![]() | 2009 | |
---|---|---|
87 | ![]() ![]() ![]() ![]() ![]() ![]() | Lars E. Olson, Carl A. Gunter, William R. Cook, Marianne Winslett: Implementing Reflective Access Control in SQL. DBSec 2009: 17-32 |
86 | ![]() ![]() ![]() ![]() ![]() ![]() | Ravinder Shankesi, Musab AlTurki, Ralf Sasse, Carl A. Gunter, José Meseguer: Model-Checking DoS Amplification for VoIP Session Initiation. ESORICS 2009: 390-405 |
85 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael LeMay, Carl A. Gunter: Cumulative Attestation Kernels for Embedded Systems. ESORICS 2009: 655-670 |
84 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael LeMay, Jason J. Haas, Carl A. Gunter: Collaborative Recommender Systems for Building Automation. HICSS 2009: 1-10 |
83 | ![]() ![]() ![]() ![]() ![]() ![]() | Elsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, Anh Nguyen: Specifying and Analyzing Workflows for Automated Identification and Data Capture. HICSS 2009: 1-11 |
82 | ![]() ![]() ![]() ![]() ![]() ![]() | Carl A. Gunter: Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers. POLICY 2009: 114-117 |
81 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael J. May, Carl A. Gunter, Insup Lee, Steve Zdancewic: Strong and Weak Policy Relations. POLICY 2009: 33-36 |
80 | ![]() ![]() ![]() ![]() ![]() ![]() | Kazuhiro Minami, Nikita Borisov, Carl A. Gunter: Safety in discretionary access control for logic-based publish-subscribe systems. SACMAT 2009: 3-12 |
79 | ![]() ![]() ![]() ![]() ![]() ![]() | Wook Shin, Carl A. Gunter, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka: How to Bootstrap Security for Ad-Hoc Network: Revisited. SEC 2009: 119-131 |
78 | ![]() ![]() ![]() ![]() ![]() ![]() | Musab AlTurki, José Meseguer, Carl A. Gunter: Probabilistic Modeling and Analysis of DoS Protection for the ASV Protocol. Electr. Notes Theor. Comput. Sci. 234: 3-18 (2009) |
77 | ![]() ![]() ![]() ![]() ![]() ![]() | Paul Anderson, Carl A. Gunter, Charles R. Kalmanek, Sanjai Narain, Jonathan M. Smith, Rajesh Talpade, Geoffrey G. Xie: Guest editorial network infrastructure configuration. IEEE Journal on Selected Areas in Communications 27(3): 249-252 (2009) |
2008 | ||
76 | ![]() ![]() ![]() ![]() ![]() ![]() | Lars E. Olson, Carl A. Gunter, P. Madhusudan: A formal framework for reflective database access control policies. ACM Conference on Computer and Communications Security 2008: 289-298 |
75 | ![]() ![]() ![]() ![]() ![]() ![]() | Ellick Chan, Carl A. Gunter, Sonia Jahid, Evgeni Peryshkin, Daniel Rebolledo: Using rhythmic nonces for puzzle-based DoS resistance. CSAW 2008: 51-58 |
74 | ![]() ![]() ![]() ![]() ![]() ![]() | Rohit Chadha, Carl A. Gunter, José Meseguer, Ravinder Shankesi, Mahesh Viswanathan: Modular Preservation of Safety Properties by Cookie-Based DoS-Protection Wrappers. FMOODS 2008: 39-58 |
73 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael LeMay, Rajesh Nelli, George Gross, Carl A. Gunter: An Integrated Architecture for Demand Response Communications and Control. HICSS 2008: 174 |
72 | ![]() ![]() ![]() ![]() ![]() ![]() | Sanjeev Khanna, Santosh S. Venkatesh, Omid Fatemieh, Fariba Khan, Carl A. Gunter: Adaptive SelectiveVerification. INFOCOM 2008: 529-537 |
2007 | ||
71 | ![]() ![]() ![]() ![]() ![]() ![]() | Jodie P. Boyer, Ragib Hasan, Lars E. Olson, Nikita Borisov, Carl A. Gunter, David Raila: Improving multi-tier security using redundant authentication. CSAW 2007: 54-62 |
70 | ![]() ![]() ![]() ![]() ![]() ![]() | Alwyn Goodloe, Carl A. Gunter: Reasoning about Concurrency for Security Tunnels. CSF 2007: 64-78 |
69 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael LeMay, George Gross, Carl A. Gunter, Sanjam Garg: Unified Architecture for Large-Scale Attested Metering. HICSS 2007: 115 |
68 | ![]() ![]() ![]() ![]() ![]() ![]() | Charles C. Zhang, Marianne Winslett, Carl A. Gunter: On the Safety and Efficiency of Firewall Policy Deployment. IEEE Symposium on Security and Privacy 2007: 33-50 |
67 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael LeMay, Omid Fatemieh, Carl A. Gunter: PolicyMorph: interactive policy transformations for a logical attribute-based access control framework. SACMAT 2007: 205-214 |
