dblp.uni-trier.dewww.uni-trier.de

Carl A. Gunter

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
80EEMichael LeMay, Jason J. Haas, Carl A. Gunter: Collaborative Recommender Systems for Building Automation. HICSS 2009: 1-10
79EEElsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, Anh Nguyen: Specifying and Analyzing Workflows for Automated Identification and Data Capture. HICSS 2009: 1-11
78EEMusab AlTurki, José Meseguer, Carl A. Gunter: Probabilistic Modeling and Analysis of DoS Protection for the ASV Protocol. Electr. Notes Theor. Comput. Sci. 234: 3-18 (2009)
77EEPaul Anderson, Carl A. Gunter, Charles R. Kalmanek, Sanjai Narain, Jonathan M. Smith, Rajesh Talpade, Geoffrey G. Xie: Guest editorial network infrastructure configuration. IEEE Journal on Selected Areas in Communications 27(3): 249-252 (2009)
2008
76EELars E. Olson, Carl A. Gunter, P. Madhusudan: A formal framework for reflective database access control policies. ACM Conference on Computer and Communications Security 2008: 289-298
75EEEllick Chan, Carl A. Gunter, Sonia Jahid, Evgeni Peryshkin, Daniel Rebolledo: Using rhythmic nonces for puzzle-based DoS resistance. CSAW 2008: 51-58
74EERohit Chadha, Carl A. Gunter, José Meseguer, Ravinder Shankesi, Mahesh Viswanathan: Modular Preservation of Safety Properties by Cookie-Based DoS-Protection Wrappers. FMOODS 2008: 39-58
73EEMichael LeMay, Rajesh Nelli, George Gross, Carl A. Gunter: An Integrated Architecture for Demand Response Communications and Control. HICSS 2008: 174
72EESanjeev Khanna, Santosh S. Venkatesh, Omid Fatemieh, Fariba Khan, Carl A. Gunter: Adaptive SelectiveVerification. INFOCOM 2008: 529-537
2007
71EEJodie P. Boyer, Ragib Hasan, Lars E. Olson, Nikita Borisov, Carl A. Gunter, David Raila: Improving multi-tier security using redundant authentication. CSAW 2007: 54-62
70EEAlwyn Goodloe, Carl A. Gunter: Reasoning about Concurrency for Security Tunnels. CSF 2007: 64-78
69EEMichael LeMay, George Gross, Carl A. Gunter, Sanjam Garg: Unified Architecture for Large-Scale Attested Metering. HICSS 2007: 115
68EECharles C. Zhang, Marianne Winslett, Carl A. Gunter: On the Safety and Efficiency of Firewall Policy Deployment. IEEE Symposium on Security and Privacy 2007: 33-50
67EEMichael LeMay, Omid Fatemieh, Carl A. Gunter: PolicyMorph: interactive policy transformations for a logical attribute-based access control framework. SACMAT 2007: 205-214
66EERatul K. Guha, Carl A. Gunter, Saswati Sarkar: Fair Coalitions for Power-Aware Routing in Wireless Networks. IEEE Trans. Mob. Comput. 6(2): 206-220 (2007)
2006
65EERakeshbabu Bobba, Omid Fatemieh, Fariba Khan, Carl A. Gunter, Himanshu Khurana: Using Attribute-Based Access Control to Enable Attribute-Based Messaging. ACSAC 2006: 403-413
64EEMichael J. May, Carl A. Gunter, Insup Lee: Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies. CSFW 2006: 85-97
63EERaja Afandi, Jianqing Zhang, Munawar Hafiz, Carl A. Gunter: AMPol: Adaptive Messaging Policy. ECOWS 2006: 53-64
62EEMichael J. May, Wook Shin, Carl A. Gunter, Insup Lee: Securing the drop-box architecture for assisted living. FMSE 2006: 1-12
61EEAdam J. Lee, Jodie P. Boyer, Lars E. Olson, Carl A. Gunter: Defeasible security policy composition for web services. FMSE 2006: 45-54
60EERaja Afandi, Jianqing Zhang, Carl A. Gunter: AMPol-Q: Adaptive Middleware Policy to Support QoS. ICSOC 2006: 165-178
59EEJodie P. Boyer, Kaijun Tan, Carl A. Gunter: Privacy Sensitive Location Information Systems in Smart Buildings. SPC 2006: 149-164
