2009 |
80 | EE | Michael LeMay,
Jason J. Haas,
Carl A. Gunter:
Collaborative Recommender Systems for Building Automation.
HICSS 2009: 1-10 |
79 | EE | Elsa L. Gunter,
Ayesha Yasmeen,
Carl A. Gunter,
Anh Nguyen:
Specifying and Analyzing Workflows for Automated Identification and Data Capture.
HICSS 2009: 1-11 |
78 | EE | Musab AlTurki,
José Meseguer,
Carl A. Gunter:
Probabilistic Modeling and Analysis of DoS Protection for the ASV Protocol.
Electr. Notes Theor. Comput. Sci. 234: 3-18 (2009) |
77 | EE | Paul Anderson,
Carl A. Gunter,
Charles R. Kalmanek,
Sanjai Narain,
Jonathan M. Smith,
Rajesh Talpade,
Geoffrey G. Xie:
Guest editorial network infrastructure configuration.
IEEE Journal on Selected Areas in Communications 27(3): 249-252 (2009) |
2008 |
76 | EE | Lars E. Olson,
Carl A. Gunter,
P. Madhusudan:
A formal framework for reflective database access control policies.
ACM Conference on Computer and Communications Security 2008: 289-298 |
75 | EE | Ellick Chan,
Carl A. Gunter,
Sonia Jahid,
Evgeni Peryshkin,
Daniel Rebolledo:
Using rhythmic nonces for puzzle-based DoS resistance.
CSAW 2008: 51-58 |
74 | EE | Rohit Chadha,
Carl A. Gunter,
José Meseguer,
Ravinder Shankesi,
Mahesh Viswanathan:
Modular Preservation of Safety Properties by Cookie-Based DoS-Protection Wrappers.
FMOODS 2008: 39-58 |
73 | EE | Michael LeMay,
Rajesh Nelli,
George Gross,
Carl A. Gunter:
An Integrated Architecture for Demand Response Communications and Control.
HICSS 2008: 174 |
72 | EE | Sanjeev Khanna,
Santosh S. Venkatesh,
Omid Fatemieh,
Fariba Khan,
Carl A. Gunter:
Adaptive SelectiveVerification.
INFOCOM 2008: 529-537 |
2007 |
71 | EE | Jodie P. Boyer,
Ragib Hasan,
Lars E. Olson,
Nikita Borisov,
Carl A. Gunter,
David Raila:
Improving multi-tier security using redundant authentication.
CSAW 2007: 54-62 |
70 | EE | Alwyn Goodloe,
Carl A. Gunter:
Reasoning about Concurrency for Security Tunnels.
CSF 2007: 64-78 |
69 | EE | Michael LeMay,
George Gross,
Carl A. Gunter,
Sanjam Garg:
Unified Architecture for Large-Scale Attested Metering.
HICSS 2007: 115 |
68 | EE | Charles C. Zhang,
Marianne Winslett,
Carl A. Gunter:
On the Safety and Efficiency of Firewall Policy Deployment.
IEEE Symposium on Security and Privacy 2007: 33-50 |
67 | EE | Michael LeMay,
Omid Fatemieh,
Carl A. Gunter:
PolicyMorph: interactive policy transformations for a logical attribute-based access control framework.
SACMAT 2007: 205-214 |
66 | EE | Ratul K. Guha,
Carl A. Gunter,
Saswati Sarkar:
Fair Coalitions for Power-Aware Routing in Wireless Networks.
IEEE Trans. Mob. Comput. 6(2): 206-220 (2007) |
2006 |
65 | EE | Rakeshbabu Bobba,
Omid Fatemieh,
Fariba Khan,
Carl A. Gunter,
Himanshu Khurana:
Using Attribute-Based Access Control to Enable Attribute-Based Messaging.
ACSAC 2006: 403-413 |
64 | EE | Michael J. May,
Carl A. Gunter,
Insup Lee:
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies.
CSFW 2006: 85-97 |
63 | EE | Raja Afandi,
Jianqing Zhang,
Munawar Hafiz,
Carl A. Gunter:
AMPol: Adaptive Messaging Policy.