66 | ![]() ![]() ![]() ![]() ![]() ![]() | Ratul K. Guha, Carl A. Gunter, Saswati Sarkar: Fair Coalitions for Power-Aware Routing in Wireless Networks. IEEE Trans. Mob. Comput. 6(2): 206-220 (2007) |
2006 | ||
65 | ![]() ![]() ![]() ![]() ![]() ![]() | Rakeshbabu Bobba, Omid Fatemieh, Fariba Khan, Carl A. Gunter, Himanshu Khurana: Using Attribute-Based Access Control to Enable Attribute-Based Messaging. ACSAC 2006: 403-413 |
64 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael J. May, Carl A. Gunter, Insup Lee: Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies. CSFW 2006: 85-97 |
63 | ![]() ![]() ![]() ![]() ![]() ![]() | Raja Afandi, Jianqing Zhang, Munawar Hafiz, Carl A. Gunter: AMPol: Adaptive Messaging Policy. ECOWS 2006: 53-64 |
62 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael J. May, Wook Shin, Carl A. Gunter, Insup Lee: Securing the drop-box architecture for assisted living. FMSE 2006: 1-12 |
61 | ![]() ![]() ![]() ![]() ![]() ![]() | Adam J. Lee, Jodie P. Boyer, Lars E. Olson, Carl A. Gunter: Defeasible security policy composition for web services. FMSE 2006: 45-54 |
60 | ![]() ![]() ![]() ![]() ![]() ![]() | Raja Afandi, Jianqing Zhang, Carl A. Gunter: AMPol-Q: Adaptive Middleware Policy to Support QoS. ICSOC 2006: 165-178 |
59 | ![]() ![]() ![]() ![]() ![]() ![]() | Jodie P. Boyer, Kaijun Tan, Carl A. Gunter: Privacy Sensitive Location Information Systems in Smart Buildings. SPC 2006: 149-164 |
2005 | ||
58 | ![]() ![]() ![]() ![]() ![]() ![]() | Kevin D. Lux, Michael J. May, Nayan L. Bhattad, Carl A. Gunter: WSEmail: Secure Internet Messaging Based on Web Services. ICWS 2005: 75-82 |
57 | ![]() ![]() ![]() ![]() ![]() ![]() | Alwyn Goodloe, Carl A. Gunter, Mark-Oliver Stehr: Formal prototyping in early stages of protocol design. WITS 2005: 67-80 |
56 | ![]() ![]() ![]() ![]() ![]() ![]() | Karthikeyan Bhargavan, Carl A. Gunter: Network Event Recognition. Formal Methods in System Design 27(3): 213-251 (2005) |
2004 | ||
55 | ![]() ![]() ![]() ![]() ![]() ![]() | Kaijun Tan, Jason Crampton, Carl A. Gunter: The Consistency of Task-Based Authorization Constraints in Workflow Systems. CSFW 2004: 155- |
54 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael McDougall, Rajeev Alur, Carl A. Gunter: A model-based approach to integrating security policies for embedded devices. EMSOFT 2004: 211-219 |
53 | ![]() ![]() ![]() ![]() ![]() ![]() | Carl A. Gunter, Sanjeev Khanna, Kaijun Tan, Santosh S. Venkatesh: DoS Protection for Reliably Authenticated Broadcast. NDSS 2004 |
52 | ![]() ![]() ![]() ![]() ![]() ![]() | Carl A. Gunter, Michael J. May, Stuart G. Stubblebine: A Formal Privacy System and Its Application to Location Based Services. Privacy Enhancing Technologies 2004: 256-282 |
2003 | ||
51 | ![]() ![]() ![]() ![]() ![]() ![]() | Carl A. Gunter: Open APIs for Embedded Security. ECOOP 2003: 225-247 |
50 | ![]() ![]() ![]() ![]() ![]() ![]() | Pankaj Kakkar, Carl A. Gunter, Martín Abadi: Reasoning About Secrecy for Active Networks. Journal of Computer Security 11(2): 245-287 (2003) |
2002 | ||
49 | ![]() ![]() ![]() ![]() ![]() ![]() | Alwyn Goodloe, Michael McDougall, Carl A. Gunter, Rajeev Alur: Predictable programs in barcodes. CASES 2002: 298-303 |
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Carl A. Gunter: Micro Mobile Programs. IFIP TCS 2002: 356-369 |
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Karthikeyan Bhargavan, Carl A. Gunter: Requirements for a Practical Network Event Recognition Language. Electr. Notes Theor. Comput. Sci. 70(4): (2002) |
46 | ![]() ![]() ![]() ![]() ![]() ![]() | Karthikeyan Bhargavan, Carl A. Gunter, Moonjoo Kim, Insup Lee, Davor Obradovic, Oleg Sokolsky, Mahesh Viswanathan: Verisim: Formal Analysis of Network Simulations. IEEE Trans. Software Eng. 28(2): 129-145 (2002) |
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Karthikeyan Bhargavan, Davor Obradovic, Carl A. Gunter: Formal verification of standards for distance vector routing protocols. J. ACM 49(4): 538-576 (2002) |
