The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Nikhil Swamy: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Nikhil Swamy, Michael Hicks, Stephen Tse, Steve Zdancewic
    Managing Policy Updates in Security-Typed Languages. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:202-216 [Conf]
  2. Glenn Ammons, Jong-Deok Choi, Manish Gupta, Nikhil Swamy
    Finding and Removing Performance Bottlenecks in Large Systems. [Citation Graph (0, 0)][DBLP]
    ECOOP, 2004, pp:170-194 [Conf]
  3. Ken Hennacy, Nikhil Swamy, Don Perlis
    RGL Study in a Hybrid Real-time System. [Citation Graph (0, 0)][DBLP]
    Neural Networks and Computational Intelligence, 2003, pp:203-208 [Conf]
  4. James Rose, Nikhil Swamy, Michael Hicks
    Dynamic inference of polymorphic lock types. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2005, v:58, n:3, pp:366-383 [Journal]
  5. Nikhil Swamy, Michael W. Hicks, Greg Morrisett, Dan Grossman, Trevor Jim
    Safe manual memory management in Cyclone. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2006, v:62, n:2, pp:122-144 [Journal]
  6. Trevor Jim, Nikhil Swamy, Michael Hicks
    Defeating script injection attacks with browser-enforced embedded policies. [Citation Graph (0, 0)][DBLP]
    WWW, 2007, pp:601-610 [Conf]

  7. Verified implementations of the information card federated identity-management protocol. [Citation Graph (, )][DBLP]


  8. Enforcing Stateful Authorization and Information Flow Policies in Fine. [Citation Graph (, )][DBLP]


  9. A theory of typed coercions and its applications. [Citation Graph (, )][DBLP]


  10. Verified enforcement of stateful information release policies. [Citation Graph (, )][DBLP]


  11. Type-preserving compilation of end-to-end verification of security enforcement. [Citation Graph (, )][DBLP]


  12. Cross-tier, label-based security enforcement for web applications. [Citation Graph (, )][DBLP]


  13. Fable: A Language for Enforcing User-defined Security Policies. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002