Digital Identity: Unmasking identity management architecture (IMA) PJ Windley " O'Reilly Media, Inc.", 2005 | 449 | 2005 |
Formal modeling and verification of microprocessors PJ Windley IEEE Transactions on Computers 44 (1), 54-72, 1995 | 96 | 1995 |
The formal verification of generic interpreters PJ Windley University of California, Davis, 1990 | 88 | 1990 |
The Live Web:: Building Event-Based Connections in the Cloud PD Windley Cengage Learning, 2012 | 70 | 2012 |
eGovernment maturity PJ Windley USA Wind. Technolometria, 2002 | 68 | 2002 |
A correctness model for pipelined microprocessors PJ Windley, ML Coe International Conference on Theorem Provers in Circuit Design, 33-51, 1994 | 59 | 1994 |
Mechanically checking a lemma used in an automatic verification tool PJ Windley, JR Burch International Conference on Formal Methods in Computer-Aided Design, 362-376, 1996 | 54 | 1996 |
Sovrin: A protocol and token for self-sovereign identity and decentralized trust P Windley, D Reed The Sovrin Foundation: Provo, UT, USA, 2018 | 41 | 2018 |
How sovrin works P Windley Sovrin Foundation, 1-10, 2016 | 40 | 2016 |
Rules of the Game PJ Windley, SOA Governance InfoWorld. com 23, 2006 | 39 | 2006 |
A theory of generic interpreters PJ Windley Advanced Research Working Conference on Correct Hardware Design and …, 1993 | 37 | 1993 |
Toward a super duper hardware tactic MD Aagaard, ME Leeser, PJ Windley HOL Users' Group Workshop, 399-412, 1993 | 33 | 1993 |
Abstract theories in HOL PJ Windley Higher Order Logic Theorem Proving and its Applications, 197-210, 1993 | 33 | 1993 |
Verifying pipelined microprocessors PJ Windley Proceedings of ASP-DAC'95/CHDL'95/VLSI'95 with EDA Technofair, 503-511, 1995 | 31 | 1995 |
A brief introduction to formal methods [hardware design] PE Black, KM Hall, MD Jones, TN Larson, PJ Windley Proceedings of Custom Integrated Circuits Conference, 377-380, 1996 | 29 | 1996 |
Inference rules for programming languages with side effects in expressions PE Black, PJ Windley Theorem Proving in Higher Order Logics: 9th International Conference, TPHOLs …, 1996 | 27 | 1996 |
Using reputation to augment explicit authorization PJ Windley, D Daley, B Cutler, K Tew Proceedings of the 2007 ACM workshop on Digital identity management, 72-81, 2007 | 25 | 2007 |
A hierarchical methodology for verifying microprogrammed microprocessors PJ Windley Proceedings. 1990 IEEE Computer Society Symposium on Research in Security …, 1990 | 24 | 1990 |
A framework for building reputation systems PJ Windley, K Tew, D Daley Www2007. Banff, Canada 49, 2007 | 23 | 2007 |
Sovrin: An identity metasystem for self-sovereign identity PJ Windley Frontiers in Blockchain 4, 626726, 2021 | 19 | 2021 |