| 2008 | 
|---|
| 8 | EE | Keith Irwin,
Ting Yu,
William H. Winsborough:
Enforcing security properties in task-based systems.
SACMAT 2008: 41-50 | 
| 7 | EE | Keith Irwin,
Ting Yu,
William H. Winsborough:
Avoiding information leakage in security-policy-aware planning.
WPES 2008: 85-94 | 
| 2007 | 
|---|
| 6 | EE | Qihua Wang,
Ting Yu,
Ninghui Li,
Jorge Lobo,
Elisa Bertino,
Keith Irwin,
Ji-Won Byun:
On the Correctness Criteria of Fine-Grained Access Control in Relational Databases.
VLDB 2007: 555-566 | 
| 2006 | 
|---|
| 5 | EE | Keith Irwin,
Ting Yu,
William H. Winsborough:
On the modeling and analysis of obligations.
ACM Conference on Computer and Communications Security 2006: 134-143 | 
| 2005 | 
|---|
| 4 | EE | Keith Irwin,
Ting Yu:
Preventing attribute information leakage in automated trust negotiation.
ACM Conference on Computer and Communications Security 2005: 36-45 | 
| 3 | EE | Keith Irwin,
Ting Yu:
Determining user privacy preferences by asking the right questions: an automated approach.
WPES 2005: 47-50 | 
| 2004 | 
|---|
| 2 | EE | Mazen Kharbutli,
Keith Irwin,
Yan Solihin,
Jaejin Lee:
Using Prime Numbers for Cache Indexing to Eliminate Conflict Misses.
HPCA 2004: 288-299 | 
| 1 | EE | Keith Irwin,
Ting Yu:
An identifiability-based access control model for privacy protection in open systems.
WPES 2004: 43 |