2009 | ||
---|---|---|
87 | Lars E. Olson, Carl A. Gunter, William R. Cook, Marianne Winslett: Implementing Reflective Access Control in SQL. DBSec 2009: 17-32 | |
86 | Ravinder Shankesi, Musab AlTurki, Ralf Sasse, Carl A. Gunter, José Meseguer: Model-Checking DoS Amplification for VoIP Session Initiation. ESORICS 2009: 390-405 | |
85 | Michael LeMay, Carl A. Gunter: Cumulative Attestation Kernels for Embedded Systems. ESORICS 2009: 655-670 | |
84 | Michael LeMay, Jason J. Haas, Carl A. Gunter: Collaborative Recommender Systems for Building Automation. HICSS 2009: 1-10 | |
83 | Elsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, Anh Nguyen: Specifying and Analyzing Workflows for Automated Identification and Data Capture. HICSS 2009: 1-11 | |
82 | Carl A. Gunter: Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers. POLICY 2009: 114-117 | |
81 | Michael J. May, Carl A. Gunter, Insup Lee, Steve Zdancewic: Strong and Weak Policy Relations. POLICY 2009: 33-36 | |
80 | Kazuhiro Minami, Nikita Borisov, Carl A. Gunter: Safety in discretionary access control for logic-based publish-subscribe systems. SACMAT 2009: 3-12 | |
79 | Wook Shin, Carl A. Gunter, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka: How to Bootstrap Security for Ad-Hoc Network: Revisited. SEC 2009: 119-131 | |
78 | Musab AlTurki, José Meseguer, Carl A. Gunter: Probabilistic Modeling and Analysis of DoS Protection for the ASV Protocol. Electr. Notes Theor. Comput. Sci. 234: 3-18 (2009) | |
77 | Paul Anderson, Carl A. Gunter, Charles R. Kalmanek, Sanjai Narain, Jonathan M. Smith, Rajesh Talpade, Geoffrey G. Xie: Guest editorial network infrastructure configuration. IEEE Journal on Selected Areas in Communications 27(3): 249-252 (2009) | |
2008 | ||
76 | Lars E. Olson, Carl A. Gunter, P. Madhusudan: A formal framework for reflective database access control policies. ACM Conference on Computer and Communications Security 2008: 289-298 | |
75 | Ellick Chan, Carl A. Gunter, Sonia Jahid, Evgeni Peryshkin, Daniel Rebolledo: Using rhythmic nonces for puzzle-based DoS resistance. CSAW 2008: 51-58 | |
74 | Rohit Chadha, Carl A. Gunter, José Meseguer, Ravinder Shankesi, Mahesh Viswanathan: Modular Preservation of Safety Properties by Cookie-Based DoS-Protection Wrappers. FMOODS 2008: 39-58 | |
73 | Michael LeMay, Rajesh Nelli, George Gross, Carl A. Gunter: An Integrated Architecture for Demand Response Communications and Control. HICSS 2008: 174 | |
72 | Sanjeev Khanna, Santosh S. Venkatesh, Omid Fatemieh, Fariba Khan, Carl A. Gunter: Adaptive SelectiveVerification. INFOCOM 2008: 529-537 | |
2007 | ||
71 | Jodie P. Boyer, Ragib Hasan, Lars E. Olson, Nikita Borisov, Carl A. Gunter, David Raila: Improving multi-tier security using redundant authentication. CSAW 2007: 54-62 | |
70 | Alwyn Goodloe, Carl A. Gunter: Reasoning about Concurrency for Security Tunnels. CSF 2007: 64-78 | |
69 | Michael LeMay, George Gross, Carl A. Gunter, Sanjam Garg: Unified Architecture for Large-Scale Attested Metering. HICSS 2007: 115 | |
68 | Charles C. Zhang, Marianne Winslett, Carl A. Gunter: On the Safety and Efficiency of Firewall Policy Deployment. IEEE Symposium on Security and Privacy 2007: 33-50 | |