ECOWS 2006: 53-64 |
62 | EE | Michael J. May,
Wook Shin,
Carl A. Gunter,
Insup Lee:
Securing the drop-box architecture for assisted living.
FMSE 2006: 1-12 |
61 | EE | Adam J. Lee,
Jodie P. Boyer,
Lars E. Olson,
Carl A. Gunter:
Defeasible security policy composition for web services.
FMSE 2006: 45-54 |
60 | EE | Raja Afandi,
Jianqing Zhang,
Carl A. Gunter:
AMPol-Q: Adaptive Middleware Policy to Support QoS.
ICSOC 2006: 165-178 |
59 | EE | Jodie P. Boyer,
Kaijun Tan,
Carl A. Gunter:
Privacy Sensitive Location Information Systems in Smart Buildings.
SPC 2006: 149-164 |
2005 |
58 | EE | Kevin D. Lux,
Michael J. May,
Nayan L. Bhattad,
Carl A. Gunter:
WSEmail: Secure Internet Messaging Based on Web Services.
ICWS 2005: 75-82 |
57 | EE | Alwyn Goodloe,
Carl A. Gunter,
Mark-Oliver Stehr:
Formal prototyping in early stages of protocol design.
WITS 2005: 67-80 |
56 | EE | Karthikeyan Bhargavan,
Carl A. Gunter:
Network Event Recognition.
Formal Methods in System Design 27(3): 213-251 (2005) |
2004 |
55 | EE | Kaijun Tan,
Jason Crampton,
Carl A. Gunter:
The Consistency of Task-Based Authorization Constraints in Workflow Systems.
CSFW 2004: 155- |
54 | EE | Michael McDougall,
Rajeev Alur,
Carl A. Gunter:
A model-based approach to integrating security policies for embedded devices.
EMSOFT 2004: 211-219 |
53 | EE | Carl A. Gunter,
Sanjeev Khanna,
Kaijun Tan,
Santosh S. Venkatesh:
DoS Protection for Reliably Authenticated Broadcast.
NDSS 2004 |
52 | EE | Carl A. Gunter,
Michael J. May,
Stuart G. Stubblebine:
A Formal Privacy System and Its Application to Location Based Services.
Privacy Enhancing Technologies 2004: 256-282 |
2003 |
51 | EE | Carl A. Gunter:
Open APIs for Embedded Security.
ECOOP 2003: 225-247 |
50 | | Pankaj Kakkar,
Carl A. Gunter,
Martín Abadi:
Reasoning About Secrecy for Active Networks.
Journal of Computer Security 11(2): 245-287 (2003) |
2002 |
49 | EE | Alwyn Goodloe,
Michael McDougall,
Carl A. Gunter,
Rajeev Alur:
Predictable programs in barcodes.
CASES 2002: 298-303 |
48 | | Carl A. Gunter:
Micro Mobile Programs.
IFIP TCS 2002: 356-369 |
47 | EE | Karthikeyan Bhargavan,
Carl A. Gunter:
Requirements for a Practical Network Event Recognition Language.
Electr. Notes Theor. Comput. Sci. 70(4): (2002) |
46 | EE | Karthikeyan Bhargavan,
Carl A. Gunter,
Moonjoo Kim,
Insup Lee,
Davor Obradovic,
Oleg Sokolsky,
Mahesh Viswanathan:
Verisim: Formal Analysis of Network Simulations.
IEEE Trans. Software Eng. 28(2): 129-145 (2002) |
45 | EE | Karthikeyan Bhargavan,
Davor Obradovic,
Carl A. Gunter:
Formal verification of standards for distance vector routing protocols.
J. ACM 49(4): 538-576 (2002) |
2001 |
44 | EE | Carl A. Gunter,
Stephen Weeks,
Andrew K. Wright:
Models and Languages for Digital Rights.
HICSS 2001 |
43 | EE | Karthikeyan Bhargavan,
Satish Chandra,
Peter J. McCann,
Carl A. Gunter:
What packets may come: automata for network monitoring.
