Ting Yu's Publications

Ph.D. Thesis

Ting Yu: "Automated Trust Establishment In Open Systems”. University of Illinois at Urbana-Champaign, October, 2003.

Edited Books and Book Chapters

  1. Ting Yu and Sushil Jajodia (eds.) “Secure Data Management in Decentralized Systems”. Springer 2007.
  2. Sushil Jajodia and Ting Yu: “Basic Security Concepts”. In Secure Data Management in Decentralized Systems, Springer 2007.
  3. Adam J. Lee, Kent E. Seamons, Marianne Winslett and Ting Yu: “Automated Trust Negotiation in Open Systems”. In Secure Data Management in Decentralized Systems, Springer 2007.

Refereed Journal and Magazine Publications

  1. Mohamed Y. Nabeel, Issa Khalil, Bei Guan and Ting Yu, “Following Passive DNS Traces to Detect Stealthy Malicious Domains via Graph Inference,” In ACM Transactions on Privacy and Security (TOPS), 24(3):17:1-17:36, 2020.
  2. Yury Zhauniarovich, Issa Khalil, Ting Yu and Marc Dacier, “A Survey on Malicious Domains Detection through DNS Data Analytics,” In ACM Computing Surveys, 51(4):67:1-67:36, 2018.
  3. Ling Chen, Ting Yu and Rada Chirkova, “k-Skyband Query Answering with Differential Privacy,” In Journal of Computer Security, 26(5): 647-676, 2018.
  4. Euijin Choo, Ting Yu and Min Chi, “Detecting Opinion Spammer Groups and Spam Targets through Community Discovery and Sentiment Analysis,” In Journal of Computer Security, 25(3):283-318, 2017.
  5. Rada Chirkova and Ting Yu, “Exact Detection of Information Leakage: Decidability and Complexity,” In Transactions on Large-Scale Data- and Knowledge-Centered Systems, 32:1-23, 2017.
  6. Rui Zhang, Rui Xue, Ting Yu and Ling Liu, “Dynamic and Efficient Private Keyword Search over Inverted Index-based Encrypted Data,” In ACM Transactions on Internet Technology, 16(3):21, 2016.
  7. Zhan Qin, Kui Ren and Ting Yu, “DPcode: Privacy-preserving Frequent Visual Patterns Publications on Cloud,” In IEEE Transactions on Multimedia, 18(5): 929-939, 2016.
  8. Juan Du, Daniel Joseph Dean, Yongmin Tan, Xiaohui Gu, and Ting Yu, “Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds,” In IEEE Transactions on Parallel and Distributed Systems (TPDS), 25(3): 730-739, 2014.
  9. Mingxuan Yuan, Lei Chen, Philip S. Yu, and Ting Yu, “Protecting Sensitive Labels in Social Network Data Anonymization,” In IEEE Transactions on Knowledge and Data Engineering (TKDE), 25(3): 633-647, 2013.
  10. Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis and Ting Yu, “Demo: PAQO: A Preference-Aware Query Optimizer for PostgreSQL,” In Proceedings of the VLDB Endownment, 6(12): 1334-1337, 2013.
  11. Graham Cormode, Divesh Srivastava, Ting Yu and Qing Zhang: “Anonymizing Bipartite Graph Data using Safe Groupings,” In The VLDB Journal, 19(1): 115-139, February 2010.
  12. Qing Zhang, Wei Wei and Ting Yu: “On the Modeling of Honest Players in Reputation Systems”. In Journal of Computer Science and Technology, 24(5): 808-819 September 2009.
  13. Jiangtao Li, Ninghui Li, Xiaofeng Wang and Ting Yu: “Denial of Service Attacks and Defenses in Decentralized Trust Management,” In International Journal of Information Security, 8(2): 89-101, 2009.
  14. Qing Zhang, Ting Yu and Peng Ning: “A Framework for Identifying Compromised Nodes in Wireless Sensor Networks,” In ACM Transactions on Information and System Security (TISSEC), 11(3), 2008.
  15. Annie I. Anton, Elisa Bertino, Ninghui Li and Ting Yu: “A Roadmap for Comprehensive Online Privacy Policy Management,” In Communications of the ACM 50(7): 109-116, July 2007.
  16. Ninghui Li, Ting Yu and Annie Anton: “A Semantics-Based Approach to Privacy Languages”. In Computer Systems and Engineering (CSSE), 2007.
