Reasoning about action using a possible models approach MS Winslett Department of Computer Science, University of Illinois at Urbana-Champaign, 1988 | 717 | 1988 |
Functional mechanism: Regression analysis under differential privacy J Zhang, Z Zhang, X Xiao, Y Yang, M Winslett arXiv preprint arXiv:1208.0219, 2012 | 530 | 2012 |
Differentially private histogram publication J Xu, Z Zhang, X Xiao, Y Yang, G Yu, M Winslett The VLDB journal 22, 797-822, 2013 | 476 | 2013 |
Updating Logical Databases (Cambridge Tracts in Theoretical Computer Science) M Winslett Cambridge University Press, 2004 | 438 | 2004 |
Preventing history forgery with secure provenance R Hasan, R Sion, M Winslett ACM Transactions on Storage (TOS) 5 (4), 1-43, 2009 | 436 | 2009 |
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation T Yu, M Winslett, KE Seamons ACM Transactions on Information and System Security (TISSEC) 6 (1), 1-42, 2003 | 428 | 2003 |
Server-directed collective I/O in Panda KE Seamons, Y Chen, P Jones, J Jozwiak, M Winslett Supercomputing'95: Proceedings of the 1995 ACM/IEEE Conference on …, 1995 | 326 | 1995 |
Negotiating trust in the Web M Winslett, T Yu, KE Seamons, A Hess, J Jacobson, R Jarvis, B Smith, ... IEEE Internet Computing 6 (6), 30-37, 2002 | 315 | 2002 |
A unified scheme for resource protection in automated trust negotiation T Yu, M Winslett 2003 Symposium on Security and Privacy, 2003., 110-122, 2003 | 290 | 2003 |
Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation. KE Seamons, M Winslett, T Yu NDSS, 2001 | 245 | 2001 |
Interoperable strategies in automated trust negotiation T Yu, M Winslett, KE Seamons Proceedings of the 8th ACM Conference on Computer and Communications …, 2001 | 243 | 2001 |
Vetting browser extensions for security vulnerabilities with vex S Bandhakavi, N Tiku, W Pittman, ST King, P Madhusudan, M Winslett Communications of the ACM 54 (9), 91-99, 2011 | 233 | 2011 |
Requirements for policy languages for trust negotiation KE Seamons, M Winslett, T Yu, B Smith, E Child, J Jacobson, H Mills, L Yu Proceedings Third International Workshop on Policies for Distributed Systems …, 2002 | 217 | 2002 |
Compressing large-scale transformer-based models: A case study on bert P Ganesh, Y Chen, X Lou, MA Khan, Y Yang, H Sajjad, P Nakov, D Chen, ... Transactions of the Association for Computational Linguistics 9, 1061-1080, 2021 | 203 | 2021 |
Differentially private data cubes: optimizing noise sources and consistency B Ding, M Winslett, J Han, Z Li Proceedings of the 2011 ACM SIGMOD International Conference on Management of …, 2011 | 201 | 2011 |
No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web R Gavriloaie, W Nejdl, D Olmedilla, KE Seamons, M Winslett European Semantic Web Symposium, 342-356, 2004 | 195 | 2004 |
PRUNES: an efficient and complete strategy for automated trust negotiation over the internet T Yu, X Ma, M Winslett Proceedings of the 7th ACM conference on Computer and communications …, 2000 | 194 | 2000 |
Introducing secure provenance: problems and challenges R Hasan, R Sion, M Winslett Proceedings of the 2007 ACM workshop on Storage security and survivability …, 2007 | 193 | 2007 |
Peertrust: Automated trust negotiation for peers on the semantic web W Nejdl, D Olmedilla, M Winslett Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada …, 2004 | 191 | 2004 |
On the use of an extended relational model to handle changing incomplete information AM Keller, MW Wilkins IEEE Transactions on Software Engineering, 620-633, 1985 | 171 | 1985 |