Aggregate query answering on anonymized tables Q Zhang, N Koudas, D Srivastava, T Yu 2007 IEEE 23rd international conference on data engineering, 116-125, 2007 | 445 | 2007 |
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation T Yu, M Winslett, KE Seamons ACM Transactions on Information and System Security (TISSEC) 6 (1), 1-42, 2003 | 397 | 2003 |
Differentially private spatial decompositions G Cormode, C Procopiuc, D Srivastava, E Shen, T Yu 2012 IEEE 28th International Conference on Data Engineering, 20-31, 2012 | 329 | 2012 |
Negotiating trust in the Web M Winslett, T Yu, KE Seamons, A Hess, J Jacobson, R Jarvis, B Smith, ... IEEE Internet Computing 6 (6), 30-37, 2002 | 302 | 2002 |
A unified scheme for resource protection in automated trust negotiation T Yu, M Winslett 2003 Symposium on Security and Privacy, 2003., 110-122, 2003 | 258 | 2003 |
Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation. KE Seamons, M Winslett, T Yu NDSS, 2001 | 234 | 2001 |
Interoperable strategies in automated trust negotiation T Yu, M Winslett, KE Seamons Proceedings of the 8th ACM conference on Computer and Communications …, 2001 | 233 | 2001 |
On mouse dynamics as a behavioral biometric for authentication Z Jorgensen, T Yu Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011 | 221 | 2011 |
Approximate XML joins S Guha, HV Jagadish, N Koudas, D Srivastava, T Yu Proceedings of the 2002 ACM SIGMOD international conference on Management of …, 2002 | 211 | 2002 |
Requirements for policy languages for trust negotiation KE Seamons, M Winslett, T Yu, B Smith, E Child, J Jacobson, H Mills, L Yu Proceedings Third International Workshop on Policies for Distributed Systems …, 2002 | 200 | 2002 |
Anonymizing bipartite graph data using safe groupings G Cormode, D Srivastava, T Yu, Q Zhang Proceedings of the VLDB Endowment 1 (1), 833-844, 2008 | 198 | 2008 |
Heavy hitter estimation over set-valued data with local differential privacy Z Qin, Y Yang, T Yu, I Khalil, X Xiao, K Ren Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 191 | 2016 |
PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet T Yu, X Ma, M Winslett Proceedings of the 7th ACM conference on Computer and communications …, 2000 | 181 | 2000 |
Protecting privacy during on-line trust negotiation KE Seamons, M Winslett, T Yu, L Yu, R Jarvis International Workshop on Privacy Enhancing Technologies, 129-143, 2002 | 146 | 2002 |
Securemr: A service integrity assurance framework for mapreduce W Wei, J Du, T Yu, X Gu 2009 Annual Computer Security Applications Conference, 73-82, 2009 | 145 | 2009 |
On the modeling and analysis of obligations K Irwin, T Yu, WH Winsborough Proceedings of the 13th ACM conference on Computer and communications …, 2006 | 131 | 2006 |
A roadmap for comprehensive online privacy policy management AI Antón, E Bertino, N Li, T Yu Communications of the ACM 50 (7), 109-116, 2007 | 124* | 2007 |
On the Correctness Criteria of Fine-Grained Access Control in Relational Databases. Q Wang, T Yu, N Li, J Lobo, E Bertino, K Irwin, JW Byun VLDB 7, 555-566, 2007 | 114 | 2007 |
Conservative or liberal? Personalized differential privacy Z Jorgensen, T Yu, G Cormode 2015 IEEE 31St international conference on data engineering, 1023-1034, 2015 | 113 | 2015 |
Protecting sensitive labels in social network data anonymization M Yuan, L Chen, SY Philip, T Yu IEEE Transactions on Knowledge and Data Engineering 25 (3), 633-647, 2011 | 109 | 2011 |