2008 |
8 | EE | Keith Irwin,
Ting Yu,
William H. Winsborough:
Enforcing security properties in task-based systems.
SACMAT 2008: 41-50 |
7 | EE | Keith Irwin,
Ting Yu,
William H. Winsborough:
Avoiding information leakage in security-policy-aware planning.
WPES 2008: 85-94 |
2007 |
6 | EE | Qihua Wang,
Ting Yu,
Ninghui Li,
Jorge Lobo,
Elisa Bertino,
Keith Irwin,
Ji-Won Byun:
On the Correctness Criteria of Fine-Grained Access Control in Relational Databases.
VLDB 2007: 555-566 |
2006 |
5 | EE | Keith Irwin,
Ting Yu,
William H. Winsborough:
On the modeling and analysis of obligations.
ACM Conference on Computer and Communications Security 2006: 134-143 |
2005 |
4 | EE | Keith Irwin,
Ting Yu:
Preventing attribute information leakage in automated trust negotiation.
ACM Conference on Computer and Communications Security 2005: 36-45 |
3 | EE | Keith Irwin,
Ting Yu:
Determining user privacy preferences by asking the right questions: an automated approach.
WPES 2005: 47-50 |
2004 |
2 | EE | Mazen Kharbutli,
Keith Irwin,
Yan Solihin,
Jaejin Lee:
Using Prime Numbers for Cache Indexing to Eliminate Conflict Misses.
HPCA 2004: 288-299 |
1 | EE | Keith Irwin,
Ting Yu:
An identifiability-based access control model for privacy protection in open systems.
WPES 2004: 43 |