2001 | ||
44 | ![]() ![]() ![]() ![]() ![]() ![]() | Carl A. Gunter, Stephen Weeks, Andrew K. Wright: Models and Languages for Digital Rights. HICSS 2001 |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Karthikeyan Bhargavan, Satish Chandra, Peter J. McCann, Carl A. Gunter: What packets may come: automata for network monitoring. POPL 2001: 206-219 |
2000 | ||
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Pankaj Kakkar, Carl A. Gunter, Martín Abadi: Reasoning about Secrecy for Active Networks. CSFW 2000: 118-129 |
41 | ![]() ![]() ![]() ![]() ![]() ![]() | Karthikeyan Bhargavan, Carl A. Gunter, Davor Obradovic: Fault origin adjudication. FMSP 2000: 61-71 |
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Bow-Yaw Wang, José Meseguer, Carl A. Gunter: Specification and Formal Analysis of a PLAN Algorithm in Maude. ICDCS Workshop on Distributed System Validation and Verification 2000: E49-E56 |
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Carl A. Gunter, Elsa L. Gunter, Michael Jackson, Pamela Zave: A Reference Model for Requirements and Specifications-Extended Abstract. ICRE 2000: 189 |
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Karthikeyan Bhargavan, Carl A. Gunter, Moonjoo Kim, Insup Lee, Davor Obradovic, Oleg Sokolsky, Mahesh Viswanathan: Verisim: Formal analysis of network simulations. ISSTA 2000: 2-13 |
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Pankaj Kakkar, Michael McDougall, Carl A. Gunter, Trevor Jim: Certificate Distribution with Local Autonomy. IWAN 2000: 277-295 |
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Carl A. Gunter, Trevor Jim: Generalized Certificate Revocation. POPL 2000: 316-329 |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Karthikeyan Bhargavan, Carl A. Gunter, Davor Obradovic: Routing Information Protocol in HOL/SPIN. TPHOLs 2000: 53-72 |
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Carl A. Gunter: Abstracting dependencies between software configuration items. ACM Trans. Softw. Eng. Methodol. 9(1): 94-131 (2000) |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Carl A. Gunter, Elsa L. Gunter, Michael Jackson, Pamela Zave: A Reference Model for Requirements and Specifications. IEEE Software 17(3): (2000) |
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Carl A. Gunter, Trevor Jim: Policy-directed certificate retrieval. Softw., Pract. Exper. 30(15): 1609-1640 (2000) |
1999 | ||
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael W. Hicks, Jonathan T. Moore, D. Scott Alexander, Carl A. Gunter, Scott Nettles: PLANet: An Active Internetwork. INFOCOM 1999: 1124-1133 |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Pankaj Kakkar, Michael W. Hicks, Jonathan T. Moore, Carl A. Gunter: Specifying the PLAN Network Programming Langauge. Electr. Notes Theor. Comput. Sci. 26: (1999) |
1998 | ||
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael W. Hicks, Pankaj Kakkar, Jonathan T. Moore, Carl A. Gunter, Scott Nettles: Network Programming Using PLAN. ICCL Workshop: Internet Programming Languages 1998: 127-143 |
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael W. Hicks, Pankaj Kakkar, Jonathan T. Moore, Carl A. Gunter, Scott Nettles: PLAN: A Packet Language for Active Networks. ICFP 1998: 86-93 |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Karthikeyan Bhargavan, Carl A. Gunter, Elsa L. Gunter, Michael Jackson, Davor Obradovic, Pamela Zave: The Village Telephone System: A Case Study in Formal Software Engineering. TPHOLs 1998: 49-66 |
1997 | ||
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Carl A. Gunter, Teow-Hin Ngair, Devika Subramanian: The Common Order-Theoretic Structure of Version Spaces and ATMSs. Artif. Intell. 95(2): 357-407 (1997) |
1996 | ||
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Carl A. Gunter, Teow-Hin Ngair, Devika Subramanian: Sets as Anti-Chains. ASIAN 1996: 116-128 |
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Carl A. Gunter: Abstracting Dependencies between Software Configuration Items. SIGSOFT FSE 1996: 167-178 |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Carl A. Gunter, John C. Mitchell, David Notkin: Strategic Directions in Software Engineering and Programming Languages. ACM Comput. Surv. 28(4): 727-737 (1996) |
