and Privacy,
J. G., "Needed: Verifiable Guidelines on How to Design a
Methodology," Proceedings Verkshop I, Software Engineering Notes,
J. G., D. I. Good, and R. M. Cohen, "Principles of Proving
Concurrent Programs" ICSCA-CMP-15, 1979.
J. G., "Curve Sketching on a Teletype," SIGRAPH, Fall 1978.
J. G., "Structure Diagrams for Primitive Boolean Algebras," Proceedings
of the American Mathematical Society, Vol. 47, 1975.
J. G., "A Formal Analogy Between Proximity and Finite
Dimensionality," Colloquium Mathematicum, Vol. 31, 1974.
J. G., "Regarding Arc-wise Accessibility in the Plane," Fundamenta
Mathematicae, Vol. 85, 1974.
J. G., "On a Question of Pulter, Regarding Categories of Structures,"
Commentationes Mathematicae Universitatis Carolinae, Vol. 15, 1974.
J. G., "Nested Sequences of Local Uniform Spaces," Trans. Amer.
Math. Soc., Vol. 168, 1972.
J. G., "Local Uniform Spaces," Trans. Amer. Math. Soc., Vol.
J. G., "Multiplication Free Characterization of Reciprocal Addition,"
Pi Mu Epsilon Journal, Vol. 4, No. 4, 1966.