67 | Michael LeMay, Omid Fatemieh, Carl A. Gunter: PolicyMorph: interactive policy transformations for a logical attribute-based access control framework. SACMAT 2007: 205-214 | |
66 | Ratul K. Guha, Carl A. Gunter, Saswati Sarkar: Fair Coalitions for Power-Aware Routing in Wireless Networks. IEEE Trans. Mob. Comput. 6(2): 206-220 (2007) | |
2006 | ||
65 | Rakeshbabu Bobba, Omid Fatemieh, Fariba Khan, Carl A. Gunter, Himanshu Khurana: Using Attribute-Based Access Control to Enable Attribute-Based Messaging. ACSAC 2006: 403-413 | |
64 | Michael J. May, Carl A. Gunter, Insup Lee: Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies. CSFW 2006: 85-97 | |
63 | Raja Afandi, Jianqing Zhang, Munawar Hafiz, Carl A. Gunter: AMPol: Adaptive Messaging Policy. ECOWS 2006: 53-64 | |
62 | Michael J. May, Wook Shin, Carl A. Gunter, Insup Lee: Securing the drop-box architecture for assisted living. FMSE 2006: 1-12 | |
61 | Adam J. Lee, Jodie P. Boyer, Lars E. Olson, Carl A. Gunter: Defeasible security policy composition for web services. FMSE 2006: 45-54 | |
60 | Raja Afandi, Jianqing Zhang, Carl A. Gunter: AMPol-Q: Adaptive Middleware Policy to Support QoS. ICSOC 2006: 165-178 | |
59 | Jodie P. Boyer, Kaijun Tan, Carl A. Gunter: Privacy Sensitive Location Information Systems in Smart Buildings. SPC 2006: 149-164 | |
2005 | ||
58 | Kevin D. Lux, Michael J. May, Nayan L. Bhattad, Carl A. Gunter: WSEmail: Secure Internet Messaging Based on Web Services. ICWS 2005: 75-82 | |
57 | Alwyn Goodloe, Carl A. Gunter, Mark-Oliver Stehr: Formal prototyping in early stages of protocol design. WITS 2005: 67-80 | |
56 | Karthikeyan Bhargavan, Carl A. Gunter: Network Event Recognition. Formal Methods in System Design 27(3): 213-251 (2005) | |
2004 | ||
55 | Kaijun Tan, Jason Crampton, Carl A. Gunter: The Consistency of Task-Based Authorization Constraints in Workflow Systems. CSFW 2004: 155- | |
54 | Michael McDougall, Rajeev Alur, Carl A. Gunter: A model-based approach to integrating security policies for embedded devices. EMSOFT 2004: 211-219 | |
53 | Carl A. Gunter, Sanjeev Khanna, Kaijun Tan, Santosh S. Venkatesh: DoS Protection for Reliably Authenticated Broadcast. NDSS 2004 | |
52 | Carl A. Gunter, Michael J. May, Stuart G. Stubblebine: A Formal Privacy System and Its Application to Location Based Services. Privacy Enhancing Technologies 2004: 256-282 | |
2003 | ||
51 | Carl A. Gunter: Open APIs for Embedded Security. ECOOP 2003: 225-247 | |
50 | Pankaj Kakkar, Carl A. Gunter, Martín Abadi: Reasoning About Secrecy for Active Networks. Journal of Computer Security 11(2): 245-287 (2003) | |
2002 | ||
49 | Alwyn Goodloe, Michael McDougall, Carl A. Gunter, Rajeev Alur: Predictable programs in barcodes. CASES 2002: 298-303 | |
48 | Carl A. Gunter: Micro Mobile Programs. IFIP TCS 2002: 356-369 | |
47 | Karthikeyan Bhargavan, Carl A. Gunter: Requirements for a Practical Network Event Recognition Language. Electr. Notes Theor. Comput. Sci. 70(4): (2002) | |
46 | Karthikeyan Bhargavan, Carl A. Gunter, Moonjoo Kim, Insup Lee, Davor Obradovic, Oleg Sokolsky, Mahesh Viswanathan: Verisim: Formal Analysis of Network Simulations. IEEE Trans. Software Eng. 28(2): 129-145 (2002) | |
