Follow
Marianne Winslett
Marianne Winslett
Department of Computer Science, University of Illinois at Urbana-Champaign
Verified email at illinois.edu
Title
Cited by
Cited by
Year
Reasoning about action using a possible models approach
MS Winslett
Department of Computer Science, University of Illinois at Urbana-Champaign, 1988
6951988
Functional mechanism: regression analysis under differential privacy
J Zhang, Z Zhang, X Xiao, Y Yang, M Winslett
arXiv preprint arXiv:1208.0219, 2012
4392012
Updating Logical Databases (Cambridge Tracts in Theoretical Computer Science)
M Winslett
Cambridge University Press, 2004
4262004
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
T Yu, M Winslett, KE Seamons
ACM Transactions on Information and System Security (TISSEC) 6 (1), 1-42, 2003
4182003
Preventing history forgery with secure provenance
R Hasan, R Sion, M Winslett
ACM Transactions on Storage (TOS) 5 (4), 1-43, 2009
4172009
Differentially private histogram publication
J Xu, Z Zhang, X Xiao, Y Yang, G Yu, M Winslett
The VLDB journal 22, 797-822, 2013
4082013
Server-directed collective I/O in Panda
KE Seamons, Y Chen, P Jones, J Jozwiak, M Winslett
Supercomputing'95: Proceedings of the 1995 ACM/IEEE Conference on …, 1995
3241995
Negotiating trust in the Web
M Winslett, T Yu, KE Seamons, A Hess, J Jacobson, R Jarvis, B Smith, ...
IEEE Internet Computing 6 (6), 30-37, 2002
3112002
A unified scheme for resource protection in automated trust negotiation
T Yu, M Winslett
2003 Symposium on Security and Privacy, 2003., 110-122, 2003
2842003
Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation.
KE Seamons, M Winslett, T Yu
NDSS, 2001
2462001
Interoperable strategies in automated trust negotiation
T Yu, M Winslett, KE Seamons
Proceedings of the 8th ACM Conference on Computer and Communications …, 2001
2422001
Requirements for policy languages for trust negotiation
KE Seamons, M Winslett, T Yu, B Smith, E Child, J Jacobson, H Mills, L Yu
Proceedings Third International Workshop on Policies for Distributed Systems …, 2002
2182002
PRUNES: an efficient and complete strategy for automated trust negotiation over the internet
T Yu, X Ma, M Winslett
Proceedings of the 7th ACM conference on Computer and communications …, 2000
1962000
Differentially private data cubes: optimizing noise sources and consistency
B Ding, M Winslett, J Han, Z Li
Proceedings of the 2011 ACM SIGMOD International Conference on Management of …, 2011
1902011
No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web
R Gavriloaie, W Nejdl, D Olmedilla, KE Seamons, M Winslett
ESWS, 342-356, 2004
1902004
Introducing secure provenance: problems and challenges
R Hasan, R Sion, M Winslett
Proceedings of the 2007 ACM workshop on Storage security and survivability …, 2007
1892007
Peertrust: Automated trust negotiation for peers on the semantic web
W Nejdl, D Olmedilla, M Winslett
Secure Data Management 3178, 118-132, 2004
1882004
On the use of an extended relational model to handle changing incomplete information
AM Keller, MW Wilkins
IEEE Transactions on Software Engineering, 620-633, 1985
1681985
VEX: Vetting Browser Extensions for Security Vulnerabilities.
S Bandhakavi, ST King, P Madhusudan, M Winslett
USENIX Security Symposium 10, 339-354, 2010
1612010
Protecting privacy during on-line trust negotiation
KE Seamons, M Winslett, T Yu, L Yu, R Jarvis
Privacy Enhancing Technologies: Second International Workshop, PET 2002 San …, 2003
1472003
The system can't perform the operation now. Try again later.
Articles 1–20