Follow
Marianne Winslett
Marianne Winslett
Department of Computer Science, University of Illinois at Urbana-Champaign
Verified email at illinois.edu
Title
Cited by
Cited by
Year
Reasoning about action using a possible models approach
MS Winslett
Department of Computer Science, University of Illinois at Urbana-Champaign, 1988
7171988
Functional mechanism: Regression analysis under differential privacy
J Zhang, Z Zhang, X Xiao, Y Yang, M Winslett
arXiv preprint arXiv:1208.0219, 2012
5072012
Differentially private histogram publication
J Xu, Z Zhang, X Xiao, Y Yang, G Yu, M Winslett
The VLDB journal 22, 797-822, 2013
4542013
Updating Logical Databases (Cambridge Tracts in Theoretical Computer Science)
M Winslett
Cambridge University Press, 2004
4342004
Preventing history forgery with secure provenance
R Hasan, R Sion, M Winslett
ACM Transactions on Storage (TOS) 5 (4), 1-43, 2009
4292009
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
T Yu, M Winslett, KE Seamons
ACM Transactions on Information and System Security (TISSEC) 6 (1), 1-42, 2003
4222003
Server-directed collective I/O in Panda
KE Seamons, Y Chen, P Jones, J Jozwiak, M Winslett
Supercomputing'95: Proceedings of the 1995 ACM/IEEE Conference on …, 1995
3261995
Negotiating trust in the Web
M Winslett, T Yu, KE Seamons, A Hess, J Jacobson, R Jarvis, B Smith, ...
IEEE Internet Computing 6 (6), 30-37, 2002
3142002
A unified scheme for resource protection in automated trust negotiation
T Yu, M Winslett
2003 Symposium on Security and Privacy, 2003., 110-122, 2003
2882003
Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation.
KE Seamons, M Winslett, T Yu
NDSS, 2001
2442001
Interoperable strategies in automated trust negotiation
T Yu, M Winslett, KE Seamons
Proceedings of the 8th ACM Conference on Computer and Communications …, 2001
2412001
Vetting browser extensions for security vulnerabilities with vex
S Bandhakavi, N Tiku, W Pittman, ST King, P Madhusudan, M Winslett
Communications of the ACM 54 (9), 91-99, 2011
2322011
Requirements for policy languages for trust negotiation
KE Seamons, M Winslett, T Yu, B Smith, E Child, J Jacobson, H Mills, L Yu
Proceedings Third International Workshop on Policies for Distributed Systems …, 2002
2162002
Differentially private data cubes: optimizing noise sources and consistency
B Ding, M Winslett, J Han, Z Li
Proceedings of the 2011 ACM SIGMOD International Conference on Management of …, 2011
1962011
No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web
R Gavriloaie, W Nejdl, D Olmedilla, KE Seamons, M Winslett
European Semantic Web Symposium, 342-356, 2004
1942004
PRUNES: an efficient and complete strategy for automated trust negotiation over the internet
T Yu, X Ma, M Winslett
Proceedings of the 7th ACM conference on Computer and communications …, 2000
1932000
Introducing secure provenance: problems and challenges
R Hasan, R Sion, M Winslett
Proceedings of the 2007 ACM workshop on Storage security and survivability …, 2007
1912007
Peertrust: Automated trust negotiation for peers on the semantic web
W Nejdl, D Olmedilla, M Winslett
Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada …, 2004
1902004
Compressing large-scale transformer-based models: A case study on bert
P Ganesh, Y Chen, X Lou, MA Khan, Y Yang, H Sajjad, P Nakov, D Chen, ...
Transactions of the Association for Computational Linguistics 9, 1061-1080, 2021
1842021
On the use of an extended relational model to handle changing incomplete information
AM Keller, MW Wilkins
IEEE Transactions on Software Engineering, 620-633, 1985
1731985
The system can't perform the operation now. Try again later.
Articles 1–20