Ting Yu's Publications
Ph.D. Thesis
Ting Yu: "Automated Trust Establishment In Open Systems”. University of
Illinois at Urbana-Champaign, October, 2003.
Edited Books and Book Chapters
- Ting Yu and Sushil Jajodia (eds.) “Secure Data Management in
Decentralized Systems”. Springer 2007.
- Sushil Jajodia and Ting Yu: “Basic Security Concepts”. In Secure Data
Management in Decentralized Systems, Springer 2007.
- Adam J. Lee, Kent E. Seamons, Marianne Winslett and Ting Yu:
“Automated Trust Negotiation in Open Systems”. In Secure Data Management
in Decentralized Systems, Springer 2007.
Refereed Journal and Magazine Publications
- Mohamed Y. Nabeel, Issa Khalil, Bei Guan and Ting Yu, “Following
Passive DNS Traces to Detect Stealthy Malicious Domains via Graph
Inference,” In ACM Transactions on Privacy and Security
(TOPS), 24(3):17:1-17:36, 2020.
- Yury Zhauniarovich, Issa Khalil, Ting Yu and Marc Dacier, “A Survey
on Malicious Domains Detection through DNS Data Analytics,” In ACM
Computing Surveys, 51(4):67:1-67:36, 2018.
- Ling Chen, Ting Yu and Rada Chirkova, “k-Skyband Query Answering with
Differential Privacy,” In Journal of Computer Security, 26(5):
647-676, 2018.
- Euijin Choo, Ting Yu and Min Chi, “Detecting Opinion Spammer Groups
and Spam Targets through Community Discovery and Sentiment Analysis,” In
Journal of Computer Security, 25(3):283-318, 2017.
- Rada Chirkova and Ting Yu, “Exact Detection of Information Leakage:
Decidability and Complexity,” In Transactions on Large-Scale Data-
and Knowledge-Centered Systems, 32:1-23, 2017.
- Rui Zhang, Rui Xue, Ting Yu and Ling Liu, “Dynamic and Efficient
Private Keyword Search over Inverted Index-based Encrypted Data,” In ACM
Transactions on Internet Technology, 16(3):21, 2016.
- Zhan Qin, Kui Ren and Ting Yu, “DPcode: Privacy-preserving Frequent
Visual Patterns Publications on Cloud,” In IEEE Transactions on
Multimedia, 18(5): 929-939, 2016.
- Juan Du, Daniel Joseph Dean, Yongmin Tan, Xiaohui Gu, and Ting Yu,
“Scalable Distributed Service Integrity Attestation for
Software-as-a-Service Clouds,” In IEEE Transactions on Parallel and
Distributed Systems (TPDS), 25(3): 730-739, 2014.
- Mingxuan Yuan, Lei Chen, Philip S. Yu, and Ting Yu, “Protecting
Sensitive Labels in Social Network Data Anonymization,” In IEEE
Transactions on Knowledge and Data Engineering (TKDE), 25(3):
633-647, 2013.
- Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis and Ting Yu,
“Demo: PAQO: A Preference-Aware Query Optimizer for PostgreSQL,” In Proceedings
of the VLDB Endownment, 6(12): 1334-1337, 2013.
- Graham Cormode, Divesh Srivastava, Ting Yu and Qing Zhang:
“Anonymizing Bipartite Graph Data using Safe Groupings,” In The
VLDB Journal, 19(1): 115-139, February 2010.
- Qing Zhang, Wei Wei and Ting Yu: “On the Modeling of Honest Players
in Reputation Systems”. In Journal of Computer Science and
Technology, 24(5): 808-819 September 2009.
- Jiangtao Li, Ninghui Li, Xiaofeng Wang and Ting Yu: “Denial of
Service Attacks and Defenses in Decentralized Trust Management,” In International
Journal of Information Security, 8(2): 89-101, 2009.