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Jawahar Chirimar, Carl A. Gunter, Jon G. Riecke: Reference Counting as a Computational Interpretation of Linear Logic. J. Funct. Program. 6(2): 195-244 (1996) |
1995 | ||
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Carl A. Gunter, Didier Rémy, Jon G. Riecke: A Generalization of Exceptions and Control in ML-like Languages. FPCA 1995: 12-23 |
1993 | ||
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Carl A. Gunter, Elsa L. Gunter, David B. MacQueen: Computing ML Equality Kinds Using Abstract Interpretation Inf. Comput. 107(2): 303-323 (1993) |
1992 | ||
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Jawahar Chirimar, Carl A. Gunter, Myra Van Inwegen: Xpnet: A Graphical Interface to Proof Nets with an Efficient Proof Checker. CADE 1992: 711-715 |
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Jawahar Chirimar, Carl A. Gunter, Jon G. Riecke: Proving Memory Management Invariants for a Language Based on Linear Logic. LISP and Functional Programming 1992: 139-150 |
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Carl A. Gunter: The Mixed Powerdomain. Theor. Comput. Sci. 103(2): 311-334 (1992) |
1991 | ||
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Carl A. Gunter, Teow-Hin Ngair, Prakash Panangaden, Devika Subramanian: The Common Order-Theoretic Structure of Version Spaces and ATMS's. AAAI 1991: 500-505 |
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Carl A. Gunter, Elsa L. Gunter, David B. MacQueen: An Abstract Interpretation for ML Equality Kinds. TACS 1991: 112-130 |
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Carl A. Gunter: Forms of Semantic Specification. Bulletin of the EATCS 45: 98-113 (1991) |
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Val Tannen, Thierry Coquand, Carl A. Gunter, Andre Scedrov: Inheritance as Implicit Coercion Inf. Comput. 93(1): 172-221 (1991) |
1990 | ||
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Vijay Gehlot, Carl A. Gunter: Normal Process Representatives LICS 1990: 200-207 |
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Val Tannen, Carl A. Gunter, Andre Scedrov: Computing with Coercions. LISP and Functional Programming 1990: 44-60 |
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Carl A. Gunter: Relating Total and Partial Correctness Interpretations of Non-Deterministic Programs. POPL 1990: 306-319 |
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Carl A. Gunter, Dana S. Scott: Semantic Domains. Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics (B) 1990: 633-674 |
1989 | ||
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Val Tannen, Thierry Coquand, Carl A. Gunter, Andre Scedrov: Inheritance and Explicit Coercion (Preliminary Report) LICS 1989: 112-129 |
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Thierry Coquand, Carl A. Gunter, Glynn Winskel: Domain Theoretic Models of Polymorphism Inf. Comput. 81(2): 123-167 (1989) |
1988 | ||
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Carl A. Gunter, Achim Jung: Coherence and Consistency in Domains (Extended Outline) LICS 1988: 309-317 |
1987 | ||
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Thierry Coquand, Carl A. Gunter, Glynn Winskel: DI-Domains as a Model of Polymorphism. MFPS 1987: 344-363 |
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Carl A. Gunter: Universal Profinite Domains Inf. Comput. 72(1): 1-30 (1987) |
1986 | ||
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Carl A. Gunter: The Largest First-Order-Axiomatizable Cartesian Closed Category of Domains LICS 1986: 142-148 |
1985 | ||
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Carl A. Gunter: A Universal Domain Technique for Profinite Posets. ICALP 1985: 232-243 |
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Carl A. Gunter: Comparing Categories of Domains. Mathematical Foundations of Programming Semantics 1985: 101-121 |