Vipin Swarup

Orcid: 0000-0002-7892-4743

According to our database1, Vipin Swarup authored at least 29 papers between 1991 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Anomalous Link Detection in Dynamically Evolving Scale-Free-Like Networked Systems.
Proceedings of the IEEE International Systems Conference, 2024

2022
Dependency-Based Link Prediction for Learning Microsegmentation Policy.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

A Formal Model for Credential Hopping Attacks.
Proceedings of the Computer Security - ESORICS 2022, 2022

2010
Cyber SA: Situational Awareness for Cyber Defense.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Metric Strand Spaces for Locale Authentication Protocols.
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010

2008
Everybody Share: The Challenge of Data-Sharing Systems.
Computer, 2008

A Framework for Maximizing Utility of Sanitized Documents Based on Meta-labeling.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

2006
Redirection policies for mission-based information sharing.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Specifying Data Sharing Agreements.
Proceedings of the 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 2006

A Data Sharing Agreement Framework.
Proceedings of the Information Systems Security, Second International Conference, 2006

A weakest-adversary security metric for network configuration security analysis.
Proceedings of the 2nd ACM Workshop on Quality of Protection, 2006

2005
Fingerprinting Relational Databases: Schemes and Specialties.
IEEE Trans. Dependable Secur. Comput., 2005

Rule-Based Topological Vulnerability Analysis.
Proceedings of the Computer Network Security, 2005

2004
Enabling the sharing of neuroimaging data through well-defined intermediate levels of visibility.
NeuroImage, 2004

Remediation Graphs for Security Patch Management.
Proceedings of the Security and Protection in Information Processing Systems, 2004

Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

2003
Constructing a virtual primary key for fingerprinting relational data.
Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, 2003

Securely sharing neuroimagery.
Proceedings of the 2003 ACM CIKM International Conference on Information and Knowledge Management, 2003

Forum Session: Security for Wireless Sensor Networks.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

1999
Trust: Benefits, Models, and Mechanisms.
Proceedings of the Secure Internet Programming, 1999

1998
Authentication for Mobile Agents.
Proceedings of the Mobile Agents and Security, 1998

Mobile Computations and Trust.
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998

Interoperating between Security Domains.
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998

1996
Security for Mobile Agents: Authentication and State Appraisal.
Proceedings of the Computer Security, 1996

1995
The VLISP Verified Scheme System.
LISP Symb. Comput., 1995

1993
Integration of security services into the NORAD/USSPACECOM technical infrastructure: a case study.
Proceedings of the Ninth Annual Computer Security Applications Conference, 1993

1992
Type Theoretic Properties of Assignments
PhD thesis, 1992

1991
Assignments for Applicative Languages.
Proceedings of the Functional Programming Languages and Computer Architecture, 1991

A Logical View of Assignments.
Proceedings of the Constructivity in Computer Science, 1991


  Loading...