Ting Yu
Ting Yu
Qatar Computing Research Institute (QCRI)
Geverifieerd e-mailadres voor ncsu.edu
Titel
Geciteerd door
Geciteerd door
Jaar
Aggregate query answering on anonymized tables
Q Zhang, N Koudas, D Srivastava, T Yu
2007 IEEE 23rd international conference on data engineering, 116-125, 2007
4432007
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
T Yu, M Winslett, KE Seamons
ACM Transactions on Information and System Security (TISSEC) 6 (1), 1-42, 2003
3952003
Differentially private spatial decompositions
G Cormode, C Procopiuc, D Srivastava, E Shen, T Yu
2012 IEEE 28th International Conference on Data Engineering, 20-31, 2012
3112012
Negotiating trust in the Web
M Winslett, T Yu, KE Seamons, A Hess, J Jacobson, R Jarvis, B Smith, ...
IEEE Internet Computing 6 (6), 30-37, 2002
3012002
A unified scheme for resource protection in automated trust negotiation
T Yu, M Winslett
2003 Symposium on Security and Privacy, 2003., 110-122, 2003
2602003
Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation.
KE Seamons, M Winslett, T Yu
NDSS, 2001
2342001
Interoperable strategies in automated trust negotiation
T Yu, M Winslett, KE Seamons
Proceedings of the 8th ACM conference on Computer and Communications …, 2001
2322001
On mouse dynamics as a behavioral biometric for authentication
Z Jorgensen, T Yu
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
2142011
Approximate XML joins
S Guha, HV Jagadish, N Koudas, D Srivastava, T Yu
Proceedings of the 2002 ACM SIGMOD international conference on Management of …, 2002
2092002
Requirements for policy languages for trust negotiation
KE Seamons, M Winslett, T Yu, B Smith, E Child, J Jacobson, H Mills, L Yu
Proceedings Third International Workshop on Policies for Distributed Systems …, 2002
2002002
Anonymizing bipartite graph data using safe groupings
G Cormode, D Srivastava, T Yu, Q Zhang
Proceedings of the VLDB Endowment 1 (1), 833-844, 2008
1952008
PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet
T Yu, X Ma, M Winslett
Proceedings of the 7th ACM conference on Computer and communications …, 2000
1812000
Heavy hitter estimation over set-valued data with local differential privacy
Z Qin, Y Yang, T Yu, I Khalil, X Xiao, K Ren
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1722016
Protecting privacy during on-line trust negotiation
KE Seamons, M Winslett, T Yu, L Yu, R Jarvis
International Workshop on Privacy Enhancing Technologies, 129-143, 2002
1452002
Securemr: A service integrity assurance framework for mapreduce
W Wei, J Du, T Yu, X Gu
2009 Annual Computer Security Applications Conference, 73-82, 2009
1432009
On the modeling and analysis of obligations
K Irwin, T Yu, WH Winsborough
Proceedings of the 13th ACM conference on Computer and communications …, 2006
1302006
A roadmap for comprehensive online privacy policy management
AI Antón, E Bertino, N Li, T Yu
Communications of the ACM 50 (7), 109-116, 2007
123*2007
On the Correctness Criteria of Fine-Grained Access Control in Relational Databases.
Q Wang, T Yu, N Li, J Lobo, E Bertino, K Irwin, JW Byun
VLDB 7, 555-566, 2007
1132007
Conservative or liberal? Personalized differential privacy
Z Jorgensen, T Yu, G Cormode
2015 IEEE 31St international conference on data engineering, 1023-1034, 2015
1072015
Protecting sensitive labels in social network data anonymization
M Yuan, L Chen, SY Philip, T Yu
IEEE Transactions on Knowledge and Data Engineering 25 (3), 633-647, 2011
1052011
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20