Follow
Phil Windley
Phil Windley
Other namesPhillip J. Windley
Amazon Web Services
Verified email at windley.org - Homepage
Title
Cited by
Cited by
Year
Digital Identity: Unmasking identity management architecture (IMA)
PJ Windley
" O'Reilly Media, Inc.", 2005
4492005
Formal modeling and verification of microprocessors
PJ Windley
IEEE Transactions on Computers 44 (1), 54-72, 1995
961995
The formal verification of generic interpreters
PJ Windley
University of California, Davis, 1990
881990
The Live Web:: Building Event-Based Connections in the Cloud
PD Windley
Cengage Learning, 2012
702012
eGovernment maturity
PJ Windley
USA Wind. Technolometria, 2002
682002
A correctness model for pipelined microprocessors
PJ Windley, ML Coe
International Conference on Theorem Provers in Circuit Design, 33-51, 1994
591994
Mechanically checking a lemma used in an automatic verification tool
PJ Windley, JR Burch
International Conference on Formal Methods in Computer-Aided Design, 362-376, 1996
541996
Sovrin: A protocol and token for self-sovereign identity and decentralized trust
P Windley, D Reed
The Sovrin Foundation: Provo, UT, USA, 2018
412018
How sovrin works
P Windley
Sovrin Foundation, 1-10, 2016
402016
Rules of the Game
PJ Windley, SOA Governance
InfoWorld. com 23, 2006
392006
A theory of generic interpreters
PJ Windley
Advanced Research Working Conference on Correct Hardware Design and …, 1993
371993
Toward a super duper hardware tactic
MD Aagaard, ME Leeser, PJ Windley
HOL Users' Group Workshop, 399-412, 1993
331993
Abstract theories in HOL
PJ Windley
Higher Order Logic Theorem Proving and its Applications, 197-210, 1993
331993
Verifying pipelined microprocessors
PJ Windley
Proceedings of ASP-DAC'95/CHDL'95/VLSI'95 with EDA Technofair, 503-511, 1995
311995
A brief introduction to formal methods [hardware design]
PE Black, KM Hall, MD Jones, TN Larson, PJ Windley
Proceedings of Custom Integrated Circuits Conference, 377-380, 1996
291996
Inference rules for programming languages with side effects in expressions
PE Black, PJ Windley
Theorem Proving in Higher Order Logics: 9th International Conference, TPHOLs …, 1996
271996
Using reputation to augment explicit authorization
PJ Windley, D Daley, B Cutler, K Tew
Proceedings of the 2007 ACM workshop on Digital identity management, 72-81, 2007
252007
A hierarchical methodology for verifying microprogrammed microprocessors
PJ Windley
Proceedings. 1990 IEEE Computer Society Symposium on Research in Security …, 1990
241990
A framework for building reputation systems
PJ Windley, K Tew, D Daley
Www2007. Banff, Canada 49, 2007
232007
Sovrin: An identity metasystem for self-sovereign identity
PJ Windley
Frontiers in Blockchain 4, 626726, 2021
192021
The system can't perform the operation now. Try again later.
Articles 1–20