• Publications
  • Influence
Reasoning about Action Using a Possible Models Approach
TLDR
It is shown that the PWA fails to solve the frame, ramification, and qualification problems, even with additional simplifying restrictions not imposed by Ginsberg and Smith. Expand
Updating logical databases
  • M. Winslett
  • Computer Science
  • Cambridge tracts in theoretical computer science
  • 26 October 1990
TLDR
This paper presents a meta-modelling framework for model-based semantics of updates and some examples show how this framework can be applied to relational theories. Expand
Functional Mechanism: Regression Analysis under Differential Privacy
TLDR
The main idea is to enforce e-differential privacy by perturbing the objective function of the optimization problem, rather than its results, and it significantly outperforms existing solutions. Expand
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
TLDR
This paper shows how to model the information flow of a negotiation for use in analyzing strategy interoperation, and develops the theory for black-box propositional credentials as well as credentials with internal structure and for access control policies whose contents are (respectively are not) sensitive. Expand
Requirements for policy languages for trust negotiation
TLDR
A model for trust negotiation is described, focusing on the central role of policies, which relies on access control policies that govern access to protected resources by specifying credential combinations that must be submitted to obtain authorization. Expand
A unified scheme for resource protection in automated trust negotiation
  • T. Yu, M. Winslett
  • Computer Science
  • Symposium on Security and Privacy, .
  • 11 May 2003
TLDR
UniPro is proposed, a unified scheme to model protection of resources, including policies, in trust negotiation, which improves on previous work by modeling policies as first-class resources, protecting them in the same way as other resources, providing fine-grained control over policy disclosure, and clearly distinguishing between policy disclosure and policy satisfaction. Expand
No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web
TLDR
This paper shows how an explicit registration step can be avoided on the Semantic Web by using appropriate semantic annotations, rule-oriented access control policies, and automated trust negotiation. Expand
Differentially private data cubes: optimizing noise sources and consistency
TLDR
This paper addresses the problem using differential privacy (DP), which provides provable privacy guarantees for individuals by adding noise to query answers, and provides an efficient procedure with running time polynomial in the number of cuboids to select the initial set of cuboid. Expand
Negotiating Trust on the Web
TLDR
This system is intended for use in any situation where two entities from different security domains need to establish trust - business-to-business and retail interactions, cooperative work and joint ventures, medical records, mobile computing, and so on. Expand
Differentially private histogram publication
TLDR
This paper investigates the publication of DP-compliant histograms, which is an important analytical tool for showing the distribution of a random variable, e.g., hospital bill size for certain patients, and proposes two novel mechanisms, namely NoiseFirst and StructureFirst, for computing DP- Compliant histogram structure. Expand
...
1
2
3
4
5
...