2008 |
22 | EE | Lei Zhang,
Alexander Brodsky,
Vipin Swarup,
Sushil Jajodia:
A Framework for Maximizing Utility of Sanitized Documents Based on Meta-labeling.
POLICY 2008: 181-188 |
2006 |
21 | EE | Vipin Swarup,
Len Seligman,
Arnon Rosenthal:
A Data Sharing Agreement Framework.
ICISS 2006: 22-36 |
20 | EE | Vipin Swarup,
Len Seligman,
Arnon Rosenthal:
Specifying Data Sharing Agreements.
POLICY 2006: 157-162 |
19 | EE | Joseph Pamula,
Sushil Jajodia,
Paul Ammann,
Vipin Swarup:
A weakest-adversary security metric for network configuration security analysis.
QoP 2006: 31-38 |
18 | EE | David Keppler,
Vipin Swarup,
Sushil Jajodia:
Redirection policies for mission-based information sharing.
SACMAT 2006: 210-218 |
2005 |
17 | EE | Vipin Swarup,
Sushil Jajodia,
Joseph Pamula:
Rule-Based Topological Vulnerability Analysis.
MMM-ACNS 2005: 23-37 |
16 | EE | Yingjiu Li,
Vipin Swarup,
Sushil Jajodia:
Fingerprinting Relational Databases: Schemes and Specialties.
IEEE Trans. Dependable Sec. Comput. 2(1): 34-45 (2005) |
2004 |
15 | | Sanjeev Setia,
Vipin Swarup:
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2004, Washington, DC, USA, October 25, 2004
ACM 2004 |
14 | | Yingjiu Li,
Vipin Swarup,
Sushil Jajodia:
Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases.
DBSec 2004: 81-94 |
13 | | Vipin Swarup:
Remediation Graphs for Security Patch Management.
SEC 2004: 17-28 |
2003 |
12 | | Sanjeev Setia,
Vipin Swarup:
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2003, Fairfax, Virginia, USA, 2003
ACM 2003 |
11 | EE | David Carman,
Daniel Coffin,
Bruno Dutertre,
Vipin Swarup,
Ronald J. Watro:
Forum Session: Security for Wireless Sensor Networks.
ACSAC 2003: 106-109 |
10 | EE | Kenneth Smith,
Vipin Swarup,
Sushil Jajodia,
Donald B. Faatz,
Todd Cornett,
Jeff Hoyt:
Securely sharing neuroimagery.
CIKM 2003: 375-377 |
9 | EE | Yingjiu Li,
Vipin Swarup,
Sushil Jajodia:
Constructing a virtual primary key for fingerprinting relational data.
Digital Rights Management Workshop 2003: 133-141 |
1999 |
8 | | Vipin Swarup,
F. Javier Thayer:
Trust: Benefits, Models, and Mechanisms.
Secure Internet Programming 1999: 3-18 |
1998 |
7 | EE | Charles Schmidt,
Vipin Swarup:
Interoperating between Security Domains.
ECOOP Workshops 1998: 283 |
6 | EE | Vipin Swarup:
Mobile Computations and Trust.
ECOOP Workshops 1998: 305 |
5 | EE | Shimshon Berkovits,
Joshua D. Guttman,
Vipin Swarup:
Authentication for Mobile Agents.
Mobile Agents and Security 1998: 114-136 |
1996 |
4 | EE | William M. Farmer,
Joshua D. Guttman,
Vipin Swarup:
Security for Mobile Agents: Authentication and State Appraisal.
ESORICS 1996: 118-130 |
1995 |
3 | | Joshua D. Guttman,
John D. Ramsdell,
Vipin Swarup:
The VLISP Verified Scheme System.
Lisp and Symbolic Computation 8(1-2): 33-110 (1995) |
1991 |
2 | | Vipin Swarup,
Uday S. Reddy:
A Logical View of Assignments.
Constructivity in Computer Science 1991: 131-149 |
1 | | Vipin Swarup,
Uday S. Reddy,
Evan Ireland:
Assignments for Applicative Languages.
FPCA 1991: 192-214 |