2005
58EEKevin D. Lux, Michael J. May, Nayan L. Bhattad, Carl A. Gunter: WSEmail: Secure Internet Messaging Based on Web Services. ICWS 2005: 75-82
57EEAlwyn Goodloe, Carl A. Gunter, Mark-Oliver Stehr: Formal prototyping in early stages of protocol design. WITS 2005: 67-80
56EEKarthikeyan Bhargavan, Carl A. Gunter: Network Event Recognition. Formal Methods in System Design 27(3): 213-251 (2005)
2004
55EEKaijun Tan, Jason Crampton, Carl A. Gunter: The Consistency of Task-Based Authorization Constraints in Workflow Systems. CSFW 2004: 155-
54EEMichael McDougall, Rajeev Alur, Carl A. Gunter: A model-based approach to integrating security policies for embedded devices. EMSOFT 2004: 211-219
53EECarl A. Gunter, Sanjeev Khanna, Kaijun Tan, Santosh S. Venkatesh: DoS Protection for Reliably Authenticated Broadcast. NDSS 2004
52EECarl A. Gunter, Michael J. May, Stuart G. Stubblebine: A Formal Privacy System and Its Application to Location Based Services. Privacy Enhancing Technologies 2004: 256-282
2003
51EECarl A. Gunter: Open APIs for Embedded Security. ECOOP 2003: 225-247
50 Pankaj Kakkar, Carl A. Gunter, Martín Abadi: Reasoning About Secrecy for Active Networks. Journal of Computer Security 11(2): 245-287 (2003)
2002
49EEAlwyn Goodloe, Michael McDougall, Carl A. Gunter, Rajeev Alur: Predictable programs in barcodes. CASES 2002: 298-303
48 Carl A. Gunter: Micro Mobile Programs. IFIP TCS 2002: 356-369
47EEKarthikeyan Bhargavan, Carl A. Gunter: Requirements for a Practical Network Event Recognition Language. Electr. Notes Theor. Comput. Sci. 70(4): (2002)
46EEKarthikeyan Bhargavan, Carl A. Gunter, Moonjoo Kim, Insup Lee, Davor Obradovic, Oleg Sokolsky, Mahesh Viswanathan: Verisim: Formal Analysis of Network Simulations. IEEE Trans. Software Eng. 28(2): 129-145 (2002)
45EEKarthikeyan Bhargavan, Davor Obradovic, Carl A. Gunter: Formal verification of standards for distance vector routing protocols. J. ACM 49(4): 538-576 (2002)
2001
44EECarl A. Gunter, Stephen Weeks, Andrew K. Wright: Models and Languages for Digital Rights. HICSS 2001
43EEKarthikeyan Bhargavan, Satish Chandra, Peter J. McCann, Carl A. Gunter: What packets may come: automata for network monitoring. POPL 2001: 206-219
2000
42EEPankaj Kakkar, Carl A. Gunter, Martín Abadi: Reasoning about Secrecy for Active Networks. CSFW 2000: 118-129
41EEKarthikeyan Bhargavan, Carl A. Gunter, Davor Obradovic: Fault origin adjudication. FMSP 2000: 61-71
40 Bow-Yaw Wang, José Meseguer, Carl A. Gunter: Specification and Formal Analysis of a PLAN Algorithm in Maude. ICDCS Workshop on Distributed System Validation and Verification 2000: E49-E56
39EECarl A. Gunter, Elsa L. Gunter, Michael Jackson, Pamela Zave: A Reference Model for Requirements and Specifications-Extended Abstract. ICRE 2000: 189
38EEKarthikeyan Bhargavan, Carl A. Gunter, Moonjoo Kim, Insup Lee, Davor Obradovic, Oleg Sokolsky, Mahesh Viswanathan: Verisim: Formal analysis of network simulations. ISSTA 2000: 2-13
37EEPankaj Kakkar, Michael McDougall, Carl A. Gunter, Trevor Jim: Certificate Distribution with Local Autonomy. IWAN 2000: 277-295
36EECarl A. Gunter, Trevor Jim: Generalized Certificate Revocation. POPL 2000: 316-329
35 Karthikeyan Bhargavan, Carl A. Gunter, Davor Obradovic: Routing Information Protocol in HOL/SPIN. TPHOLs 2000: 53-72
34EECarl A. Gunter: Abstracting dependencies between software configuration items. ACM Trans. Softw. Eng. Methodol. 9(1): 94-131 (2000)
