Jeannette M. Wing
Affiliations: | Carnegie Mellon University, Pittsburgh, PA |
Area:
Computer ScienceGoogle:
"Jeannette Wing"Parents
Sign in to add mentorJohn V. Guttag | grad student | 1983 | MIT | |
(A Two-Tiered Approach to Specifying Programs) |
Children
Sign in to add traineeGregory Morrisett | grad student | 1995 | Carnegie Mellon |
Scott M. Nettles | grad student | 1996 | Carnegie Mellon (E-Tree) |
Craig A. Damon | grad student | 2000 | Carnegie Mellon |
Hao C. Wong | grad student | 2000 | Carnegie Mellon |
Robert W. O'Callahan | grad student | 2001 | Carnegie Mellon |
Oleg M. Sheyner | grad student | 2004 | Carnegie Mellon |
Theodore M. Wong | grad student | 2004 | Carnegie Mellon |
Pratyusa K. Manadhata | grad student | 2008 | Carnegie Mellon |
Michael C. Tschantz | grad student | 2012 | Carnegie Mellon |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Wing JM. (2017) Computational thinking’s influence on research and education for all Journal On Educational Technology. 25: 7-14 |
Tschantz MC, Datta A, Wing JM. (2015) A Methodology for Information Flow Experiments Proceedings of the Computer Security Foundations Workshop. 2015: 554-568 |
Wing JM. (2013) Formal methods: an industrial perspective Acm Sigada Ada Letters. 33: 85-86 |
Tschantz MC, Datta A, Wing JM. (2013) Purpose restrictions on information use Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8134: 610-627 |
Tschantz MC, Datta A, Wing JM. (2012) Formalizing and enforcing purpose restrictions in privacy policies Proceedings - Ieee Symposium On Security and Privacy. 176-190 |
Manadhata PK, Wing JM. (2011) An attack surface metric Ieee Transactions On Software Engineering. 37: 371-386 |
Tschantz MC, Wing JM. (2009) Formal methods for privacy Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5850: 1-15 |
Manadhata PK, Karabulut Y, Wing JM. (2009) Report: Measuring the attack surfaces of enterprise software Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5429: 91-100 |
Tschantz MC, Wing JM. (2008) Extracting conditional confidentiality policies Proceedings - 6th Ieee International Conference On Software Engineering and Formal Methods, Sefm 2008. 107-116 |
Wong TM, Wang C, Wing JM. (2003) Verifiable secret redistribution for archive systems Proceedings - 1st International Ieee Security in Storage Workshop, Sisw 2002. 94-105 |