Browse by Author "Winslett, Marianne"

  • Zhang, Charles C.; Winslett, Marianne (2007-08)
    When identity-based authorization becomes difficult due to the scalability requirements and highly dynamic nature of open distributed systems, digitally certifiable attributes can be an effective basis for specifying ...

    application/pdf

    application/pdfPDF (236Kb)
  • Termehchy, Arash; Winslett, Marianne (2009-03)
    The popularity of XML has exacerbated the need for an easy-to-use, high precision query interface for XML data. When traditional document-oriented keyword search techniques do not suffice, natural language interfaces and ...

    application/pdf

    application/pdfPDF (553Kb)
  • Termehchy, Arash; Winslett, Marianne (2009-03)
    The popularity of XML has exacerbated the need for an easy-to-use, high precision query interface for XML data. When traditional document-oriented keyword search techniques do not suffice, natural language interfaces and ...

    application/pdf

    application/pdfPDF (553Kb)
  • Hasan, Ragib; Winslett, Marianne; Mitra, Soumyadeb (2009-03)
    The Sarbanes-Oxley Act inspired research on long-term high-integrity retention of business records, based on the long-term immutability guarantees that WORM storage servers offer for files. Researchers recently proposed a ...

    application/pdf

    application/pdfPDF (455Kb)
  • Hasan, Ragib; Winslett, Marianne; Mitra, Soumyadeb (2009-03)
    The Sarbanes-Oxley Act inspired research on long-term high-integrity retention of business records, based on the long-term immutability guarantees that WORM storage servers offer for files. Researchers recently proposed a ...

    application/pdf

    application/pdfPDF (455Kb)
  • Olson, Lars E.; Rosulek, Michael J.; Winslett, Marianne (2007-08)
    Need-to-know is a fundamental security concept: a party should not learn information that is irrelevant to its mission. In this paper we show that during a trust negotiation in which parties show their credentials to one ...

    application/pdf

    application/pdfPDF (345Kb)
  • Lee, Adam J.; Minami, Kazuhiro; Winslett, Marianne (2007-04)
    In distributed proof construction systems, information release policies can make it unlikely that any single node in the system is aware of the complete structure of any particular proof tree. This property makes it difficult ...

    application/pdf

    application/pdfPDF (286Kb)
  • Zhang, Charles C.; Winslett, Marianne (2008-07)
    Automated trust negotiation (ATN) is a promising approach to establishing trust between two entities without any prior knowledge of each other. However, real-world authorization processes often involve online input from ...

    application/pdf

    application/pdfPDF (186Kb)
  • Zhang, Charles C.; Winslett, Marianne (2008-07)
    Automated trust negotiation (ATN) is a promising approach to establishing trust between two entities without any prior knowledge of each other. However, real-world authorization processes often involve online input from ...

    application/pdf

    application/pdfPDF (186Kb)
  • Hasan, Ragib; Sion, Radu; Winslett, Marianne (2009-05-24)

    application/pdf

    application/pdfPDF (647Kb)
  • Lee, Adam J.; Winslett, Marianne (2006-08)
    In trust negotiation and other distributed proving systems, networked entities cooperate to form proofs that are justified by collections of certified attributes. These attributes may be obtained through interactions with ...

    application/pdf

    application/pdfPDF (306Kb)
  • Minami, Kazuhiro; Lee, Adam J.; Winslett, Marianne; Borisov, Nikita (2008-05)
    A publish-subscribe system is an information dissemination infrastructure that supports many-to-many communications among publishers and subscribers. In many publish-subscribe systems, in-network aggregation of input data ...

    application/pdf

    application/pdfPDF (277Kb)
  • Lee, Adam J.; Winslett, Marianne (2007-10)
    To ensure that a trust negotiation succeeds whenever possible, authorization policy compliance checkers must be able to find all minimal sets of their owners' credentials that can be used to satisfy a given policy. If all ...

    application/pdf

    application/pdfPDF (302Kb)
  • Lee, Adam J.; Winslett, Marianne (2008-03)
    Web services are a powerful distributed computing abstraction in that they enable users to develop workflows that incorporate data and information processing services located in multiple organizational domains. Fully ...

    application/pdf

    application/pdfPDF (564Kb)
  • Bandhakavi, Sruthi; Winsborough, William; Winslett, Marianne (2008-05)
    Early work on security-typed languages required that legal information flows be defined statically. More recently, techniques have been introduced that relax these assumptions and allow policies to change at run-time. For ...

    application/pdf

    application/pdfPDF (390Kb)
  • Lee, Adam J.; Winslett, Marianne (2006-02)
    The lack of available identity information in attribute-based trust management systems complicates the design of the audit and incident response systems, anomaly detection algorithms, collusion detection/prevention mechanisms, ...

    application/pdf

    application/pdfPDF (348Kb)