Marianne Winslett
Marianne Winslett
Department of Computer Science, University of Illinois at Urbana-Champaign
Verified email at illinois.edu
Title
Cited by
Cited by
Year
Reasoning about action using a possible models approach
MS Winslett
Department of Computer Science, University of Illinois at Urbana-Champaign, 1988
6481988
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
T Yu, M Winslett, KE Seamons
ACM Transactions on Information and System Security (TISSEC) 6 (1), 1-42, 2003
4162003
Updating logical databases
M Winslett
Cambridge University Press, 2005
4072005
Preventing history forgery with secure provenance
R Hasan, R Sion, M Winslett
ACM Transactions on Storage (TOS) 5 (4), 1-43, 2009
3852009
Differentially private histogram publication
J Xu, Z Zhang, X Xiao, Y Yang, G Yu, M Winslett
The VLDB Journal 22 (6), 797-822, 2013
3312013
Server-directed collective I/O in Panda
KE Seamons, Y Chen, P Jones, J Jozwiak, M Winslett
Supercomputing'95: Proceedings of the 1995 ACM/IEEE Conference on …, 1995
3171995
Functional mechanism: regression analysis under differential privacy
J Zhang, Z Zhang, X Xiao, Y Yang, M Winslett
arXiv preprint arXiv:1208.0219, 2012
3072012
Negotiating trust in the Web
M Winslett, T Yu, KE Seamons, A Hess, J Jacobson, R Jarvis, B Smith, ...
IEEE Internet Computing 6 (6), 30-37, 2002
3062002
A unified scheme for resource protection in automated trust negotiation
T Yu, M Winslett
2003 Symposium on Security and Privacy, 2003., 110-122, 2003
2722003
Interoperable strategies in automated trust negotiation
T Yu, M Winslett, KE Seamons
Proceedings of the 8th ACM Conference on Computer and Communications …, 2001
2392001
Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation.
KE Seamons, M Winslett, T Yu
NDSS, 2001
2392001
Requirements for policy languages for trust negotiation
KE Seamons, M Winslett, T Yu, B Smith, E Child, J Jacobson, H Mills, L Yu
Proceedings Third International Workshop on Policies for Distributed Systems …, 2002
2062002
Prunes: an efficient and complete strategy for automated trust negotiation over the internet
T Yu, X Ma, M Winslett
Proceedings of the 7th ACM conference on Computer and communications …, 2000
1902000
No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web
R Gavriloaie, W Nejdl, D Olmedilla, KE Seamons, M Winslett
European Semantic Web Symposium, 342-356, 2004
1872004
Peertrust: Automated trust negotiation for peers on the semantic web
W Nejdl, D Olmedilla, M Winslett
Workshop on secure data management, 118-132, 2004
1862004
Introducing secure provenance: problems and challenges
R Hasan, R Sion, M Winslett
Proceedings of the 2007 ACM workshop on Storage security and survivability …, 2007
1742007
Women in computer science: no shortage here!
M Othman, R Latih
Communications of the ACM 49 (3), 111-114, 2006
160*2006
On the use of an extended relational model to handle changing incomplete information
AM Keller, MW Wilkins
IEEE Transactions on Software Engineering, 620-633, 1985
1551985
Differentially private data cubes: optimizing noise sources and consistency
B Ding, M Winslett, J Han, Z Li
Proceedings of the 2011 ACM SIGMOD International Conference on Management of …, 2011
1512011
Protecting privacy during on-line trust negotiation
KE Seamons, M Winslett, T Yu, L Yu, R Jarvis
International Workshop on Privacy Enhancing Technologies, 129-143, 2002
1482002
The system can't perform the operation now. Try again later.
Articles 1–20