Reasoning about action using a possible models approach MS Winslett Department of Computer Science, University of Illinois at Urbana-Champaign, 1988 | 645 | 1988 |
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation T Yu, M Winslett, KE Seamons ACM Transactions on Information and System Security (TISSEC) 6 (1), 1-42, 2003 | 415 | 2003 |
Updating logical databases M Winslett Cambridge University Press, 2005 | 407 | 2005 |
Preventing history forgery with secure provenance R Hasan, R Sion, M Winslett ACM Transactions on Storage (TOS) 5 (4), 1-43, 2009 | 379 | 2009 |
Differentially private histogram publication J Xu, Z Zhang, X Xiao, Y Yang, G Yu, M Winslett The VLDB Journal 22 (6), 797-822, 2013 | 322 | 2013 |
Server-directed collective I/O in Panda KE Seamons, Y Chen, P Jones, J Jozwiak, M Winslett Supercomputing'95: Proceedings of the 1995 ACM/IEEE Conference on …, 1995 | 315 | 1995 |
Negotiating trust in the Web M Winslett, T Yu, KE Seamons, A Hess, J Jacobson, R Jarvis, B Smith, ... IEEE Internet Computing 6 (6), 30-37, 2002 | 303 | 2002 |
Functional mechanism: regression analysis under differential privacy J Zhang, Z Zhang, X Xiao, Y Yang, M Winslett arXiv preprint arXiv:1208.0219, 2012 | 300 | 2012 |
A unified scheme for resource protection in automated trust negotiation T Yu, M Winslett 2003 Symposium on Security and Privacy, 2003., 110-122, 2003 | 266 | 2003 |
Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation. KE Seamons, M Winslett, T Yu NDSS, 2001 | 239 | 2001 |
Interoperable strategies in automated trust negotiation T Yu, M Winslett, KE Seamons Proceedings of the 8th ACM Conference on Computer and Communications …, 2001 | 238 | 2001 |
Requirements for policy languages for trust negotiation KE Seamons, M Winslett, T Yu, B Smith, E Child, J Jacobson, H Mills, L Yu Proceedings Third International Workshop on Policies for Distributed Systems …, 2002 | 206 | 2002 |
Prunes: an efficient and complete strategy for automated trust negotiation over the internet T Yu, X Ma, M Winslett Proceedings of the 7th ACM conference on Computer and communications …, 2000 | 189 | 2000 |
Peertrust: Automated trust negotiation for peers on the semantic web W Nejdl, D Olmedilla, M Winslett Workshop on secure data management, 118-132, 2004 | 186 | 2004 |
No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web R Gavriloaie, W Nejdl, D Olmedilla, KE Seamons, M Winslett European Semantic Web Symposium, 342-356, 2004 | 185 | 2004 |
Introducing secure provenance: problems and challenges R Hasan, R Sion, M Winslett Proceedings of the 2007 ACM workshop on Storage security and survivability …, 2007 | 171 | 2007 |
Women in computer science: no shortage here! M Othman, R Latih Communications of the ACM 49 (3), 111-114, 2006 | 157* | 2006 |
On the use of an extended relational model to handle changing incomplete information AM Keller, MW Wilkins IEEE Transactions on Software Engineering, 620-633, 1985 | 154 | 1985 |
Differentially private data cubes: optimizing noise sources and consistency B Ding, M Winslett, J Han, Z Li Proceedings of the 2011 ACM SIGMOD International Conference on Management of …, 2011 | 149 | 2011 |
Protecting privacy during on-line trust negotiation KE Seamons, M Winslett, T Yu, L Yu, R Jarvis International Workshop on Privacy Enhancing Technologies, 129-143, 2002 | 148 | 2002 |