Bill is a research manager in the Systems Security Lab, focused on working to create a trustworthy information system environment in the face of challenges such as the growth of organized cybercrime and the rapid adoption of social networking tools and cloud-based services.
Role-based access control, economics of IT security, cryptography, tamper resistant software.
A. Ene, W. Horne, N. Milosavljevic, P. Rao, R. Schreiber, and R. E. Tarjan, Fast exact and heuristic methods for role minimization problems. SACMAT 2008, pp. 1-10.
- S. Haber, Y. Hatano, Y. Honda, W. Horne, K. Miyazaki, T. Sander, S. Tezoku, D. Yao, Efficient signature schemes supporting redaction, pseudonymization, and data deidentification, ASIACCS 2008, pp. 353-362.
- S. Haber, B.G. Horne, J. Pato, T. Sander, R.E. Tarjan, If Piracy Is the Problem, Is DRM the Answer? Digital Rights Management 2003, pp. 224-233.
- B.G. Horne, B. Pinkas, T. Sander, Escrow services and incentives in peer-to-peer networks, ACM Conference on Electronic Commerce 2001, pp. 85-94.
- B.G. Horne, L.R. Matheson, C. Sheehan, R.E. Tarjan, Dynamic Self-Checking Techniques for Improved Tamper Resistance, Digital Rights Management Workshop 2001, pp. 141-159.
- External Advisory Board Member, Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University.
- External Advisory Board Member, Department of Electrical and Computer Engineering, University of New Mexico.