  17. Sudipto Guha, H.V. Jagadish, Nick Koudas, Divesh Srivastava and Ting Yu: “Integrating XML Data Sources Using Approximate Joins”. In ACM Transactions on Database Systems (TODS) 31(1): 161-207, 2006.
  18. Ting Yu, Divesh Srivastava, Laks V.S. Lakshmanan and H.V. Jagadish: “A Compressed Accessibility Map for XML”. In ACM Transactions on Database Systems (TODS) 29(2): 363-402, 2004.
  19. Ting Yu, Marianne Winslett and Kent E. Seamons: “Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies in Automated Trust Negotiation”. In ACM Transaction on Information and System Security (TISSEC) 6(1): 1-42, February 2003.
  20. Marianne Winslett, Ting Yu, Kent E. Seamons, Adam Hess, Jared Jacobson, Ryan Jarvis, Brian Smith and Lina Yu: “Negotiating Trust on the Web”. In IEEE Internet Computing, November-December, 2002.
  21. Feng Cao, Ding-Zhu Du, Shitou Han, Dongsoo Kim and Ting Yu: “Line Digraph Iterations and Diameter Vulnerability”. In Taiwanese Journal of Mathematics 3(3): 281-290, 1999.
  22. Ting Yu and Owen Kaser: “A Note on ``On the Conversion of Indirect to Direct Recursion’’". In ACM Transactions on Programming Language and Systems (TOPLAS) 19(6): 1085-1087, 1997.

Refereed Conference and Workshop Publications

  1. Cong Shi, Xiaonan Guo, Ting Yu, Yingying Chen, Yuchen Xie and Jian Liu, “Mobile Device Usage Recommendation based on User Context Inference Using Embedded Sensors,” In 29th International Conference on Computer Communications and Networks (ICCCN), Honolulu, Hawaii, August 2020.
  2. Haipei Sun, Xiaokui Xiao, Issa Khalil, Yin Yang, Zhan Qin, Wendy Hui Wang and Ting Yu, “Analyzing Subgraph Statistics from Extended Local Views with Decentralized Differential privacy,” In ACM Conference on Computer and Communications Security (CCS), London, UK, November 2019.
  3. Lun-Pin Yuan, Wenjun Hu, Ting Yu, Peng Liu and Sencun Zhu, “Towards Large-Scale Hunting for Android Negative-Day Malware,” In International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Beijing, China, September 2019.
  4. Haipei Sun, Boxiang Dong, Wendy Hui Wang, Ting Yu and Zhan Qin, “Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy,” In IEEE International Conference on Big Data (BigData), Seattle, WA, December 2018.
  5. Issa Khalil, Bei Guan, Mohamed Nabeel and Ting Yu, “A Domain Is Only as Good as Its Neighbors: Detecting Stealthy Malicious Domains via Graph Inference,” In ACM Conference on Data and Application Security and privacy (CODASPY), Tempe, AZ, March 2018.
  6. Zhan Qin, Ting Yu, Yin Yang, Issa Khalil, Xiaokui Xiao and Kui Ren, “Generating Synthetic Decentralized Social Graphs with Local Differential Privacy,” In ACM Conference on Computer and Communications Security (CCS), Dallas, TX, October 2017.
  7. Ling Chen, Ting Yu and Rada Chirkova, “Differentially Private K-Skyband Query Answering through Adaptive Spatial Decomposition,” In Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (CODASPY), Philadelphia, PA, July 2017.
  8. Rade Stanojevic, Mohamed Nabeel and Ting Yu, “Distributed Cardinality Estimation of Set Operations with Differential Privacy,” In IEEE Symposium on Privacy-Aware Computing, Washington, DC, August 2017.
  9. Zhan Qin, Yin Yang, Ting Yu, Issa Khalil, Xiaokui Xiao and Kui Ren, “Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy,” In ACM Conference on Computer and Communications Security (CCS), Vienna, Austria, October 2016.
  10. Ling Chen, Ting Yu and Rada Chirkova, “Privacy-preserving Two-Party Skyline Queries over Horizontally Partitioned Data,” In 10th IFIP WG 11.2 International Conference on Information Security Theory and Pracrtice (WISTP), Crete Greece, September 2016.
