Works (18)

Updated: July 5th, 2023 15:58

2017 article

Exact Detection of Information Leakage: Decidability and Complexity

TRANSACTIONS ON LARGE-SCALE DATA- AND KNOWLEDGE-CENTERED SYSTEMS XXXII, Vol. 10420, pp. 1–23.

By: R. Chirkova n & T. Yu*

author keywords: Privacy and security in data-intensive systems; Information leakage; Data exchange
TL;DR: Managing fine-grained access control in software is rather challenging and if access is not configured carefully, information leakage may happen: Users may infer sensitive information through the data explicitly accessible to them. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: December 3, 2018

2015 conference paper

Detecting opinion spammer groups through community discovery and sentiment analysis

Data and applications security and privacy xxix, 9149, 170–187.

By: E. Choo, T. Yu & M. Chi

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

Interactive preference-aware query optimization

2015 ieee 31st international conference on data engineering (icde), 1512–1515.

By: N. Ong*, S. Rojcewicz*, N. Farnan*, A. Lee*, P. Chrysanthis* & T. Yu n

TL;DR: This work demonstrates two approaches to implementing such a GUI that provide different ways of analyzing and interactively optimizing a PASQL query plan. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

2014 conference paper

Integrity assurance for outsourced databases without DBMS modification

Data and applications security and privacy xxviii, 8566, 1–16.

By: W. Wei & T. Yu

Source: NC State University Libraries
Added: August 6, 2018

2014 conference paper

PAQO: Preference-aware query optimization for decentralized database systems

2014 ieee 30th international conference on data engineering (icde), 424–435.

By: N. Farnan*, A. Lee*, P. Chrysanthis* & T. Yu n

TL;DR: The Preference-Aware Query Optimizer (PAQO) upholds both strict requirements and partially ordered preferences that are issued alongside of the queries that it processes, and is implemented within PosgreSQL. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2013 journal article

Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 25(3), 730–739.

By: J. Du*, D. Dean n, Y. Tan*, X. Gu* & T. Yu n

author keywords: Distributed service integrity attestation; cloud computing; secure distributed data processing
TL;DR: The experimental results show that IntTest can achieve higher attacker pinpointing accuracy than existing approaches, and does not require any special hardware or secure kernel support and imposes little performance impact to the application, which makes it practical for large-scale cloud systems. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2011 journal article

Protecting Sensitive Labels in Social Network Data Anonymization

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 25(3), 633–647.

author keywords: Social networks; privacy; anonymous
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2009 article

Anonymizing bipartite graph data using safe groupings

Cormode, G., Srivastava, D., Yu, T., & Zhang, Q. (2010, February). VLDB JOURNAL, Vol. 19, pp. 115–139.

author keywords: Privacy; Microdata; Graph; Query answering
TL;DR: This work introduces a new family of anonymizations for bipartite graph data, called (k, ℓ)-groupings, which preserve the underlying graph structure perfectly, and instead anonymize the mapping from entities to nodes of the graph. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2009 journal article

Coupling winds to ocean surface currents over the global ocean

OCEAN MODELLING, 29(4), 261–268.

By: Z. Deng n, L. Xie n, B. Liu n, K. Wu*, D. Zhao* & T. Yu*

author keywords: Wind-Current Coupled System; HYCOM; Wind stress; Heat flux; Ocean surface boundary layer; ESMF; Ocean current
UN Sustainable Development Goal Categories
13. Climate Action (Web of Science)
14. Life Below Water (Web of Science; OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2009 journal article

On the Modeling of Honest Players in Reputation Systems

JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 24(5), 808–819.

By: Q. Zhang*, W. Wei n & T. Yu n

author keywords: reputation; trust; user behavior modeling; collusion-resilient behavior testing
TL;DR: A statistical model is built for the transaction histories of honest players that serves as a profiling tool to identify suspicious entities and is combined with existing trust schemes to ensure that they are applied to entities whose transaction records are consistent with the statistical model. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2009 article

SecureMR: A Service Integrity Assurance Framework for Map Reduce

25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, pp. 73–82.

By: W. Wei n, J. Du n, T. Yu n & X. Gu n

TL;DR: The proposed SecureMR consists of five security components, which provide a set of practical security mechanisms that not only ensure MapReduce service integrity as well as to prevent replay and Denial of Service (DoS) attacks, but also preserve the simplicity, applicability and scalability of Map Reduce. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2008 article

A framework for identifying compromised nodes in wireless sensor networks

Zhang, Q., Yu, T., & Ning, P. (2008, March). ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, Vol. 11.

By: Q. Zhang n, T. Yu n & P. Ning n

author keywords: algorithms; security; sensor networks; intrusion detection
TL;DR: An application-independent framework for accurately identifying compromised sensor nodes is proposed and an alert reasoning algorithms to identify compromised nodes are developed that are optimal in the sense that it identifies the largest number of compromised nodes without introducing false positives. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2008 article

Denial of service attacks and defenses in decentralized trust management

Li, J., Li, N., Wang, X. F., & Yu, T. (2009, April). INTERNATIONAL JOURNAL OF INFORMATION SECURITY, Vol. 8, pp. 89–101.

By: J. Li*, N. Li*, X. Wang* & T. Yu n

author keywords: Trust management; Denial of service; Access control; Trust negotiation; Game theory
TL;DR: This paper studies low-bandwidth Denial-of-Service (DoS) attacks that exploit the existence of trust management systems to deplete server resources, and proposes a defense technique using credential caching, and shows that it is effective in the presence of intelligent attackers. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2007 journal article

A roadmap for COMPREHENSIVE online privacy policy management

COMMUNICATIONS OF THE ACM, 50(7), 109–116.

By: A. Anton n, E. Bertino*, N. Li* & T. Yu n

TL;DR: A framework supporting the privacy policy life cycle helps guide the kind of research to consider before sound privacy answers may be realized. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2007 book

Secure data management in decentralized systems

Ting Yu

TL;DR: This book identifies and addresses new challenges in the field of database security, offering solid advice for practitioners and researchers in industry. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2006 journal article

A semantics based approach to privacy languages

Computer Systems Science and Engineering, 21(5), 339–352.

By: N. Li, T. Yu & A. Anton

Source: NC State University Libraries
Added: August 6, 2018

2006 journal article

Integrating XML data sources using approximate joins

ACM TRANSACTIONS ON DATABASE SYSTEMS, 31(1), 161–207.

By: S. Guha*, H. Jagadish*, N. Koudas*, D. Srivastava* & T. Yu n

author keywords: algorithms; experimentation; performance; theory; data integration; tree edit distance; XML; joins; approximate joins
TL;DR: This article quantifies an approximate match in structure and content for pairs of XML documents using well defined notions of distance and shows how notions ofdistance that have metric properties can be incorporated in a framework for joins between XML data sources and introduces the idea of reference sets to facilitate this operation. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2004 journal article

A compressed accessibility map for XML

ACM TRANSACTIONS ON DATABASE SYSTEMS, 29(2), 363–402.

By: T. Yu n, D. Srivastava*, L. Lakshmanan* & H. Jagadish*

author keywords: algorithms; experimentation; performance; theory; access control; structural locality; XML
TL;DR: This article introduces a compressed accessibility map (CAM) as a space- and time-efficient solution to the access control problem for XML data, and develops an algorithm for building an optimal size CAM that takes time linear in the size of the XML data set. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.