45 | Karthikeyan Bhargavan, Davor Obradovic, Carl A. Gunter: Formal verification of standards for distance vector routing protocols. J. ACM 49(4): 538-576 (2002) | |
2001 | ||
44 | Carl A. Gunter, Stephen Weeks, Andrew K. Wright: Models and Languages for Digital Rights. HICSS 2001 | |
43 | Karthikeyan Bhargavan, Satish Chandra, Peter J. McCann, Carl A. Gunter: What packets may come: automata for network monitoring. POPL 2001: 206-219 | |
2000 | ||
42 | Pankaj Kakkar, Carl A. Gunter, Martín Abadi: Reasoning about Secrecy for Active Networks. CSFW 2000: 118-129 | |
41 | Karthikeyan Bhargavan, Carl A. Gunter, Davor Obradovic: Fault origin adjudication. FMSP 2000: 61-71 | |
40 | Bow-Yaw Wang, José Meseguer, Carl A. Gunter: Specification and Formal Analysis of a PLAN Algorithm in Maude. ICDCS Workshop on Distributed System Validation and Verification 2000: E49-E56 | |
39 | Carl A. Gunter, Elsa L. Gunter, Michael Jackson, Pamela Zave: A Reference Model for Requirements and Specifications-Extended Abstract. ICRE 2000: 189 | |
38 | Karthikeyan Bhargavan, Carl A. Gunter, Moonjoo Kim, Insup Lee, Davor Obradovic, Oleg Sokolsky, Mahesh Viswanathan: Verisim: Formal analysis of network simulations. ISSTA 2000: 2-13 | |
37 | Pankaj Kakkar, Michael McDougall, Carl A. Gunter, Trevor Jim: Certificate Distribution with Local Autonomy. IWAN 2000: 277-295 | |
36 | Carl A. Gunter, Trevor Jim: Generalized Certificate Revocation. POPL 2000: 316-329 | |
35 | Karthikeyan Bhargavan, Carl A. Gunter, Davor Obradovic: Routing Information Protocol in HOL/SPIN. TPHOLs 2000: 53-72 | |
34 | Carl A. Gunter: Abstracting dependencies between software configuration items. ACM Trans. Softw. Eng. Methodol. 9(1): 94-131 (2000) | |
33 | Carl A. Gunter, Elsa L. Gunter, Michael Jackson, Pamela Zave: A Reference Model for Requirements and Specifications. IEEE Software 17(3): (2000) | |
32 | Carl A. Gunter, Trevor Jim: Policy-directed certificate retrieval. Softw., Pract. Exper. 30(15): 1609-1640 (2000) | |
1999 | ||
31 | Michael W. Hicks, Jonathan T. Moore, D. Scott Alexander, Carl A. Gunter, Scott Nettles: PLANet: An Active Internetwork. INFOCOM 1999: 1124-1133 | |
30 | Pankaj Kakkar, Michael W. Hicks, Jonathan T. Moore, Carl A. Gunter: Specifying the PLAN Network Programming Langauge. Electr. Notes Theor. Comput. Sci. 26: (1999) | |
1998 | ||
29 | Michael W. Hicks, Pankaj Kakkar, Jonathan T. Moore, Carl A. Gunter, Scott Nettles: Network Programming Using PLAN. ICCL Workshop: Internet Programming Languages 1998: 127-143 | |
28 | Michael W. Hicks, Pankaj Kakkar, Jonathan T. Moore, Carl A. Gunter, Scott Nettles: PLAN: A Packet Language for Active Networks. ICFP 1998: 86-93 | |
27 | Karthikeyan Bhargavan, Carl A. Gunter, Elsa L. Gunter, Michael Jackson, Davor Obradovic, Pamela Zave: The Village Telephone System: A Case Study in Formal Software Engineering. TPHOLs 1998: 49-66 | |
1997 | ||
26 | Carl A. Gunter, Teow-Hin Ngair, Devika Subramanian: The Common Order-Theoretic Structure of Version Spaces and ATMSs. Artif. Intell. 95(2): 357-407 (1997) | |
1996 | ||
25 | Carl A. Gunter, Teow-Hin Ngair, Devika Subramanian: Sets as Anti-Chains. ASIAN 1996: 116-128 | |