- Qing Zhang, Ting Yu and Peng Ning: “A Framework for Identifying
Compromised Nodes in Wireless Sensor Networks,” In ACM Transactions
on Information and System Security (TISSEC), 11(3), 2008.
- Annie I. Anton, Elisa Bertino, Ninghui Li and Ting Yu: “A Roadmap for
Comprehensive Online Privacy Policy Management,” In Communications
of the ACM 50(7): 109-116, July 2007.
- Ninghui Li, Ting Yu and Annie Anton: “A Semantics-Based Approach to
Privacy Languages”. In Computer Systems and Engineering
(CSSE), 2007.
- Sudipto Guha, H.V. Jagadish, Nick Koudas, Divesh Srivastava and Ting
Yu: “Integrating XML Data Sources Using Approximate Joins”. In ACM
Transactions on Database Systems (TODS) 31(1): 161-207, 2006.
- Ting Yu, Divesh Srivastava, Laks V.S. Lakshmanan and H.V. Jagadish: “A
Compressed Accessibility Map for XML”. In ACM Transactions on
Database Systems (TODS) 29(2): 363-402, 2004.
- Ting Yu, Marianne Winslett and Kent E. Seamons: “Supporting Structured
Credentials and Sensitive Policies through Interoperable Strategies in
Automated Trust Negotiation”. In ACM Transaction on Information and
System Security (TISSEC) 6(1): 1-42, February 2003.
- Marianne Winslett, Ting Yu, Kent E. Seamons, Adam Hess, Jared
Jacobson, Ryan Jarvis, Brian Smith and Lina Yu: “Negotiating Trust on
the Web”. In IEEE Internet Computing, November-December, 2002.
- Feng Cao, Ding-Zhu Du, Shitou Han, Dongsoo Kim and Ting Yu: “Line
Digraph Iterations and Diameter Vulnerability”. In Taiwanese
Journal of Mathematics 3(3): 281-290, 1999.
- Ting Yu and Owen Kaser: “A Note on ``On the Conversion of Indirect to
Direct Recursion’’". In ACM Transactions on Programming Language
and Systems (TOPLAS) 19(6): 1085-1087, 1997.
Refereed Conference and Workshop Publications
- Cong Shi, Xiaonan Guo, Ting Yu, Yingying Chen, Yuchen Xie and Jian
Liu, “Mobile Device Usage Recommendation based on User Context Inference
Using Embedded Sensors,” In 29th International Conference on
Computer Communications and Networks (ICCCN), Honolulu, Hawaii,
August 2020.
- Haipei Sun, Xiaokui Xiao, Issa Khalil, Yin Yang, Zhan Qin, Wendy Hui
Wang and Ting Yu, “Analyzing Subgraph Statistics from Extended Local
Views with Decentralized Differential privacy,” In ACM Conference
on Computer and Communications Security (CCS), London, UK,
November 2019.
- Lun-Pin Yuan, Wenjun Hu, Ting Yu, Peng Liu and Sencun Zhu, “Towards
Large-Scale Hunting for Android Negative-Day Malware,” In International
Symposium on Research in Attacks, Intrusions and Defenses (RAID),
Beijing, China, September 2019.
- Haipei Sun, Boxiang Dong, Wendy Hui Wang, Ting Yu and Zhan Qin,
“Truth Inference on Sparse Crowdsourcing Data with Local Differential
Privacy,” In IEEE International Conference on Big Data
(BigData), Seattle, WA, December 2018.
- Issa Khalil, Bei Guan, Mohamed Nabeel and Ting Yu, “A Domain Is Only
as Good as Its Neighbors: Detecting Stealthy Malicious Domains via Graph
Inference,” In ACM Conference on Data and Application Security and
privacy (CODASPY), Tempe, AZ, March 2018.