33EECarl A. Gunter, Elsa L. Gunter, Michael Jackson, Pamela Zave: A Reference Model for Requirements and Specifications. IEEE Software 17(3): (2000)
32 Carl A. Gunter, Trevor Jim: Policy-directed certificate retrieval. Softw., Pract. Exper. 30(15): 1609-1640 (2000)
1999
31 Michael W. Hicks, Jonathan T. Moore, D. Scott Alexander, Carl A. Gunter, Scott Nettles: PLANet: An Active Internetwork. INFOCOM 1999: 1124-1133
30EEPankaj Kakkar, Michael W. Hicks, Jonathan T. Moore, Carl A. Gunter: Specifying the PLAN Network Programming Langauge. Electr. Notes Theor. Comput. Sci. 26: (1999)
1998
29EEMichael W. Hicks, Pankaj Kakkar, Jonathan T. Moore, Carl A. Gunter, Scott Nettles: Network Programming Using PLAN. ICCL Workshop: Internet Programming Languages 1998: 127-143
28EEMichael W. Hicks, Pankaj Kakkar, Jonathan T. Moore, Carl A. Gunter, Scott Nettles: PLAN: A Packet Language for Active Networks. ICFP 1998: 86-93
27 Karthikeyan Bhargavan, Carl A. Gunter, Elsa L. Gunter, Michael Jackson, Davor Obradovic, Pamela Zave: The Village Telephone System: A Case Study in Formal Software Engineering. TPHOLs 1998: 49-66
1997
26EECarl A. Gunter, Teow-Hin Ngair, Devika Subramanian: The Common Order-Theoretic Structure of Version Spaces and ATMSs. Artif. Intell. 95(2): 357-407 (1997)
1996
25 Carl A. Gunter, Teow-Hin Ngair, Devika Subramanian: Sets as Anti-Chains. ASIAN 1996: 116-128
24EECarl A. Gunter: Abstracting Dependencies between Software Configuration Items. SIGSOFT FSE 1996: 167-178
23 Carl A. Gunter, John C. Mitchell, David Notkin: Strategic Directions in Software Engineering and Programming Languages. ACM Comput. Surv. 28(4): 727-737 (1996)
22 Jawahar Chirimar, Carl A. Gunter, Jon G. Riecke: Reference Counting as a Computational Interpretation of Linear Logic. J. Funct. Program. 6(2): 195-244 (1996)
1995
21 Carl A. Gunter, Didier Rémy, Jon G. Riecke: A Generalization of Exceptions and Control in ML-like Languages. FPCA 1995: 12-23
1993
20 Carl A. Gunter, Elsa L. Gunter, David B. MacQueen: Computing ML Equality Kinds Using Abstract Interpretation Inf. Comput. 107(2): 303-323 (1993)
1992
19 Jawahar Chirimar, Carl A. Gunter, Myra Van Inwegen: Xpnet: A Graphical Interface to Proof Nets with an Efficient Proof Checker. CADE 1992: 711-715
18EEJawahar Chirimar, Carl A. Gunter, Jon G. Riecke: Proving Memory Management Invariants for a Language Based on Linear Logic. LISP and Functional Programming 1992: 139-150
17 Carl A. Gunter: The Mixed Powerdomain. Theor. Comput. Sci. 103(2): 311-334 (1992)
1991
16 Carl A. Gunter, Teow-Hin Ngair, Prakash Panangaden, Devika Subramanian: The Common Order-Theoretic Structure of Version Spaces and ATMS's. AAAI 1991: 500-505
15 Carl A. Gunter, Elsa L. Gunter, David B. MacQueen: An Abstract Interpretation for ML Equality Kinds. TACS 1991: 112-130
14 Carl A. Gunter: Forms of Semantic Specification. Bulletin of the EATCS 45: 98-113 (1991)
13 Val Tannen, Thierry Coquand, Carl A. Gunter, Andre Scedrov: Inheritance as Implicit Coercion Inf. Comput. 93(1): 172-221 (1991)
1990
12 Vijay Gehlot, Carl A. Gunter: Normal Process Representatives LICS 1990: 200-207
11EEVal Tannen, Carl A. Gunter, Andre Scedrov: Computing with Coercions. LISP and Functional Programming 1990: 44-60
10 Carl A. Gunter: Relating Total and Partial Correctness Interpretations of Non-Deterministic Programs. POPL 1990: 306-319
9 Carl A. Gunter, Dana S. Scott: Semantic Domains. Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics (B) 1990: 633-674
