Technical Publications
- Williams, J.G., "The CC Toolbox," 2nd International Common Criteria Conference, Brighton,
UK, July 2001.
-
Williams, J.G. et al., Common Criteria Profiling Knowledge Base, User Guide, Reports, and
CC Toolbox Version 6.0f, National Information Assurance
Partnership, February 2000, July 2001.
- Williams, J.G., "What does Security Have to Do with Errors in Healthcare?,"
presentation to the Object Management Group, June 1998.
- Williams, J. G., et al., "CORBA Threat-Mitigation Model,"
presented to the Object Management Group, June 1996.
- Williams, J. G., "Sound Information Handling: Application to Errors in
Medicine," Toward an Electronic Patient Record 96, Medical Records
Institute, Vol. 2, pp. 348-355, May 1996.
- Williams, J. G., and L. J. LaPadula, "Modeling External Consistency of
Automated Systems," Journal of High-Integrity Systems, Vol. 1, No. 3,
pp. 249-267, 1995.
- Williams, J. G., and M. D. Abrams, "Security Policy Modeling," in Information
Systems Security: an Integrated Collection of Essays, by Abrams, Podel,
and JaJodia, IEEE, 1994.
- LaPadula, L. J., and J. G. Williams, "Secure Processing From the
Desktop: A Policy for Using Personal Workstations to Process Restricted
Company Information," MP‑94B-16, MITRE, February 1994.
- Abrams, M. D., E. G. Amoroso, L. J. LaPadula, T. F. Lunt, J. G. Williams,
"Report of an Integrity Research Study Group," Computers and
Security, pp. 679-689, Vol. 12, No. 7, November 1993.
- Williams,
J. G., and M. D. Abrams, "From Orange Book to Federal Criteria,"
(tutorial) 8th Symposium on Physical and Electronic Criteria, Princeton,
NJ, August 1993.
- LaPadula,
L. J., and J. G. Williams, "External Consistency in a Networking
Environment," New Security Paradigms Workshop, Little Compton, RI,
ACM, pp. 131‑137, August 1993.
- Williams,
J. G., "A Shift in Security Modeling Paradigms," New Security
Paradigms Workshop, Little Compton, RI, ACM, pp. 57‑61,
August 1993.
- Williams,
J. G., and LaPadula, L. J., "Automated Support for External
Consistency," Computer Security Foundations Workshop VI, pp. 71-81,
Franconia NH, June 1993.
- Williams,
J. G., A Guide to Understanding Security Modeling in Trusted Systems, NCSC‑TG‑10,
lib. No. S-239, 669, National Computer Security Center, October 1992.
- Williams,
J. G., R. A. Gove, and L. M. Jaworski, "To Bell and Back: Developing a
Formal Security Model for a C2 System", 7th Computer Security
Applications Conference, December 1991.
- Williams,
J. G., and L. J. La Padula, "Toward a Universal Integrity Model" The
Computer Security Foundations Workshop IV, IEEE, June 1991.
- Williams,
J. G., Instantiation Theory: On the Foundations of Automated Deduction,
Lecture Notes in Artificial Intelligence, No. 518, Springer-Verlag, 1991.
- Williams,
J. G., "Modeling Nondisclosure in Terms of the Subject-Instruction Stream,"
Symposium on Research in Security and Privacy, IEEE, May 1991.
- Williams,
J. G., "On the Formalization of Semantic Conventions," The
Journal of Symbolic Logic, Vol. 55, No. 1, March 1990.
- Williams,
J. G., et al., Final Design Assessment Report of Ford Aerospace Corporation Multinet
Gateway System Advanced Development Model, Version 4.0, C22-REPT-01-90,
National Security Agency, June 1989.
- Williams,
J. G., Formally Grounded Software Reasoning Systems: Theory and
Requirements, MTP-266,
MITRE, May 1987.
- Williams,
J. G., "Components of Verification Technology," Proceedings of Verkshop
III, Software Engineering Notes, ACM, April 1985.
- Williams,
J. G., B. G. Claybrook, and A-M. G. Claybrook, "Defining Database Views
as Data Abstractions" IEEE Transactions on Software Engineering, Vol.
SE-11, No. 1, January 1985.
- Williams,
J. G., and C. H. Applebaum, "PVS - Design for a Practical Verification
System," Proceedings ACM'84, October 1984.
- Williams,
J. G., A Logic for Reasoning About Programs, MTP-240, MITRE, January
1984.
- Williams,
J. G., "PVS - Formal Semantics, Vol. 1, Combinator Tree Interpretations, MTR 9133
V1, MITRE, December 1983.
- Williams,
J. G., and S. Stahl, LSI Guard Security Specification , MTR-8451,
MITRE, March 1982.
- Williams,
J. G. et al., Verification of the ACCAT Guard Downgrade Trusted Process, Vols. I,
II, III, MTR-8463, MITRE, January 1981, September 1981, January 1982.
- Williams,
J. G., and A-M. G. Discepelo, "A Practical Verification System" , Proceedings
of Verkshop II, April 1981.
- Williams,
J. G., and S. R. Ames, "Demonstrating Security for Trusted Applications
on a Security Kernel Base" 1980 Symposium on Security and Privacy,
April 1980.
- Williams,
J. G., "Needed: Verifiable Guidelines on How to Design a
Methodology," Proceedings Verkshop I, Software Engineering Notes,
July 1980.
- Williams,
J. G., D. I. Good, and R. M. Cohen, "Principles of Proving
Concurrent Programs" ICSCA-CMP-15, 1979.
- Williams,
J. G., "Curve Sketching on a Teletype," SIGRAPH, Fall 1978.
- Williams,
J. G., "Structure Diagrams for Primitive Boolean Algebras," Proceedings
of the American Mathematical Society, Vol. 47, 1975.
- Williams,
J. G., "A Formal Analogy Between Proximity and Finite
Dimensionality," Colloquium Mathematicum, Vol. 31, 1974.
- Williams,
J. G., "Regarding Arc-wise Accessibility in the Plane," Fundamenta
Mathematicae, Vol. 85, 1974.
- Williams,
J. G., "On a Question of Pulter, Regarding Categories of Structures,"
Commentationes Mathematicae Universitatis Carolinae, Vol. 15, 1974.
- Williams,
J. G., "Nested Sequences of Local Uniform Spaces," Trans. Amer.
Math. Soc., Vol. 168, 1972.
- Williams,
J. G., "Local Uniform Spaces," Trans. Amer. Math. Soc., Vol.
168, 1972.
- Williams,
J. G., "Multiplication Free Characterization of Reciprocal Addition,"
Pi Mu Epsilon Journal, Vol. 4, No. 4, 1966.