- Zhan Qin, Ting Yu, Yin Yang, Issa Khalil, Xiaokui Xiao and Kui Ren,
“Generating Synthetic Decentralized Social Graphs with Local
Differential Privacy,” In ACM Conference on Computer and
Communications Security (CCS), Dallas, TX, October 2017.
- Ling Chen, Ting Yu and Rada Chirkova, “Differentially Private
K-Skyband Query Answering through Adaptive Spatial Decomposition,” In Annual
IFIP WG 11.3 Conference on Data and Applications Security and Privacy
(CODASPY), Philadelphia, PA, July 2017.
- Rade Stanojevic, Mohamed Nabeel and Ting Yu, “Distributed Cardinality
Estimation of Set Operations with Differential Privacy,” In IEEE
Symposium on Privacy-Aware Computing, Washington, DC, August
2017.
- Zhan Qin, Yin Yang, Ting Yu, Issa Khalil, Xiaokui Xiao and Kui Ren,
“Heavy Hitter Estimation over Set-Valued Data with Local Differential
Privacy,” In ACM Conference on Computer and Communications Security
(CCS), Vienna, Austria, October 2016.
- Ling Chen, Ting Yu and Rada Chirkova, “Privacy-preserving Two-Party
Skyline Queries over Horizontally Partitioned Data,” In 10th IFIP
WG 11.2 International Conference on Information Security Theory and
Pracrtice (WISTP), Crete Greece, September 2016.
- Zach Jorgensen, Ting Yu and Graham Cormode, “Publishing Attributed
Social Graphs with Formal Privacy Guarantees,” In ACM SIGMOD/PODS
Conference (SIGMOD), San Francisco, CA, June 2016.
- Rui Zhang, Rui Xue and Ting Yu, “PVSAE: A Public Verifiable
Searchable Encryption Service Framework for Outsourced Encrypted Data,”
In 23rd IEEE International Conference on Web Services (ICWS),
San Francisco, CA, June 2016.
- Issa Khalil, Ting Yu and Bei Guan, “Discovery Malicious Domain
through Passive DNS Data Graph Analysis,” In ACM Symposium on
Information, Computer and Communications Security (AsiaCCS),
Xi’an, China, May 2016.
- Ling Chen, Ting Yu and Rada Chirkova, “WaveCluster with Differential
Privacy,” In ACM International Conference on Information and
Knowledge Management (CIKM), Melbourne, Australia, Oct. 2015.
- Farid Alborzi, Rada Chirkova and Ting Yu, “Exact Detection of
Information Leakage in Database Access Control,” In International
Conference on Big Data Analytics and Knowledge Discovery (DaWak),
Valencia, Spain, September 2015.
- Euijin Choo, Ting Yu and Min Chi, “Detecting Opinion Spammer Groups
through Community Discovery and Sentiment Analysis,” In Annual IFIP
WG Working Conference on Data and Applications Security and Privacy
(DBSec), Fairfax, VA, July 2015.
- Zach Jorgensen, Ting Yu and Graham Cormode, “Conservative or Liberal:
Personalized Differential Privacy,” In IEEE Conference on Data
Engineering (ICDE), Seoul, Korea, April 2015.
- Zach Jorgensen, Jing Chen, Christopher S. Gates, Ninghui Li, Robert
W. Proctor and Ting Yu, “Dimensions of Risk in Mobile Applications: A
User Study,” In ACM Conference on Data and Application Security and
Privacy (CODASPY), San Antonio, TX, March 2015.
- Wei Wei and Ting Yu, “Integrity Assurance for Outsourced Databases
without DBMS Modification,” In IFIP Working Conference on Data and
Applications Security and Privacy, Vienna, Austria, July 2014.
- Euijin Choo, Ting Yu, Min Chi and Yan Sun, “Revealing and
Incorporating Implicit Communities to Improve Recommender Systems,” In ACM
Conference on Economics and computation (EC), Stanford, CA, June
2014.