24 | Carl A. Gunter: Abstracting Dependencies between Software Configuration Items. SIGSOFT FSE 1996: 167-178 | |
23 | Carl A. Gunter, John C. Mitchell, David Notkin: Strategic Directions in Software Engineering and Programming Languages. ACM Comput. Surv. 28(4): 727-737 (1996) | |
22 | Jawahar Chirimar, Carl A. Gunter, Jon G. Riecke: Reference Counting as a Computational Interpretation of Linear Logic. J. Funct. Program. 6(2): 195-244 (1996) | |
1995 | ||
21 | Carl A. Gunter, Didier Rémy, Jon G. Riecke: A Generalization of Exceptions and Control in ML-like Languages. FPCA 1995: 12-23 | |
1993 | ||
20 | Carl A. Gunter, Elsa L. Gunter, David B. MacQueen: Computing ML Equality Kinds Using Abstract Interpretation Inf. Comput. 107(2): 303-323 (1993) | |
1992 | ||
19 | Jawahar Chirimar, Carl A. Gunter, Myra Van Inwegen: Xpnet: A Graphical Interface to Proof Nets with an Efficient Proof Checker. CADE 1992: 711-715 | |
18 | Jawahar Chirimar, Carl A. Gunter, Jon G. Riecke: Proving Memory Management Invariants for a Language Based on Linear Logic. LISP and Functional Programming 1992: 139-150 | |
17 | Carl A. Gunter: The Mixed Powerdomain. Theor. Comput. Sci. 103(2): 311-334 (1992) | |
1991 | ||
16 | Carl A. Gunter, Teow-Hin Ngair, Prakash Panangaden, Devika Subramanian: The Common Order-Theoretic Structure of Version Spaces and ATMS's. AAAI 1991: 500-505 | |
15 | Carl A. Gunter, Elsa L. Gunter, David B. MacQueen: An Abstract Interpretation for ML Equality Kinds. TACS 1991: 112-130 | |
14 | Carl A. Gunter: Forms of Semantic Specification. Bulletin of the EATCS 45: 98-113 (1991) | |
13 | Val Tannen, Thierry Coquand, Carl A. Gunter, Andre Scedrov: Inheritance as Implicit Coercion Inf. Comput. 93(1): 172-221 (1991) | |
1990 | ||
12 | Vijay Gehlot, Carl A. Gunter: Normal Process Representatives LICS 1990: 200-207 | |
11 | Val Tannen, Carl A. Gunter, Andre Scedrov: Computing with Coercions. LISP and Functional Programming 1990: 44-60 | |
10 | Carl A. Gunter: Relating Total and Partial Correctness Interpretations of Non-Deterministic Programs. POPL 1990: 306-319 | |
9 | Carl A. Gunter, Dana S. Scott: Semantic Domains. Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics (B) 1990: 633-674 | |
1989 | ||
8 | Val Tannen, Thierry Coquand, Carl A. Gunter, Andre Scedrov: Inheritance and Explicit Coercion (Preliminary Report) LICS 1989: 112-129 | |
7 | Thierry Coquand, Carl A. Gunter, Glynn Winskel: Domain Theoretic Models of Polymorphism Inf. Comput. 81(2): 123-167 (1989) | |
1988 | ||
6 | Carl A. Gunter, Achim Jung: Coherence and Consistency in Domains (Extended Outline) LICS 1988: 309-317 | |
1987 | ||
5 | Thierry Coquand, Carl A. Gunter, Glynn Winskel: DI-Domains as a Model of Polymorphism. MFPS 1987: 344-363 | |
4 | Carl A. Gunter: Universal Profinite Domains Inf. Comput. 72(1): 1-30 (1987) | |
1986 | ||
3 | Carl A. Gunter: The Largest First-Order-Axiomatizable Cartesian Closed Category of Domains LICS 1986: 142-148 | |
1985 | ||
2 | Carl A. Gunter: A Universal Domain Technique for Profinite Posets. ICALP 1985: 232-243 | |
1 | Carl A. Gunter: Comparing Categories of Domains. Mathematical Foundations of Programming Semantics 1985: 101-121 |