  11. Zach Jorgensen, Ting Yu and Graham Cormode, “Publishing Attributed Social Graphs with Formal Privacy Guarantees,” In ACM SIGMOD/PODS Conference (SIGMOD), San Francisco, CA, June 2016.
  12. Rui Zhang, Rui Xue and Ting Yu, “PVSAE: A Public Verifiable Searchable Encryption Service Framework for Outsourced Encrypted Data,” In 23rd IEEE International Conference on Web Services (ICWS), San Francisco, CA, June 2016.
  13. Issa Khalil, Ting Yu and Bei Guan, “Discovery Malicious Domain through Passive DNS Data Graph Analysis,” In ACM Symposium on Information, Computer and Communications Security (AsiaCCS), Xi’an, China, May 2016.
  14. Ling Chen, Ting Yu and Rada Chirkova, “WaveCluster with Differential Privacy,” In ACM International Conference on Information and Knowledge Management (CIKM), Melbourne, Australia, Oct. 2015.
  15. Farid Alborzi, Rada Chirkova and Ting Yu, “Exact Detection of Information Leakage in Database Access Control,” In International Conference on Big Data Analytics and Knowledge Discovery (DaWak), Valencia, Spain, September 2015.
  16. Euijin Choo, Ting Yu and Min Chi, “Detecting Opinion Spammer Groups through Community Discovery and Sentiment Analysis,” In Annual IFIP WG Working Conference on Data and Applications Security and Privacy (DBSec), Fairfax, VA, July 2015.
  17. Zach Jorgensen, Ting Yu and Graham Cormode, “Conservative or Liberal: Personalized Differential Privacy,” In IEEE Conference on Data Engineering (ICDE), Seoul, Korea, April 2015.
  18. Zach Jorgensen, Jing Chen, Christopher S. Gates, Ninghui Li, Robert W. Proctor and Ting Yu, “Dimensions of Risk in Mobile Applications: A User Study,” In ACM Conference on Data and Application Security and Privacy (CODASPY), San Antonio, TX, March 2015.
  19. Wei Wei and Ting Yu, “Integrity Assurance for Outsourced Databases without DBMS Modification,” In IFIP Working Conference on Data and Applications Security and Privacy, Vienna, Austria, July 2014.
  20. Euijin Choo, Ting Yu, Min Chi and Yan Sun, “Revealing and Incorporating Implicit Communities to Improve Recommender Systems,” In ACM Conference on Economics and computation (EC), Stanford, CA, June 2014.
  21. Zach Jorgensen and Ting Yu, “A Privacy-Preserving Framework for Personalized, Social Recommendations,” In International Conference on Extending Database Technology (EDBT), Athens, Greece, March 2014.
  22. Euijin Choo, Jianchun Jiang and Ting Yu, “COMPARS: Toward An Empirical Approach for Comparing the Resilience of Reputation Systems,” In ACM Conference on Data and Application Security and Privacy (CODASPY), San Antonio, TX, March 2014.
  23. Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis and Ting Yu, “Demo: PAQO: Preference-aware Query Optimization for Decentralized Database Systems,” In IEEE Conference on Data Engineering (ICDE), Chicago, IL, March 2014.
  24. Graham Cormode, Entong Shen, Xi Gong, Ting Yu, Cecilia M. Procopiuc and Divesh Srivastava, “ UMicS: from Anaonymized Data to Usable Microdata,” In ACM Conference on Information and Knowledge Management (CIKM), San Francisco, CA, October 2013.
  25. Entong Shen and Ting Yu, “Mining Frequent Graph Patterns with Differential Privacy,” In ACM Conference on Knowledge and Data Mining (KDD), Chicago, Illinois, August 2013.
  26. Graham Cormode, Celilia M. Procopiuc, Divesh Srivastava, Entong Shen and Ting Yu, “Empirical Privacy and Empirical Utility of Anonymized Data,” In Workshop on Privacy-Preserving Data Publication and Analysis, Brisbane, Australia, April 2013.
  27. Xi Gong, Ting Yu and Adam J. Lee, “Bounding Trust under Uncertain Topology Information in Reputation-based Trust Systems,” In 14th International Conference on Web-Age Information Management, Beidaihe, China, June 2013.
  28. Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis and Ting Yu, “Enabling Intensional Access Control via Preference-aware Query Optimization,” In ACM Symposium on Access Control Models and Technologies (SACMAT), Amstaerdam, The Netherlands, June 2013.