- Zach Jorgensen and Ting Yu, “A Privacy-Preserving Framework for
Personalized, Social Recommendations,” In International Conference
on Extending Database Technology (EDBT), Athens, Greece, March
2014.
- Euijin Choo, Jianchun Jiang and Ting Yu, “COMPARS: Toward An
Empirical Approach for Comparing the Resilience of Reputation Systems,”
In ACM Conference on Data and Application Security and Privacy
(CODASPY), San Antonio, TX, March 2014.
- Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis and Ting Yu,
“Demo: PAQO: Preference-aware Query Optimization for Decentralized
Database Systems,” In IEEE Conference on Data Engineering (ICDE),
Chicago, IL, March 2014.
- Graham Cormode, Entong Shen, Xi Gong, Ting Yu, Cecilia M. Procopiuc
and Divesh Srivastava, “ UMicS: from Anaonymized Data to Usable
Microdata,” In ACM Conference on Information and Knowledge
Management (CIKM), San Francisco, CA, October 2013.
- Entong Shen and Ting Yu, “Mining Frequent Graph Patterns with
Differential Privacy,” In ACM Conference on Knowledge and Data
Mining (KDD), Chicago, Illinois, August 2013.
- Graham Cormode, Celilia M. Procopiuc, Divesh Srivastava, Entong Shen
and Ting Yu, “Empirical Privacy and Empirical Utility of Anonymized
Data,” In Workshop on Privacy-Preserving Data Publication and
Analysis, Brisbane, Australia, April 2013.
- Xi Gong, Ting Yu and Adam J. Lee, “Bounding Trust under Uncertain
Topology Information in Reputation-based Trust Systems,” In 14th
International Conference on Web-Age Information Management,
Beidaihe, China, June 2013.
- Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis and Ting Yu,
“Enabling Intensional Access Control via Preference-aware Query
Optimization,” In ACM Symposium on Access Control Models and
Technologies (SACMAT), Amstaerdam, The Netherlands, June 2013.
- Wei Wei and Ting Yu, “iBigTable: Practical Data Integrity for
Bigtable in Public Cloud,” In ACM Conference on Data and
Application Security and Privacy (CODASPY), San Antonio, TX,
February 2013.
- Omar Chowdhury, Murillo Pontual, William Winsborough, Ting Yu, Keith
Irwin and Jianwei Niu, “Ensuring Authorization Requirements for
Cascading User obligations,” In ACM Symposium on Access Control
Models and Technologies (SACMAT), Newark, NJ, June 2012.
- Jianchun Jiang, Liping Ding, Ennan Zhai and Ting Yu, “VRank: A
Context-Aware Approach to Vulnerability Scoring and Ranking in SOA,” In
International Conference on Secure Software Security and Reliability
(SERE), Washington, DC, June 2012.
- Graham Cormode, Cecilia Procopiuc, Entong Shen, Divesh Srivastava and
Ting Yu, “Differentially Private Spatial Decompositions,” In IEEE
International Conference on Data Engineering (ICDE), Washington,
DC, April 2012.
- Graham Cormode, Entong Shen, Divesh Srivastava and Ting Yu,
“Aggregate Query Answering on Possibilistic Data with Cardinality
Constraints,” In IEEE International Conference on Data Engineering
(ICDE), Washington, DC, April 2012.
- Xi Gong, Ting Yu and Adam J. Lee, “Bounding Trust in Reputation
Systems with Incomplete Information,” In ACM Conference on Data and
Application Security and Privacy (CODASPY), San Antonio, TX,
February 2012.
- Xinfeng Lei, Rui Xue and Ting Yu, “Computational Soundness about
Formal Encryption in the Presence of Secret Shares and Key Cycles,” In International
Conference on Information and Communication Security (ICICS),
Beijing, China, November 2011.
- Xi Gong, Ting Yu, Adam J. Lee, “Poster: On Trust Evaluation with
Missing Information in Reputation Systems,” In ACM Conference on
Computer and Communications Security (CCS), Chicago, IL, October
2011.
