2008 |
10 | EE | Karthikeyan Bhargavan,
Cédric Fournet,
Andrew D. Gordon,
Nikhil Swamy:
Verified implementations of the information card federated identity-management protocol.
ASIACCS 2008: 123-135 |
9 | EE | Nikhil Swamy,
Brian J. Corcoran,
Michael Hicks:
Fable: A Language for Enforcing User-defined Security Policies.
IEEE Symposium on Security and Privacy 2008: 369-383 |
8 | EE | Nikhil Swamy,
Michael Hicks:
Verified enforcement of stateful information release policies.
PLAS 2008: 21-32 |
7 | EE | Nikhil Swamy,
Michael Hicks:
Verified enforcement of stateful information release policies.
SIGPLAN Notices 43(12): 21-31 (2008) |
2007 |
6 | EE | Trevor Jim,
Nikhil Swamy,
Michael Hicks:
Defeating script injection attacks with browser-enforced embedded policies.
WWW 2007: 601-610 |
2006 |
5 | EE | Nikhil Swamy,
Michael Hicks,
Stephen Tse,
Steve Zdancewic:
Managing Policy Updates in Security-Typed Languages.
CSFW 2006: 202-216 |
4 | EE | Nikhil Swamy,
Michael W. Hicks,
Greg Morrisett,
Dan Grossman,
Trevor Jim:
Safe manual memory management in Cyclone.
Sci. Comput. Program. 62(2): 122-144 (2006) |
2005 |
3 | EE | James Rose,
Nikhil Swamy,
Michael Hicks:
Dynamic inference of polymorphic lock types.
Sci. Comput. Program. 58(3): 366-383 (2005) |
2004 |
2 | EE | Glenn Ammons,
Jong-Deok Choi,
Manish Gupta,
Nikhil Swamy:
Finding and Removing Performance Bottlenecks in Large Systems.
ECOOP 2004: 170-194 |
2003 |
1 | | Ken Hennacy,
Nikhil Swamy,
Don Perlis:
RGL Study in a Hybrid Real-time System.
Neural Networks and Computational Intelligence 2003: 203-208 |