  29. Wei Wei and Ting Yu, “iBigTable: Practical Data Integrity for Bigtable in Public Cloud,” In ACM Conference on Data and Application Security and Privacy (CODASPY), San Antonio, TX, February 2013.
  30. Omar Chowdhury, Murillo Pontual, William Winsborough, Ting Yu, Keith Irwin and Jianwei Niu, “Ensuring Authorization Requirements for Cascading User obligations,” In ACM Symposium on Access Control Models and Technologies (SACMAT), Newark, NJ, June 2012.
  31. Jianchun Jiang, Liping Ding, Ennan Zhai and Ting Yu, “VRank: A Context-Aware Approach to Vulnerability Scoring and Ranking in SOA,” In International Conference on Secure Software Security and Reliability (SERE), Washington, DC, June 2012.
  32. Graham Cormode, Cecilia Procopiuc, Entong Shen, Divesh Srivastava and Ting Yu, “Differentially Private Spatial Decompositions,” In IEEE International Conference on Data Engineering (ICDE), Washington, DC, April 2012.
  33. Graham Cormode, Entong Shen, Divesh Srivastava and Ting Yu, “Aggregate Query Answering on Possibilistic Data with Cardinality Constraints,” In IEEE International Conference on Data Engineering (ICDE), Washington, DC, April 2012.
  34. Xi Gong, Ting Yu and Adam J. Lee, “Bounding Trust in Reputation Systems with Incomplete Information,” In ACM Conference on Data and Application Security and Privacy (CODASPY), San Antonio, TX, February 2012.
  35. Xinfeng Lei, Rui Xue and Ting Yu, “Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles,” In International Conference on Information and Communication Security (ICICS), Beijing, China, November 2011.
  36. Xi Gong, Ting Yu, Adam J. Lee, “Poster: On Trust Evaluation with Missing Information in Reputation Systems,” In ACM Conference on Computer and Communications Security (CCS), Chicago, IL, October 2011.
  37. Yuhong Liu, Yan Lindsay Sun and Ting Yu, “Defending Multiple-User-Multiple-Target Attacks in Online Reputation Systems,” In IEEE International Conference on Social Computing (SocialCom), Boston, MA, October 2011.
  38. Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis and Ting Yu, “Don’t Reveal My Intention: Protecting User privacy Using Declarative Preferences during Distributed Query Processing,” In European Symposium on Research in Computer Security (ESORICS), Leuven, Belgium, September 2011.
  39. Jagan Srinivasan, Wei Wei, Xiaosong Ma and Ting Yu, “EMFS: Email-based Personal Cloud Storage,” In International Conference on Networking, Architecture, and Storage (NAS), Dalian, China, July 2011.
  40. Murillo Pontual, Omar Chowdhury, William H. Winsborough, Ting Yu and Keith Irwin: “On the Management of User Obligations”. In 16th ACM Symposium on Access Control Models and Technologies (SACMAT), June 2011.
  41. Zach Jorgensen and Ting Yu: “On Mouse Dynamics as a Behavioral Biometric for Authentication”. In the Sixth ACM Symposium on Information, Computer, and Communications Security (AsiaCCS), March 2011.
  42. Qinyuan Feng, Ling Liu, Yan Sun, Ting Yu and Yafei Dai, “Enhancing Personalized Ranking Quality through Multidimensional Modeling of Inter-item Competition,” In International Conference on Collaborative Computing (CollaborateCom), Chicago, IL, October 2010.
  43. Juan Du, Xiaohui Gu and Ting Yu: “On Verifying Stateful Dataflow Processing Services in Large-scale Cloud Systems”. In the 17th ACM Conference on Computer and Communications Security (CCS) (Poster), October 2010.
  44. Nicholas L. Franan, Adam J. Lee and Ting Yu: “Investigating Privacy-Preserving Distributed Query Evaluation”. In the Ninth ACM Workshop on Privacy in the Electronic Society (WPES), October 2010.
  45. Wei Wei and Ting Yu: “The Design and Enforcement of a Rule-based Constraint Policy Language for Service Composition”. In IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT), August 2010.
  46. Murillo Pontual, Keith Irwin, Omar Chowdhury, William H. Winsborough and Ting Yu: “Failure Feedback for User Obligation Systems”. In IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT), August 2010.