- Yuhong Liu, Yan Lindsay Sun and Ting Yu, “Defending
Multiple-User-Multiple-Target Attacks in Online Reputation Systems,” In
IEEE International Conference on Social Computing (SocialCom),
Boston, MA, October 2011.
- Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis and Ting Yu,
“Don’t Reveal My Intention: Protecting User privacy Using Declarative
Preferences during Distributed Query Processing,” In European
Symposium on Research in Computer Security (ESORICS), Leuven,
Belgium, September 2011.
- Jagan Srinivasan, Wei Wei, Xiaosong Ma and Ting Yu, “EMFS:
Email-based Personal Cloud Storage,” In International Conference on
Networking, Architecture, and Storage (NAS), Dalian, China, July
2011.
- Murillo Pontual, Omar Chowdhury, William H. Winsborough, Ting Yu and
Keith Irwin: “On the Management of User Obligations”. In 16th ACM
Symposium on Access Control Models and Technologies (SACMAT),
June 2011.
- Zach Jorgensen and Ting Yu: “On Mouse Dynamics as a Behavioral
Biometric for Authentication”. In the Sixth ACM Symposium on
Information, Computer, and Communications Security (AsiaCCS),
March 2011.
- Qinyuan Feng, Ling Liu, Yan Sun, Ting Yu and Yafei Dai, “Enhancing
Personalized Ranking Quality through Multidimensional Modeling of
Inter-item Competition,” In International Conference on
Collaborative Computing (CollaborateCom), Chicago, IL, October
2010.
- Juan Du, Xiaohui Gu and Ting Yu: “On Verifying Stateful Dataflow
Processing Services in Large-scale Cloud Systems”. In the 17th ACM
Conference on Computer and Communications Security (CCS)
(Poster), October 2010.
- Nicholas L. Franan, Adam J. Lee and Ting Yu: “Investigating
Privacy-Preserving Distributed Query Evaluation”. In the Ninth ACM
Workshop on Privacy in the Electronic Society (WPES), October
2010.
- Wei Wei and Ting Yu: “The Design and Enforcement of a Rule-based
Constraint Policy Language for Service Composition”. In IEEE
International Conference on Privacy, Security, Risk and Trust
(PASSAT), August 2010.
- Murillo Pontual, Keith Irwin, Omar Chowdhury, William H. Winsborough
and Ting Yu: “Failure Feedback for User Obligation Systems”. In IEEE
International Conference on Privacy, Security, Risk and Trust
(PASSAT), August 2010.
- Adam J. Lee and Ting Yu: “Towards Quantitative Analysis of Proofs of
Authorization”. In Computer Security Foundation Symposium (CSF),
Edinburgh, UK, July 2010.
- Adam J. Lee, Ting Yu and Yann Le Gall: “Effective Trust Management
through A Hybrid Logical and Relational Approach“. In ACM Symposium
on Information, Computer and Communications Security (AsiaCCS),
Beijing, China, April 2010.
- Murillow Pontual, Omar Chowdhury, William H. Winsborough, Ting Yu and
Keith Irwin: “Toward Practical Authorization-dependent User Obligation
Systems''. In ACM Symposium on Information, Computer and
Communications Security (AsiaCCS), Beijing, China, April 2010.
- Juan Du, Wei Wei, Xiaohui Gu and Ting Yu: “RunTest: Assuring
Integrity of Dataflow Processing in Cloud Computing Infrastructure''. In
ACM Symposium on Information, Computer and Communications Security
(AsiaCCS), Beijing, China, April 2010.
- Wei Wei, Juan Du, Ting Yu and Xiaohui Gu: “SecureMR: A Service
Integrity Assurance Framework for MapReduce''. In Annual Computer
Security Applications Conference (ACSAC), Honolulu, Hawaii,
December 2009.