1989
8 Val Tannen, Thierry Coquand, Carl A. Gunter, Andre Scedrov: Inheritance and Explicit Coercion (Preliminary Report) LICS 1989: 112-129
7 Thierry Coquand, Carl A. Gunter, Glynn Winskel: Domain Theoretic Models of Polymorphism Inf. Comput. 81(2): 123-167 (1989)
1988
6 Carl A. Gunter, Achim Jung: Coherence and Consistency in Domains (Extended Outline) LICS 1988: 309-317
1987
5 Thierry Coquand, Carl A. Gunter, Glynn Winskel: DI-Domains as a Model of Polymorphism. MFPS 1987: 344-363
4 Carl A. Gunter: Universal Profinite Domains Inf. Comput. 72(1): 1-30 (1987)
1986
3 Carl A. Gunter: The Largest First-Order-Axiomatizable Cartesian Closed Category of Domains LICS 1986: 142-148
1985
2 Carl A. Gunter: A Universal Domain Technique for Profinite Posets. ICALP 1985: 232-243
1 Carl A. Gunter: Comparing Categories of Domains. Mathematical Foundations of Programming Semantics 1985: 101-121

Coauthor Index

1Martín Abadi [42] [50]
2Raja Afandi [60] [63]
3Musab AlTurki [78]
4D. Scott Alexander [31]
5Rajeev Alur [49] [54]
6Paul Anderson [77]
7Karthikeyan Bhargavan [27] [35] [38] [41] [43] [45] [46] [47] [56]
8Nayan L. Bhattad [58]
9Rakeshbabu Bobba [65]
10Nikita Borisov [71]
11Jodie P. Boyer [59] [61] [71]
12Rohit Chadha [74]
13Ellick Chan [75]
14Satish Chandra [43]
15Jawahar Chirimar [18] [19] [22]
16Thierry Coquand [5] [7] [8] [13]
17Jason Crampton [55]
18Omid Fatemieh [65] [67] [72]
19Sanjam Garg [69]
20Vijay Gehlot [12]
21Alwyn Goodloe [49] [57] [70]
22George Gross [69] [73]
23Ratul K. Guha [66]
24Elsa L. Gunter [15] [20] [27] [33] [39] [79]
25Jason J. Haas [80]
26Munawar Hafiz [63]
27Ragib Hasan [71]
28Michael W. Hicks (Michael Hicks) [28] [29] [30] [31]
29Myra Van Inwegen [19]
30Michael Jackson [27] [33] [39]
31Sonia Jahid [75]
32Trevor Jim [32] [36] [37]
33Achim Jung [6]
34Pankaj Kakkar [28] [29] [30] [37] [42] [50]
35Charles R. Kalmanek [77]
36Fariba Khan [65] [72]
37Sanjeev Khanna [53] [72]
38Himanshu Khurana [65]
39Moonjoo Kim [38] [46]
40Michael LeMay [67] [69] [73] [80]
41Adam J. Lee [61]
42Insup Lee [38] [46] [62] [64]
43Kevin D. Lux [58]
44David B. MacQueen [15] [20]
45P. Madhusudan (Parthasarathy Madhusudan) [76]
46Michael J. May [52] [58] [62] [64]
47Peter J. McCann [43]
48Michael McDougall [37] [49] [54]
49José Meseguer [40] [74] [78]
50John C. Mitchell [23]
51Jonathan T. Moore [28] [29] [30] [31]
52Sanjai Narain [77]
53Rajesh Nelli [73]
54Scott Nettles [28] [29] [31]
55Teow-Hin Ngair [16] [25] [26]
56Anh Nguyen [79]
57David Notkin [23]
58Davor Obradovic [27] [35] [38] [41] [45] [46]
59Lars E. Olson [61] [71] [76]
60Prakash Panangaden [16]
61Evgeni Peryshkin [75]
62David Raila [71]
63Daniel Rebolledo [75]
64Didier Rémy [21]
65Jon G. Riecke [18] [21] [22]
66Saswati Sarkar [66]
67Andre Scedrov [8] [11] [13]
68Dana S. Scott [9]
69Ravinder Shankesi [74]
70Wook Shin [62]
71Jonathan M. Smith [77]
72Oleg Sokolsky [38] [46]
73Mark-Oliver Stehr [57]
74Stuart G. Stubblebine [52]
75Devika Subramanian [16] [25] [26]
76Rajesh Talpade [77]
77Kaijun Tan [53] [55] [59]
78Val Tannen (Valeriu Breazu, Val Breazu-Tannen) [8] [11] [13]
79Santosh S. Venkatesh [53] [72]
80Mahesh Viswanathan [38] [46] [74]
81Bow-Yaw Wang [40]
82Stephen Weeks [44]
83Glynn Winskel [5] [7]
84Marianne Winslett [68]
85Andrew K. Wright [44]
86Geoffrey G. Xie [77]
87Ayesha Yasmeen [79]
88Pamela Zave [27] [33] [39]
89Charles C. Zhang [68]
90Jianqing Zhang [60] [63]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)