The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Vipin Swarup: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. David Carman, Daniel Coffin, Bruno Dutertre, Vipin Swarup, Ronald J. Watro
    Forum Session: Security for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:106-109 [Conf]
  2. Kenneth Smith, Vipin Swarup, Sushil Jajodia, Donald B. Faatz, Todd Cornett, Jeff Hoyt
    Securely sharing neuroimagery. [Citation Graph (0, 0)][DBLP]
    CIKM, 2003, pp:375-377 [Conf]
  3. Vipin Swarup, Uday S. Reddy
    A Logical View of Assignments. [Citation Graph (0, 0)][DBLP]
    Constructivity in Computer Science, 1991, pp:131-149 [Conf]
  4. Yingjiu Li, Vipin Swarup, Sushil Jajodia
    Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:81-94 [Conf]
  5. Yingjiu Li, Vipin Swarup, Sushil Jajodia
    Constructing a virtual primary key for fingerprinting relational data. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2003, pp:133-141 [Conf]
  6. Charles Schmidt, Vipin Swarup
    Interoperating between Security Domains. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1998, pp:283- [Conf]
  7. Vipin Swarup
    Mobile Computations and Trust. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1998, pp:305- [Conf]
  8. Vipin Swarup, F. Javier Thayer
    Trust: Benefits, Models, and Mechanisms. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:3-18 [Conf]
  9. William M. Farmer, Joshua D. Guttman, Vipin Swarup
    Security for Mobile Agents: Authentication and State Appraisal. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:118-130 [Conf]
  10. Vipin Swarup, Uday S. Reddy, Evan Ireland
    Assignments for Applicative Languages. [Citation Graph (0, 0)][DBLP]
    FPCA, 1991, pp:192-214 [Conf]
  11. Vipin Swarup, Len Seligman, Arnon Rosenthal
    A Data Sharing Agreement Framework. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:22-36 [Conf]
  12. Shimshon Berkovits, Joshua D. Guttman, Vipin Swarup
    Authentication for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    Mobile Agents and Security, 1998, pp:114-136 [Conf]
  13. Vipin Swarup, Sushil Jajodia, Joseph Pamula
    Rule-Based Topological Vulnerability Analysis. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:23-37 [Conf]
  14. Vipin Swarup, Len Seligman, Arnon Rosenthal
    Specifying Data Sharing Agreements. [Citation Graph (0, 0)][DBLP]
    POLICY, 2006, pp:157-162 [Conf]
  15. David Keppler, Vipin Swarup, Sushil Jajodia
    Redirection policies for mission-based information sharing. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:210-218 [Conf]
  16. Vipin Swarup
    Remediation Graphs for Security Patch Management. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:17-28 [Conf]
  17. Joshua D. Guttman, John D. Ramsdell, Vipin Swarup
    The VLISP Verified Scheme System. [Citation Graph (0, 0)][DBLP]
    Lisp and Symbolic Computation, 1995, v:8, n:1-2, pp:33-110 [Journal]
  18. Yingjiu Li, Vipin Swarup, Sushil Jajodia
    Fingerprinting Relational Databases: Schemes and Specialties. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:1, pp:34-45 [Journal]

  19. A weakest-adversary security metric for network configuration security analysis. [Citation Graph (, )][DBLP]


  20. A Framework for Maximizing Utility of Sanitized Documents Based on Meta-labeling. [Citation Graph (, )][DBLP]


  21. Everybody Share: The Challenge of Data-Sharing Systems. [Citation Graph (, )][DBLP]


Search in 0.054secs, Finished in 0.055secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002