- Juan Du, Wei Wei, Xiaohui Gu and Ting Yu: “Towards Secure Dataflow
Processing in Open Distributed Systems''. In ACM Workshop on
Scalable Trusted Computing (STC), Chicago, IL, November 2009.
- Nick Koudas, Divesh Srivastava, Ting Yu and Qing Zhang:
“Distribution-base Microdata Anonymization''. In International
Conference on Very Large Data Base (VLDB), Lyon, France, August,
2009.
- Adam J. Lee and Ting Yu: “Towards A Dynamic and Composable Model of
Trust''. In ACM Symposium on Access Control Models and Technologies
(SACMAT), Stresa, Italy, Jun 2009.
- Keith Irwin, Ting Yu and William H. Winsborough: “Avoiding
Information Leakage in Security-Policy-Aware Planning''. In ACM
Workshop on Privacy in the Electronic Society (WPES),
Alexandria, VA, October 2008.
- Graham Cormode, Divesh Srivastava, Ting Yu and Qing Zhang:
“Anonymizing Bipartite Graph Data Using Safe Groupings''. In International
Conference on Very Large Data Bases (VLDB), Auckland, New
Zealand, 2008.
- Heshan Lin, Xiaosong Ma, Jiangtian Li, Ting Yu and Nagiza Samatova:
“Adaptive Request Scheduling for Parallel Scientific Web Services''. In
International Conference on Scientific and Statistical Database
Management (SSDBM), pp. 276-294, Hong Kong, China, July 2008.
- Keith Irwin, Ting Yu and William H. Winsborough: “Assigning
Responsibilities for Failed Obligations''. In IFIPTM Joined iTrust
and PST Conference on Privacy, Trust Management and Security
(iTrust), pp. 327-342, Trondheim, Norway, June 2008.
- Keith Irwin, Ting Yu and William H. Winsborough: “Enforcing Security
Properties in Task-based Systems''. In ACM Symposium on Access
Control Models and Technologies (SACMAT), pp. 41-50, Estes Park,
CO, June 2008.
- Qihua Wang, Ting Yu, Ninghui Li, Jorge Lobo, Elisa Bertio, Keith
Irwin and Ji-Won Byun: “On the Correctness Criteria of Fine-Grained
Access Control in Relational Databases”. In International
Conference on Very Large Databases (VLDB), Vienna, Austria,
September 2007.
- Qing Zhang, Nick Koudas, Divesh Srivastava and Ting Yu: “Aggregate
Query Answering on Anonymized Tables”. In IEEE International
Conference on Data Engineering (ICDE), Istanbul, Turkey, April
2007.
- Evan Martin, Tao Xie and Ting Yu: “Defining and Measuring Policy
Coverage in Testing Access Control Policies,” In International
Conference on Information and Communications Security (ICICS),
Raleigh, NC, December 2006.
- Keith Irwin, Ting Yu and William H. Winsborough: “On the Modeling and
Analysis of Obligations,” In ACM Conference on Computer and
Communications Security (CCS), Alexandria, VA, October 2006.
- Qing Zhang, Ting Yu and Peng Ning: “A Framework for Identifying
Compromised Nodes in Sensor Networks”. In International Conference
on Security and Privacy in Communication Networks (SecureComm),
Baltimore, MD, August 2006.
- Jiangtao Li, Ninghui Li, Xiaofeng Wang and Ting Yu: “Denial of Service
Attacks and Defenses in Decentralized Trust Management”. In International
Conference on Security and Privacy in Communication Networks
(SecureComm), Baltimore, MD, August 2006.
- Keith Irwin and Ting Yu and Keith Irwin: “Preventing Attribute
Information Leakage in Automated Trust Negotiation”. In ACM
Conference on Computer and Communications Security (CCS),
Alexandria, VA, November 2005.