POPL 2001: 206-219 |
2000 |
42 | EE | Pankaj Kakkar,
Carl A. Gunter,
Martín Abadi:
Reasoning about Secrecy for Active Networks.
CSFW 2000: 118-129 |
41 | EE | Karthikeyan Bhargavan,
Carl A. Gunter,
Davor Obradovic:
Fault origin adjudication.
FMSP 2000: 61-71 |
40 | | Bow-Yaw Wang,
José Meseguer,
Carl A. Gunter:
Specification and Formal Analysis of a PLAN Algorithm in Maude.
ICDCS Workshop on Distributed System Validation and Verification 2000: E49-E56 |
39 | EE | Carl A. Gunter,
Elsa L. Gunter,
Michael Jackson,
Pamela Zave:
A Reference Model for Requirements and Specifications-Extended Abstract.
ICRE 2000: 189 |
38 | EE | Karthikeyan Bhargavan,
Carl A. Gunter,
Moonjoo Kim,
Insup Lee,
Davor Obradovic,
Oleg Sokolsky,
Mahesh Viswanathan:
Verisim: Formal analysis of network simulations.
ISSTA 2000: 2-13 |
37 | EE | Pankaj Kakkar,
Michael McDougall,
Carl A. Gunter,
Trevor Jim:
Certificate Distribution with Local Autonomy.
IWAN 2000: 277-295 |
36 | EE | Carl A. Gunter,
Trevor Jim:
Generalized Certificate Revocation.
POPL 2000: 316-329 |
35 | | Karthikeyan Bhargavan,
Carl A. Gunter,
Davor Obradovic:
Routing Information Protocol in HOL/SPIN.
TPHOLs 2000: 53-72 |
34 | EE | Carl A. Gunter:
Abstracting dependencies between software configuration items.
ACM Trans. Softw. Eng. Methodol. 9(1): 94-131 (2000) |
33 | EE | Carl A. Gunter,
Elsa L. Gunter,
Michael Jackson,
Pamela Zave:
A Reference Model for Requirements and Specifications.
IEEE Software 17(3): (2000) |
32 | | Carl A. Gunter,
Trevor Jim:
Policy-directed certificate retrieval.
Softw., Pract. Exper. 30(15): 1609-1640 (2000) |
1999 |
31 | | Michael W. Hicks,
Jonathan T. Moore,
D. Scott Alexander,
Carl A. Gunter,
Scott Nettles:
PLANet: An Active Internetwork.
INFOCOM 1999: 1124-1133 |
30 | EE | Pankaj Kakkar,
Michael W. Hicks,
Jonathan T. Moore,
Carl A. Gunter:
Specifying the PLAN Network Programming Langauge.
Electr. Notes Theor. Comput. Sci. 26: (1999) |
1998 |
29 | EE | Michael W. Hicks,
Pankaj Kakkar,
Jonathan T. Moore,
Carl A. Gunter,
Scott Nettles:
Network Programming Using PLAN.
ICCL Workshop: Internet Programming Languages 1998: 127-143 |
28 | EE | Michael W. Hicks,
Pankaj Kakkar,
Jonathan T. Moore,
Carl A. Gunter,
Scott Nettles:
PLAN: A Packet Language for Active Networks.
ICFP 1998: 86-93 |
27 | | Karthikeyan Bhargavan,
Carl A. Gunter,
Elsa L. Gunter,
Michael Jackson,
Davor Obradovic,
Pamela Zave:
The Village Telephone System: A Case Study in Formal Software Engineering.
TPHOLs 1998: 49-66 |
1997 |
26 | EE | Carl A. Gunter,
Teow-Hin Ngair,
Devika Subramanian:
The Common Order-Theoretic Structure of Version Spaces and ATMSs.
Artif. Intell. 95(2): 357-407 (1997) |
1996 |
25 | | Carl A. Gunter,
Teow-Hin Ngair,
Devika Subramanian:
Sets as Anti-Chains.
ASIAN 1996: 116-128 |
24 | EE | Carl A. Gunter:
Abstracting Dependencies between Software Configuration Items.
