Jeannette M. Wing

Affiliations: 
Carnegie Mellon University, Pittsburgh, PA 
Area:
Computer Science
Google:
"Jeannette Wing"

Parents

Sign in to add mentor
John V. Guttag grad student 1983 MIT
 (A Two-Tiered Approach to Specifying Programs)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Wing JM. (2017) Computational thinking’s influence on research and education for all Journal On Educational Technology. 25: 7-14
Tschantz MC, Datta A, Wing JM. (2015) A Methodology for Information Flow Experiments Proceedings of the Computer Security Foundations Workshop. 2015: 554-568
Wing JM. (2013) Formal methods: an industrial perspective Acm Sigada Ada Letters. 33: 85-86
Tschantz MC, Datta A, Wing JM. (2013) Purpose restrictions on information use Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8134: 610-627
Tschantz MC, Datta A, Wing JM. (2012) Formalizing and enforcing purpose restrictions in privacy policies Proceedings - Ieee Symposium On Security and Privacy. 176-190
Manadhata PK, Wing JM. (2011) An attack surface metric Ieee Transactions On Software Engineering. 37: 371-386
Tschantz MC, Wing JM. (2009) Formal methods for privacy Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5850: 1-15
Manadhata PK, Karabulut Y, Wing JM. (2009) Report: Measuring the attack surfaces of enterprise software Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5429: 91-100
Tschantz MC, Wing JM. (2008) Extracting conditional confidentiality policies Proceedings - 6th Ieee International Conference On Software Engineering and Formal Methods, Sefm 2008. 107-116
Wong TM, Wang C, Wing JM. (2003) Verifiable secret redistribution for archive systems Proceedings - 1st International Ieee Security in Storage Workshop, Sisw 2002. 94-105
See more...