Ting Yu
Ting Yu
Qatar Computing Research Institute (QCRI)
Verified email at ncsu.edu
TitleCited byYear
Aggregate query answering on anonymized tables
Q Zhang, N Koudas, D Srivastava, T Yu
2007 IEEE 23rd international conference on data engineering, 116-125, 2007
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
T Yu, M Winslett, KE Seamons
ACM Transactions on Information and System Security (TISSEC) 6 (1), 1-42, 2003
Negotiating trust in the Web
M Winslett, T Yu, KE Seamons, A Hess, J Jacobson, R Jarvis, B Smith, ...
IEEE Internet Computing 6 (6), 30-37, 2002
Differentially private spatial decompositions
G Cormode, C Procopiuc, D Srivastava, E Shen, T Yu
2012 IEEE 28th International Conference on Data Engineering, 20-31, 2012
A unified scheme for resource protection in automated trust negotiation
T Yu, M Winslett
2003 Symposium on Security and Privacy, 2003., 110-122, 2003
Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation.
KE Seamons, M Winslett, T Yu
NDSS, 2001
Interoperable strategies in automated trust negotiation
T Yu, M Winslett, KE Seamons
Proceedings of the 8th ACM conference on Computer and Communications …, 2001
Requirements for policy languages for trust negotiation
KE Seamons, M Winslett, T Yu, B Smith, E Child, J Jacobson, H Mills, L Yu
Proceedings Third International Workshop on Policies for Distributed Systems …, 2002
On mouse dynamics as a behavioral biometric for authentication
Z Jorgensen, T Yu
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
Anonymizing bipartite graph data using safe groupings
G Cormode, D Srivastava, T Yu, Q Zhang
Proceedings of the VLDB Endowment 1 (1), 833-844, 2008
PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet
T Yu, X Ma, M Winslett
Proceedings of the 7th ACM conference on Computer and communications …, 2000
Approximate XML joins
S Guha, HV Jagadish, N Koudas, D Srivastava, T Yu
Proceedings of the 2002 ACM SIGMOD international conference on Management of …, 2002
Protecting privacy during on-line trust negotiation
KE Seamons, M Winslett, T Yu, L Yu, R Jarvis
International Workshop on Privacy Enhancing Technologies, 129-143, 2002
Securemr: A service integrity assurance framework for mapreduce
W Wei, J Du, T Yu, X Gu
2009 Annual Computer Security Applications Conference, 73-82, 2009
Heavy hitter estimation over set-valued data with local differential privacy
Z Qin, Y Yang, T Yu, I Khalil, X Xiao, K Ren
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
On the modeling and analysis of obligations
K Irwin, T Yu, WH Winsborough
Proceedings of the 13th ACM conference on Computer and communications …, 2006
A roadmap for comprehensive online privacy policy management
AI Antón, E Bertino, N Li, T Yu
Communications of the ACM 50 (7), 109-116, 2007
On the correctness criteria of fine-grained access control in relational databases
Q Wang, T Yu, N Li, J Lobo, E Bertino, K Irwin, JW Byun
Proceedings of the 33rd international conference on Very large data bases …, 2007
Protecting sensitive labels in social network data anonymization
M Yuan, L Chen, SY Philip, T Yu
IEEE Transactions on Knowledge and Data Engineering 25 (3), 633-647, 2011
Compressed accessibility map: Efficient access control for XML
T Yu, LVS Lakshmanan, D Srivastava, HV Jagadish
VLDB'02: Proceedings of the 28th International Conference on Very Large …, 2002
The system can't perform the operation now. Try again later.
Articles 1–20