Marianne Winslett
Marianne Winslett
Department of Computer Science, University of Illinois at Urbana-Champaign
E-mail confirmado em illinois.edu
TítuloCitado porAno
Reasoning about action using a possible models approach
MS Winslett
Department of Computer Science, University of Illinois at Urbana-Champaign, 1988
6351988
Updating logical databases
M Winslett
Cambridge University Press, 2005
3912005
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
T Yu, M Winslett, KE Seamons
ACM Transactions on Information and System Security (TISSEC) 6 (1), 1-42, 2003
3912003
Preventing history forgery with secure provenance
R Hasan, R Sion, M Winslett
ACM Transactions on Storage (TOS) 5 (4), 12, 2009
3422009
Server-directed collective I/O in Panda
KE Seamons, Y Chen, P Jones, J Jozwiak, M Winslett
Supercomputing'95: Proceedings of the 1995 ACM/IEEE Conference on …, 1995
3001995
Negotiating trust in the Web
M Winslett, T Yu, KE Seamons, A Hess, J Jacobson, R Jarvis, B Smith, ...
IEEE Internet Computing 6 (6), 30-37, 2002
2962002
Differentially private histogram publication
J Xu, Z Zhang, X Xiao, Y Yang, G Yu, M Winslett
The VLDB Journal—The International Journal on Very Large Data Bases 22 (6 …, 2013
2652013
A unified scheme for resource protection in automated trust negotiation
T Yu, M Winslett
2003 Symposium on Security and Privacy, 2003., 110-122, 2003
2492003
Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation.
KE Seamons, M Winslett, T Yu
NDSS, 2001
2282001
Interoperable strategies in automated trust negotiation
T Yu, M Winslett, KE Seamons
Proceedings of the 8th ACM conference on Computer and Communications …, 2001
2252001
Functional mechanism: regression analysis under differential privacy
J Zhang, Z Zhang, X Xiao, Y Yang, M Winslett
Proceedings of the VLDB Endowment 5 (11), 1364-1375, 2012
2132012
Requirements for policy languages for trust negotiation
KE Seamons, M Winslett, T Yu, B Smith, E Child, J Jacobson, H Mills, L Yu
Proceedings Third International Workshop on Policies for Distributed Systems …, 2002
1972002
PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet
T Yu, X Ma, M Winslett
ACM Conference on Computer and Communications Security 2000, 210-219, 2000
1782000
Peertrust: Automated trust negotiation for peers on the semantic web
W Nejdl, D Olmedilla, M Winslett
Workshop on Secure Data Management, 118-132, 2004
1732004
No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web
R Gavriloaie, W Nejdl, D Olmedilla, KE Seamons, M Winslett
European Semantic Web Symposium, 342-356, 2004
1732004
Introducing secure provenance: problems and challenges
R Hasan, R Sion, M Winslett
Proceedings of the 2007 ACM workshop on Storage security and survivability …, 2007
1582007
On the use of an extended relational model to handle changing incomplete information
AM Keller, MW Wilkins
IEEE Transactions on Software Engineering, 620-633, 1985
1551985
Protecting privacy during on-line trust negotiation
KE Seamons, M Winslett, T Yu, L Yu, R Jarvis
International Workshop on Privacy Enhancing Technologies, 129-143, 2002
1452002
Differentially private data cubes: optimizing noise sources and consistency
B Ding, M Winslett, J Han, Z Li
Proceedings of the 2011 ACM SIGMOD International Conference on Management of …, 2011
1332011
VEX: Vetting Browser Extensions for Security Vulnerabilities.
S Bandhakavi, ST King, P Madhusudan, M Winslett
USENIX Security Symposium 10, 339-354, 2010
1332010
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20