- Keith Irwin and Ting Yu and Keith Irwin: “Determining User Privacy
Preferences by Asking the Right Questions: An Automated Approach”. In ACM
Workshop on Privacy in Electronic Society (WPES), Alexandria, VA,
November 2005.
- Qing Zhang, Ting Yu and Keith Irwin: “A Classification Scheme for
Trust Functions in Reputation-Based Trust Management”. In International
Workshop on Trust, Security, and Reputation on the Semantic Web,
Hiroshima, November 2004.
- Travis Leithead, Wolfgang Nejdl, Daniel Olmedilla, Kent E. Seamons,
Marianne Winslett, Ting Yu and Charles C. Zhang: “How to Exploit
Ontologies for Trust Negotiation”. In International Workshop on
Trust, Security, and Reputation on the Semantic Web, Hiroshima,
November 2004.
- Ting Yu, Ninghui Li and Annie Antón: “A Formal Semantics for P3P”. In
ACM Workshop on Secure Web Services (SWS), Washington DC,
October 2004.
- Keith Irwin and Ting Yu: “An Identifiability-Based Access Control
Model for Privacy Protection in Open Systems (short paper)”. In ACM
Workshop on Privacy in Electronic Society (WPES), Washington DC,
October 2004.
- Nick Koudas, Michael Rabinovich, Divesh Srivastava and Ting Yu:
“Routing XML Queries (poster)”. In IEEE International Conference on
Database Engineering (ICDE), Boston, PA, March, 2004.
- Ting Yu and Marianne Winslett: “Policy Migration for Sensitive
Credentials in Trust Negotiation”. In ACM Workshop on Privacy in
the Electronic Society (WPES), Washington, DC, October 2003.
- Ting Yu and Marianne Winslett: “A Unified Scheme for Resource
Protection in Automated Trust Negotiation”. In IEEE Symposium on
Security and Privacy, Oakland, CA, May 2003.
- Sudipto Guha, H.V. Jagadish, Nick Koudas, Divesh Srivastava and Ting
Yu: “Index Based Approximate XML Joins (short paper)”. In International
Conference on Data Engineering (ICDE), Bangalore, March 2003.
- Ting Yu, Divesh Srivastava, Laks V. S. Lakshmanan and H. V. Jagadish:
“Compressed Accessibility Map: Efficient Access Control for XML”. In International
Conference on Very Large Data Bases (VLDB), Hong Kong, China,
August 2002.
- Sudipto Guha, H.V. Jagadish, Nick Koudas, Divesh Srivastava and Ting
Yu: “Approximate XML Joins”. In ACM SIGMOD Conference,
Madison, WI, June, 2002.
- Kent E. Seamons, Marianne Winslett, Ting Yu, Bryan Smith, Evan Child,
Jared Jacobson, Hyrum Mills and Lina Yu: “Requirements for Policy
Languages for Trust Negotiation”. In IEEE International Workshop on
Policies for Distributed Systems and Networks (POLICY), Monterey,
CA, June 2002.
- Kent E. Seamons, Marianne Winslett, Ting Yu, Lina Yu and Ryan Jarvis:
“Protecting Privacy During On-line Trust Negotiation”. In International
Workshop on Privacy Enhancing Technologies (PET), San Francisco,
CA, April 2002.
- Ting Yu, Marianne Winslett and Kent E. Seamons: “Interoperable
Strategies in Automated Trust Negotiation”. In ACM Conference on
Computer and Communications Security (CCS), Philadelphia, PA,
November 2001.
- Kent E. Seamons, Marianne Winslett and Ting Yu: “Limiting the
Disclosure of Access Control Policies During Automated Trust
Negotiation”. In Symposium on Network and Distributed System
Security (NDSS), San Diego, February 2001.
- Ting Yu, Xiaosong Ma and M. Winslett: “PRUNES: An Efficient and
Complete Strategy for Trust Negotiation over the Internet”. In ACM
Conference on Computer and Communications Security (CCS), Athens,
November 2000.