Seguir
Marianne Winslett
Marianne Winslett
Department of Computer Science, University of Illinois at Urbana-Champaign
Dirección de correo verificada de illinois.edu
Título
Citado por
Citado por
Año
Reasoning about action using a possible models approach
MS Winslett
Department of Computer Science, University of Illinois at Urbana-Champaign, 1988
7161988
Functional mechanism: Regression analysis under differential privacy
J Zhang, Z Zhang, X Xiao, Y Yang, M Winslett
arXiv preprint arXiv:1208.0219, 2012
5212012
Differentially private histogram publication
J Xu, Z Zhang, X Xiao, Y Yang, G Yu, M Winslett
The VLDB journal 22, 797-822, 2013
4722013
Updating Logical Databases (Cambridge Tracts in Theoretical Computer Science)
M Winslett
Cambridge University Press, 2004
4352004
Preventing history forgery with secure provenance
R Hasan, R Sion, M Winslett
ACM Transactions on Storage (TOS) 5 (4), 1-43, 2009
4342009
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
T Yu, M Winslett, KE Seamons
ACM Transactions on Information and System Security (TISSEC) 6 (1), 1-42, 2003
4272003
Server-directed collective I/O in Panda
KE Seamons, Y Chen, P Jones, J Jozwiak, M Winslett
Supercomputing'95: Proceedings of the 1995 ACM/IEEE Conference on …, 1995
3261995
Negotiating trust in the Web
M Winslett, T Yu, KE Seamons, A Hess, J Jacobson, R Jarvis, B Smith, ...
IEEE Internet Computing 6 (6), 30-37, 2002
3152002
A unified scheme for resource protection in automated trust negotiation
T Yu, M Winslett
2003 Symposium on Security and Privacy, 2003., 110-122, 2003
2902003
Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation.
KE Seamons, M Winslett, T Yu
NDSS, 2001
2452001
Interoperable strategies in automated trust negotiation
T Yu, M Winslett, KE Seamons
Proceedings of the 8th ACM Conference on Computer and Communications …, 2001
2412001
Vetting browser extensions for security vulnerabilities with vex
S Bandhakavi, N Tiku, W Pittman, ST King, P Madhusudan, M Winslett
Communications of the ACM 54 (9), 91-99, 2011
2302011
Requirements for policy languages for trust negotiation
KE Seamons, M Winslett, T Yu, B Smith, E Child, J Jacobson, H Mills, L Yu
Proceedings Third International Workshop on Policies for Distributed Systems …, 2002
2172002
Differentially private data cubes: optimizing noise sources and consistency
B Ding, M Winslett, J Han, Z Li
Proceedings of the 2011 ACM SIGMOD International Conference on Management of …, 2011
2012011
Compressing large-scale transformer-based models: A case study on bert
P Ganesh, Y Chen, X Lou, MA Khan, Y Yang, H Sajjad, P Nakov, D Chen, ...
Transactions of the Association for Computational Linguistics 9, 1061-1080, 2021
1962021
No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web
R Gavriloaie, W Nejdl, D Olmedilla, KE Seamons, M Winslett
European Semantic Web Symposium, 342-356, 2004
1942004
PRUNES: an efficient and complete strategy for automated trust negotiation over the internet
T Yu, X Ma, M Winslett
Proceedings of the 7th ACM conference on Computer and communications …, 2000
1942000
Introducing secure provenance: problems and challenges
R Hasan, R Sion, M Winslett
Proceedings of the 2007 ACM workshop on Storage security and survivability …, 2007
1932007
Peertrust: Automated trust negotiation for peers on the semantic web
W Nejdl, D Olmedilla, M Winslett
Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada …, 2004
1902004
On the use of an extended relational model to handle changing incomplete information
AM Keller, MW Wilkins
IEEE Transactions on Software Engineering, 620-633, 1985
1701985
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20