James G. Williams, Ph.D.
Jim's preferred communication medium is HTML, as illustrated by his development of the pagenotes tooltips. Before his involvement with Web programming, Jim spent many years doing research in information security and automated deduction. Some of his main results are published in the book Instantiation Theory, which provides a foundation for the manipulation of expressions via unification algorithms.
His best-known security work is perhaps A Guide to Understanding Security Modeling in Trusted Systems, which coordinated inputs from more than 100 contributors. The contents of the Guide rest partly on Jim's confidentiality and integrity research, which led to the paper "Sound Information Handling: Application to Errors in Medicine.
The Security Guide also provided much of the necessary structure for the Common Criteria. Jim contributed to the structure and terminology of this ISO security standard, and to some of its more frequently used assurance requirements. Following the publication of the Common Criteria, he developed and maintained (with others) the CC Toolbox.
Jim received his Bachelor of Arts degree from Carleton College and his Ph.D. from the University of California at Berkeley. His security work was performed at the MITRE Corporation and the University of Texas at Austin. Here is a list of Jim's refereed publications.
Jim's spiritual interests include Origins of the Lord's Prayer, Buddhist wisdom energies, and The role of denial in recovery. His political interests are reflected in articles about 'depleted' uranium and about measuring hurricanes. Following treatment for prostate cancer, Jim is now studying and writing about alternative medicine.
Jim's immediate family includes a brother, a daughter, a son, and a wife.
Email: Jim Williams