SIGSOFT FSE 1996: 167-178 |
23 | | Carl A. Gunter,
John C. Mitchell,
David Notkin:
Strategic Directions in Software Engineering and Programming Languages.
ACM Comput. Surv. 28(4): 727-737 (1996) |
22 | | Jawahar Chirimar,
Carl A. Gunter,
Jon G. Riecke:
Reference Counting as a Computational Interpretation of Linear Logic.
J. Funct. Program. 6(2): 195-244 (1996) |
1995 |
21 | | Carl A. Gunter,
Didier Rémy,
Jon G. Riecke:
A Generalization of Exceptions and Control in ML-like Languages.
FPCA 1995: 12-23 |
1993 |
20 | | Carl A. Gunter,
Elsa L. Gunter,
David B. MacQueen:
Computing ML Equality Kinds Using Abstract Interpretation
Inf. Comput. 107(2): 303-323 (1993) |
1992 |
19 | | Jawahar Chirimar,
Carl A. Gunter,
Myra Van Inwegen:
Xpnet: A Graphical Interface to Proof Nets with an Efficient Proof Checker.
CADE 1992: 711-715 |
18 | EE | Jawahar Chirimar,
Carl A. Gunter,
Jon G. Riecke:
Proving Memory Management Invariants for a Language Based on Linear Logic.
LISP and Functional Programming 1992: 139-150 |
17 | | Carl A. Gunter:
The Mixed Powerdomain.
Theor. Comput. Sci. 103(2): 311-334 (1992) |
1991 |
16 | | Carl A. Gunter,
Teow-Hin Ngair,
Prakash Panangaden,
Devika Subramanian:
The Common Order-Theoretic Structure of Version Spaces and ATMS's.
AAAI 1991: 500-505 |
15 | | Carl A. Gunter,
Elsa L. Gunter,
David B. MacQueen:
An Abstract Interpretation for ML Equality Kinds.
TACS 1991: 112-130 |
14 | | Carl A. Gunter:
Forms of Semantic Specification.
Bulletin of the EATCS 45: 98-113 (1991) |
13 | | Val Tannen,
Thierry Coquand,
Carl A. Gunter,
Andre Scedrov:
Inheritance as Implicit Coercion
Inf. Comput. 93(1): 172-221 (1991) |
1990 |
12 | | Vijay Gehlot,
Carl A. Gunter:
Normal Process Representatives
LICS 1990: 200-207 |
11 | EE | Val Tannen,
Carl A. Gunter,
Andre Scedrov:
Computing with Coercions.
LISP and Functional Programming 1990: 44-60 |
10 | | Carl A. Gunter:
Relating Total and Partial Correctness Interpretations of Non-Deterministic Programs.
POPL 1990: 306-319 |
9 | | Carl A. Gunter,
Dana S. Scott:
Semantic Domains.
Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics (B) 1990: 633-674 |
1989 |
8 | | Val Tannen,
Thierry Coquand,
Carl A. Gunter,
Andre Scedrov:
Inheritance and Explicit Coercion (Preliminary Report)
LICS 1989: 112-129 |
7 | | Thierry Coquand,
Carl A. Gunter,
Glynn Winskel:
Domain Theoretic Models of Polymorphism
Inf. Comput. 81(2): 123-167 (1989) |
1988 |
6 | | Carl A. Gunter,
Achim Jung:
Coherence and Consistency in Domains (Extended Outline)
LICS 1988: 309-317 |
1987 |
5 | | Thierry Coquand,
Carl A. Gunter,
Glynn Winskel:
DI-Domains as a Model of Polymorphism.
MFPS 1987: 344-363 |
4 | | Carl A. Gunter:
Universal Profinite Domains
Inf. Comput. 72(1): 1-30 (1987) |
1986 |
3 | | Carl A. Gunter:
The Largest First-Order-Axiomatizable Cartesian Closed Category of Domains
LICS 1986: 142-148 |
1985 |
2 | | Carl A. Gunter:
A Universal Domain Technique for Profinite Posets.
ICALP 1985: 232-243 |
1 | | Carl A. Gunter:
Comparing Categories of Domains.
Mathematical Foundations of Programming Semantics 1985: 101-121 |