Ting Yu
#188,034
Most Influential Person Now
Ting Yu's AcademicInfluence.com Rankings
Ting Yucomputer-science Degrees
Computer Science
#12378
World Rank
#13220
Historical Rank
Operating Systems
#25
World Rank
#26
Historical Rank
Information Technology
#89
World Rank
#90
Historical Rank
Algorithms
#503
World Rank
#509
Historical Rank

Download Badge
Computer Science
Ting Yu's Degrees
- PhD Computer Science University of Washington
- Masters Computer Science University of Washington
- Bachelors Computer Science Tsinghua University
Similar Degrees You Can Earn
Why Is Ting Yu Influential?
(Suggest an Edit or Addition)Ting Yu's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Aggregate Query Answering on Anonymized Tables (2007) (398)
- Secure Data Management in Decentralized Systems (2014) (192)
- On mouse dynamics as a behavioral biometric for authentication (2011) (178)
- SecureMR: A Service Integrity Assurance Framework for MapReduce (2009) (132)
- Protecting Sensitive Labels in Social Network Data Anonymization (2013) (122)
- On the modeling and analysis of obligations (2006) (111)
- A roadmap for comprehensive online privacy policy management (2007) (97)
- On the Correctness Criteria of Fine-Grained Access Control in Relational Databases (2007) (96)
- Mining frequent graph patterns with differential privacy (2013) (92)
- Proceedings of the 2012 ACM conference on Computer and communications security (2012) (84)
- A Framework for Identifying Compromised Nodes in Wireless Sensor Networks (2008) (81)
- Defining and Measuring Policy Coverage in Testing Access Control Policies (2006) (75)
- A formal semantics for P3P (2004) (70)
- A Classification Scheme for Trust Functions in Reputation-Based Trust Management (2004) (64)
- RunTest: assuring integrity of dataflow processing in cloud computing infrastructures (2010) (57)
- A Framework for Identifying Compromised Nodes in Sensor Networks (2006) (52)
- Policy migration for sensitive credentials in trust negotiation (2003) (51)
- Preventing attribute information leakage in automated trust negotiation (2005) (44)
- Empirical privacy and empirical utility of anonymized data (2013) (41)
- Integrating XML data sources using approximate joins (2006) (37)
- A compressed accessibility map for XML (2004) (34)
- How to Exploit Ontologies for Trust Negotiation (2004) (34)
- Denial of service attacks and defenses in decentralized trust management (2006) (31)
- Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds (2014) (29)
- PAQO: Preference-aware query optimization for decentralized database systems (2014) (29)
- Don't Reveal My Intension: Protecting User Privacy Using Declarative Preferences during Distributed Query Processing (2011) (21)
- Towards a dynamic and composable model of trust (2009) (20)
- On the management of user obligations (2011) (20)
- EMFS: Email-based Personal Cloud Storage (2011) (19)
- Automated Trust Negotiation in Open Systems (2007) (17)
- A ROADMAP FOR COMPREHENSIVE ONLINE PRIVACY POLICY (2004) (17)
- On verifying stateful dataflow processing services in large-scale cloud systems (2010) (17)
- Proceedings of the 2012 ACM workshop on Privacy in the electronic society (2012) (17)
- Towards secure dataflow processing in open distributed systems (2009) (16)
- Enforcing security properties in task-based systems (2008) (15)
- An identifiability-based access control model for privacy protection in open systems (2004) (13)
- VRank: A Context-Aware Approach to Vulnerability Scoring and Ranking in SOA (2012) (13)
- Distribution-based Microdata Anonymization (2009) (13)
- Defending Multiple-User-Multiple-Target Attacks in Online Reputation Systems (2011) (13)
- Identity management for cloud computing: developments and directions (2011) (12)
- iBigTable: practical data integrity for bigtable in public cloud (2013) (11)
- Investigating privacy-aware distributed query evaluation (2010) (11)
- Integrity Assurance for Outsourced Databases without DBMS Modification (2014) (11)
- Assigning Responsibility for Failed Obligations (2008) (10)
- Determining user privacy preferences by asking the right questions: an automated approach (2005) (10)
- PAQO: A Preference-Aware Query Optimizer for PostgreSQL (2013) (10)
- On the Modeling of Honest Players in Reputation Systems (2008) (10)
- Toward practical authorization-dependent user obligation systems (2010) (10)
- Aggregate Query Answering on Possibilistic Data with Cardinality Constraints (2012) (9)
- Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques (2010) (8)
- Security policy testing via automated program code generation (2009) (8)
- Enhancing personalized ranking quality through multidimensional modeling of inter-item competition (2010) (7)
- Effective trust management through a hybrid logical and relational approach (2010) (6)
- Proceedings of the 2012 ACM Workshop on Building analysis datasets and gathering experience returns for security (2012) (5)
- the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012 (2012) (5)
- Bounding trust in reputation systems with incomplete information (2012) (5)
- Basic Security Concepts (2007) (4)
- Proceedings of the 2012 ACM Workshop on Cloud computing security workshop (2012) (4)
- Interactive preference-aware query optimization (2015) (4)
- Proceedings of the 2007 ACM workshop on Privacy in electronic society (2007) (4)
- Proceedings of the seventh ACM workshop on Scalable trusted computing (2012) (4)
- Avoiding information leakage in security-policy-aware planning (2008) (4)
- The Design and Enforcement of a Rule-based Constraint Policy Language for Service Composition (2010) (3)
- Failure Feedback for User Obligation Systems (2010) (3)
- A Timed Logic for Modeling and Reasoning about Security Protocols (2010) (3)
- Ensuring authorization privileges for cascading user obligations (2012) (3)
- Two Security Symposia (2003) (2)
- UMicS: from anonymized data to usable microdata (2013) (2)
- Enabling intensional access control via preference-aware query optimization (2013) (2)
- Distributed Database Security (2005) (1)
- Proceedings of the 5th ACM workshop on Security and artificial intelligence (2012) (1)
- Microdata privacy protection through permutation-based approaches (2008) (1)
- Letter to the editor [2] (2007) (1)
- Bounding Trust under Uncertain Topology Information in Reputation-Based Trust Systems (2013) (1)
- Adaptive Request Scheduling for Parallel Scientific Web Services (2008) (1)
- Session details: Access control (2008) (0)
- CCS 2012 general chair's welcome (2012) (0)
- WPES'07 - Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society: Foreword (2007) (0)
- Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles (2011) (0)
- Obligations that require and affect authorizations (2008) (0)
- Poster: on trust evaluation with missing information in reputation systems (2011) (0)
- Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007 (2007) (0)
- A Policy Management Tool for Fine-Grained Database Access Control (2009) (0)
- Data Anonymization: The Challenge from Theory to Practice (2014) (0)
- Report on the Sixth ACM Workshop on Privacy in the Electronic Society (WPES 2007) (2008) (0)
- Proceedings of the 9th Workshop on Embedded Systems Security, WESS '14, New Delhi, India, October 17, 2014 (2014) (0)
- Email-based File System for Personal Data (2010) (0)
- PAQO (2013) (0)
- A framework supporting the privacy policy life cycle helps guide the kind of research to consider before sound privacy answers may be realized . COMPREHENSIVE ONLINE PRIVACY POLICY MANAGEMENT (2007) (0)
This paper list is powered by the following services: