Technical Publications

  1. Williams, J.G., "The CC Toolbox," 2nd International Common Criteria Conference, Brighton, UK, July 2001.

  2. Williams, J.G. et al., Common Criteria Profiling Knowledge Base, User Guide, Reports, and CC Toolbox Version 6.0f, National Information Assurance Partnership, February 2000, July 2001.

  3. Williams, J.G., "What does Security Have to Do with Errors in Healthcare?," presentation to the Object Management Group, June 1998.

  4. Williams, J. G., et al., "CORBA Threat-Mitigation Model," presented to the Object Management Group, June 1996.

  5. Williams, J. G., "Sound Information Handling: Application to Errors in Medicine,"  Toward an Electronic Patient Record 96, Medical Records Institute, Vol. 2, pp. 348-355, May 1996.

  6. Williams, J. G., and L. J. LaPadula, "Modeling External Consistency of Automated Systems," Journal of High-Integrity Systems, Vol. 1, No. 3, pp. 249-267, 1995.

  7. Williams, J. G., and M. D. Abrams, "Security Policy Modeling," in Information Systems Security: an Integrated Collection of Essays,  by Abrams, Podel, and JaJodia, IEEE, 1994.

  8. LaPadula, L. J., and J. G. Williams, "Secure Processing From the Desktop:  A Policy for Using Personal Workstations to Process Restricted Company Information," MP‑94B-16, MITRE, February 1994.

  9. Abrams, M. D., E. G. Amoroso, L. J. LaPadula, T. F. Lunt, J. G. Williams,  "Report of an Integrity Research Study Group," Computers and Security, pp. 679-689, Vol. 12, No. 7, November 1993.

  10. Williams, J. G., and M. D. Abrams, "From Orange Book to Federal Criteria," (tutorial) 8th Symposium on Physical and Electronic Criteria,  Princeton, NJ, August 1993.

  11. LaPadula, L. J., and J. G. Williams, "External Consistency in a Networking Environment," New Security Paradigms Workshop, Little Compton, RI, ACM, pp. 131‑137, August 1993.

  12. Williams, J. G.,  "A Shift in Security Modeling Paradigms," New Security Paradigms Workshop, Little Compton, RI, ACM, pp. 57‑61, August 1993.

  13. Williams, J. G., and LaPadula, L. J., "Automated Support for External Consistency," Computer Security Foundations Workshop VI, pp. 71-81, Franconia NH, June 1993.

  14. Williams, J. G., A Guide to Understanding Security Modeling in Trusted Systems,  NCSC‑TG‑10, lib. No. S-239, 669, National Computer Security Center, October 1992.

  15. Williams, J. G.,  R. A. Gove, and L. M. Jaworski, "To Bell and Back:  Developing a Formal Security Model for a C2 System",  7th Computer Security Applications Conference,  December 1991.

  16. Williams, J. G., and L. J. La Padula, "Toward a Universal Integrity Model"  The Computer Security Foundations Workshop IV,  IEEE, June 1991.

  17. Williams, J. G.,  Instantiation Theory: On the Foundations of Automated Deduction, Lecture Notes in Artificial Intelligence, No. 518, Springer-Verlag, 1991.

  18. Williams, J. G., "Modeling Nondisclosure in Terms of the Subject-Instruction Stream,"  Symposium on Research in Security and Privacy,  IEEE, May 1991.

  19. Williams, J. G.,  "On the Formalization of Semantic Conventions," The Journal of Symbolic Logic, Vol. 55, No. 1, March 1990.

  20. Williams, J. G., et al., Final Design Assessment Report of Ford Aerospace Corporation Multinet Gateway System Advanced Development Model, Version 4.0,  C22-REPT-01-90,  National Security Agency, June 1989.

  21. Williams, J. G., Formally Grounded Software Reasoning Systems: Theory and Requirements, MTP-266, MITRE, May 1987.

  22. Williams, J. G.,  "Components of Verification Technology," Proceedings of Verkshop III, Software Engineering Notes, ACM, April 1985.

  23. Williams, J. G.,  B. G. Claybrook, and A-M. G. Claybrook, "Defining Database Views as Data Abstractions" IEEE Transactions on Software Engineering, Vol. SE-11, No. 1,  January 1985.

  24. Williams, J. G.,  and C. H. Applebaum, "PVS - Design for a Practical Verification System," Proceedings ACM'84, October 1984.

  25. Williams, J. G., A Logic for Reasoning About Programs,  MTP-240, MITRE, January 1984.

  26. Williams, J. G., "PVS - Formal Semantics, Vol. 1, Combinator Tree Interpretations, MTR 9133 V1, MITRE, December 1983.

  27. Williams, J. G., and S. Stahl, LSI Guard Security Specification , MTR-8451, MITRE, March 1982.

  28. Williams, J. G. et al., Verification of the ACCAT Guard Downgrade Trusted Process,  Vols. I, II, III, MTR-8463, MITRE, January 1981, September 1981, January 1982.

  29. Williams, J. G.,  and A-M. G. Discepelo, "A Practical Verification System" , Proceedings of  Verkshop II,  April 1981.

  30. Williams, J. G.,  and S. R. Ames, "Demonstrating Security for Trusted Applications on a Security Kernel Base" 1980 Symposium on Security and Privacy, April 1980.

  31. Williams, J. G., "Needed:  Verifiable Guidelines on How to Design a Methodology," Proceedings Verkshop I, Software Engineering Notes, July 1980.

  32. Williams, J. G., D. I. Good, and R. M. Cohen, "Principles of Proving Concurrent Programs" ICSCA-CMP-15, 1979.

  33. Williams, J. G., "Curve Sketching on a Teletype," SIGRAPH, Fall 1978.

  34. Williams, J. G., "Structure Diagrams for Primitive Boolean Algebras," Proceedings of the American Mathematical Society, Vol. 47, 1975.

  35. Williams, J. G., "A Formal Analogy Between Proximity and Finite Dimensionality," Colloquium  Mathematicum, Vol. 31, 1974.

  36. Williams, J. G., "Regarding Arc-wise Accessibility in the Plane," Fundamenta Mathematicae, Vol. 85, 1974.

  37. Williams, J. G., "On a Question of Pulter, Regarding Categories of Structures," Commentationes  Mathematicae Universitatis Carolinae, Vol. 15, 1974.

  38. Williams, J. G., "Nested Sequences of Local Uniform Spaces," Trans. Amer. Math. Soc., Vol. 168, 1972.

  39. Williams, J. G., "Local Uniform Spaces," Trans. Amer. Math. Soc., Vol. 168, 1972.

  40. Williams, J. G., "Multiplication Free Characterization of Reciprocal Addition," Pi Mu Epsilon Journal, Vol. 4, No. 4, 1966.