  47. Adam J. Lee and Ting Yu: “Towards Quantitative Analysis of Proofs of Authorization”. In Computer Security Foundation Symposium (CSF), Edinburgh, UK, July 2010.
  48. Adam J. Lee, Ting Yu and Yann Le Gall: “Effective Trust Management through A Hybrid Logical and Relational Approach“. In ACM Symposium on Information, Computer and Communications Security (AsiaCCS), Beijing, China, April 2010.
  49. Murillow Pontual, Omar Chowdhury, William H. Winsborough, Ting Yu and Keith Irwin: “Toward Practical Authorization-dependent User Obligation Systems''. In ACM Symposium on Information, Computer and Communications Security (AsiaCCS), Beijing, China, April 2010.
  50. Juan Du, Wei Wei, Xiaohui Gu and Ting Yu: “RunTest: Assuring Integrity of Dataflow Processing in Cloud Computing Infrastructure''. In ACM Symposium on Information, Computer and Communications Security (AsiaCCS), Beijing, China, April 2010.
  51. Wei Wei, Juan Du, Ting Yu and Xiaohui Gu: “SecureMR: A Service Integrity Assurance Framework for MapReduce''. In Annual Computer Security Applications Conference (ACSAC), Honolulu, Hawaii, December 2009.
  52. Juan Du, Wei Wei, Xiaohui Gu and Ting Yu: “Towards Secure Dataflow Processing in Open Distributed Systems''. In ACM Workshop on Scalable Trusted Computing (STC), Chicago, IL, November 2009.
  53. Nick Koudas, Divesh Srivastava, Ting Yu and Qing Zhang: “Distribution-base Microdata Anonymization''. In International Conference on Very Large Data Base (VLDB), Lyon, France, August, 2009.
  54. Adam J. Lee and Ting Yu: “Towards A Dynamic and Composable Model of Trust''. In ACM Symposium on Access Control Models and Technologies (SACMAT), Stresa, Italy, Jun 2009.
  55. Keith Irwin, Ting Yu and William H. Winsborough: “Avoiding Information Leakage in Security-Policy-Aware Planning''. In ACM Workshop on Privacy in the Electronic Society (WPES), Alexandria, VA, October 2008.
  56. Graham Cormode, Divesh Srivastava, Ting Yu and Qing Zhang: “Anonymizing Bipartite Graph Data Using Safe Groupings''. In International Conference on Very Large Data Bases (VLDB), Auckland, New Zealand, 2008.
  57. Heshan Lin, Xiaosong Ma, Jiangtian Li, Ting Yu and Nagiza Samatova: “Adaptive Request Scheduling for Parallel Scientific Web Services''. In International Conference on Scientific and Statistical Database Management (SSDBM), pp. 276-294, Hong Kong, China, July 2008.
  58. Keith Irwin, Ting Yu and William H. Winsborough: “Assigning Responsibilities for Failed Obligations''. In IFIPTM Joined iTrust and PST Conference on Privacy, Trust Management and Security (iTrust), pp. 327-342, Trondheim, Norway, June 2008.
  59. Keith Irwin, Ting Yu and William H. Winsborough: “Enforcing Security Properties in Task-based Systems''. In ACM Symposium on Access Control Models and Technologies (SACMAT), pp. 41-50, Estes Park, CO, June 2008.
  60. Qihua Wang, Ting Yu, Ninghui Li, Jorge Lobo, Elisa Bertio, Keith Irwin and Ji-Won Byun: “On the Correctness Criteria of Fine-Grained Access Control in Relational Databases”. In International Conference on Very Large Databases (VLDB), Vienna, Austria, September 2007.
  61. Qing Zhang, Nick Koudas, Divesh Srivastava and Ting Yu: “Aggregate Query Answering on Anonymized Tables”. In IEEE International Conference on Data Engineering (ICDE), Istanbul, Turkey, April 2007.
  62. Evan Martin, Tao Xie and Ting Yu: “Defining and Measuring Policy Coverage in Testing Access Control Policies,” In International Conference on Information and Communications Security (ICICS), Raleigh, NC, December 2006.
  63. Keith Irwin, Ting Yu and William H. Winsborough: “On the Modeling and Analysis of Obligations,” In ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, October 2006.
  64. Qing Zhang, Ting Yu and Peng Ning: “A Framework for Identifying Compromised Nodes in Sensor Networks”. In International Conference on Security and Privacy in Communication Networks (SecureComm), Baltimore, MD, August 2006.
