|
Search the dblp DataBase
Nikhil Swamy:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Nikhil Swamy, Michael Hicks, Stephen Tse, Steve Zdancewic
Managing Policy Updates in Security-Typed Languages. [Citation Graph (0, 0)][DBLP] CSFW, 2006, pp:202-216 [Conf]
- Glenn Ammons, Jong-Deok Choi, Manish Gupta, Nikhil Swamy
Finding and Removing Performance Bottlenecks in Large Systems. [Citation Graph (0, 0)][DBLP] ECOOP, 2004, pp:170-194 [Conf]
- Ken Hennacy, Nikhil Swamy, Don Perlis
RGL Study in a Hybrid Real-time System. [Citation Graph (0, 0)][DBLP] Neural Networks and Computational Intelligence, 2003, pp:203-208 [Conf]
- James Rose, Nikhil Swamy, Michael Hicks
Dynamic inference of polymorphic lock types. [Citation Graph (0, 0)][DBLP] Sci. Comput. Program., 2005, v:58, n:3, pp:366-383 [Journal]
- Nikhil Swamy, Michael W. Hicks, Greg Morrisett, Dan Grossman, Trevor Jim
Safe manual memory management in Cyclone. [Citation Graph (0, 0)][DBLP] Sci. Comput. Program., 2006, v:62, n:2, pp:122-144 [Journal]
- Trevor Jim, Nikhil Swamy, Michael Hicks
Defeating script injection attacks with browser-enforced embedded policies. [Citation Graph (0, 0)][DBLP] WWW, 2007, pp:601-610 [Conf]
Verified implementations of the information card federated identity-management protocol. [Citation Graph (, )][DBLP]
Enforcing Stateful Authorization and Information Flow Policies in Fine. [Citation Graph (, )][DBLP]
A theory of typed coercions and its applications. [Citation Graph (, )][DBLP]
Verified enforcement of stateful information release policies. [Citation Graph (, )][DBLP]
Type-preserving compilation of end-to-end verification of security enforcement. [Citation Graph (, )][DBLP]
Cross-tier, label-based security enforcement for web applications. [Citation Graph (, )][DBLP]
Fable: A Language for Enforcing User-defined Security Policies. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|