  65. Jiangtao Li, Ninghui Li, Xiaofeng Wang and Ting Yu: “Denial of Service Attacks and Defenses in Decentralized Trust Management”. In International Conference on Security and Privacy in Communication Networks (SecureComm), Baltimore, MD, August 2006.
  66. Keith Irwin and Ting Yu and Keith Irwin: “Preventing Attribute Information Leakage in Automated Trust Negotiation”. In ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, November 2005.
  67. Keith Irwin and Ting Yu and Keith Irwin: “Determining User Privacy Preferences by Asking the Right Questions: An Automated Approach”. In ACM Workshop on Privacy in Electronic Society (WPES), Alexandria, VA, November 2005.
  68. Qing Zhang, Ting Yu and Keith Irwin: “A Classification Scheme for Trust Functions in Reputation-Based Trust Management”. In International Workshop on Trust, Security, and Reputation on the Semantic Web, Hiroshima, November 2004.
  69. Travis Leithead, Wolfgang Nejdl, Daniel Olmedilla, Kent E. Seamons, Marianne Winslett, Ting Yu and Charles C. Zhang: “How to Exploit Ontologies for Trust Negotiation”. In International Workshop on Trust, Security, and Reputation on the Semantic Web, Hiroshima, November 2004.
  70. Ting Yu, Ninghui Li and Annie Antón: “A Formal Semantics for P3P”. In ACM Workshop on Secure Web Services (SWS), Washington DC, October 2004.
  71. Keith Irwin and Ting Yu: “An Identifiability-Based Access Control Model for Privacy Protection in Open Systems (short paper)”. In ACM Workshop on Privacy in Electronic Society (WPES), Washington DC, October 2004.
  72. Nick Koudas, Michael Rabinovich, Divesh Srivastava and Ting Yu: “Routing XML Queries (poster)”. In IEEE International Conference on Database Engineering (ICDE), Boston, PA, March, 2004.
  73. Ting Yu and Marianne Winslett: “Policy Migration for Sensitive Credentials in Trust Negotiation”. In ACM Workshop on Privacy in the Electronic Society (WPES), Washington, DC, October 2003.
  74. Ting Yu and Marianne Winslett: “A Unified Scheme for Resource Protection in Automated Trust Negotiation”. In IEEE Symposium on Security and Privacy, Oakland, CA, May 2003.
  75. Sudipto Guha, H.V. Jagadish, Nick Koudas, Divesh Srivastava and Ting Yu: “Index Based Approximate XML Joins (short paper)”. In International Conference on Data Engineering (ICDE), Bangalore, March 2003.
  76. Ting Yu, Divesh Srivastava, Laks V. S. Lakshmanan and H. V. Jagadish: “Compressed Accessibility Map: Efficient Access Control for XML”. In International Conference on Very Large Data Bases (VLDB), Hong Kong, China, August 2002.
  77. Sudipto Guha, H.V. Jagadish, Nick Koudas, Divesh Srivastava and Ting Yu: “Approximate XML Joins”. In ACM SIGMOD Conference, Madison, WI, June, 2002.
  78. Kent E. Seamons, Marianne Winslett, Ting Yu, Bryan Smith, Evan Child, Jared Jacobson, Hyrum Mills and Lina Yu: “Requirements for Policy Languages for Trust Negotiation”. In IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY), Monterey, CA, June 2002.
  79. Kent E. Seamons, Marianne Winslett, Ting Yu, Lina Yu and Ryan Jarvis: “Protecting Privacy During On-line Trust Negotiation”. In International Workshop on Privacy Enhancing Technologies (PET), San Francisco, CA, April 2002.
  80. Ting Yu, Marianne Winslett and Kent E. Seamons: “Interoperable Strategies in Automated Trust Negotiation”. In ACM Conference on Computer and Communications Security (CCS), Philadelphia, PA, November 2001.
  81. Kent E. Seamons, Marianne Winslett and Ting Yu: “Limiting the Disclosure of Access Control Policies During Automated Trust Negotiation”. In Symposium on Network and Distributed System Security (NDSS), San Diego, February 2001.
  82. Ting Yu, Xiaosong Ma and M. Winslett: “PRUNES: An Efficient and Complete Strategy for Trust Negotiation over the Internet”. In ACM Conference on Computer and Communications Security (CCS), Athens, November 2000.