Search the dblp DataBase
Carl A. Gunter :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Carl A. Gunter The Mixed Powerdomain. [Citation Graph (2, 0)][DBLP ] Theor. Comput. Sci., 1992, v:103, n:2, pp:311-334 [Journal ] Val Tannen , Thierry Coquand , Carl A. Gunter , Andre Scedrov Inheritance and Explicit Coercion (Preliminary Report) [Citation Graph (1, 0)][DBLP ] LICS, 1989, pp:112-129 [Conf ] Val Tannen , Thierry Coquand , Carl A. Gunter , Andre Scedrov Inheritance as Implicit Coercion [Citation Graph (1, 0)][DBLP ] Inf. Comput., 1991, v:93, n:1, pp:172-221 [Journal ] Carl A. Gunter , Teow-Hin Ngair , Prakash Panangaden , Devika Subramanian The Common Order-Theoretic Structure of Version Spaces and ATMS's. [Citation Graph (0, 0)][DBLP ] AAAI, 1991, pp:500-505 [Conf ] Carl A. Gunter , Teow-Hin Ngair , Devika Subramanian Sets as Anti-Chains. [Citation Graph (0, 0)][DBLP ] ASIAN, 1996, pp:116-128 [Conf ] Jawahar Chirimar , Carl A. Gunter , Myra Van Inwegen Xpnet: A Graphical Interface to Proof Nets with an Efficient Proof Checker. [Citation Graph (0, 0)][DBLP ] CADE, 1992, pp:711-715 [Conf ] Alwyn Goodloe , Michael McDougall , Carl A. Gunter , Rajeev Alur Predictable programs in barcodes. [Citation Graph (0, 0)][DBLP ] CASES, 2002, pp:298-303 [Conf ] Adam J. Lee , Jodie P. Boyer , Lars Olson , Carl A. Gunter Defeasible security policy composition for web services. [Citation Graph (0, 0)][DBLP ] FMSE, 2006, pp:45-54 [Conf ] Michael J. May , Wook Shin , Carl A. Gunter , Insup Lee Securing the drop-box architecture for assisted living. [Citation Graph (0, 0)][DBLP ] FMSE, 2006, pp:1-12 [Conf ] Pankaj Kakkar , Carl A. Gunter , Martín Abadi Reasoning about Secrecy for Active Networks. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:118-129 [Conf ] Kaijun Tan , Jason Crampton , Carl A. Gunter The Consistency of Task-Based Authorization Constraints in Workflow Systems. [Citation Graph (0, 0)][DBLP ] CSFW, 2004, pp:155-0 [Conf ] Michael J. May , Carl A. Gunter , Insup Lee Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies. [Citation Graph (0, 0)][DBLP ] CSFW, 2006, pp:85-97 [Conf ] Carl A. Gunter Open APIs for Embedded Security. [Citation Graph (0, 0)][DBLP ] ECOOP, 2003, pp:225-247 [Conf ] Raja Afandi , Jianqing Zhang , Munawar Hafiz , Carl A. Gunter AMPol: Adaptive Messaging Policy. [Citation Graph (0, 0)][DBLP ] ECOWS, 2006, pp:53-64 [Conf ] Michael McDougall , Rajeev Alur , Carl A. Gunter A model-based approach to integrating security policies for embedded devices. [Citation Graph (0, 0)][DBLP ] EMSOFT, 2004, pp:211-219 [Conf ] Karthikeyan Bhargavan , Carl A. Gunter , Davor Obradovic Fault origin adjudication. [Citation Graph (0, 0)][DBLP ] FMSP, 2000, pp:61-71 [Conf ] Carl A. Gunter , Didier Rémy , Jon G. Riecke A Generalization of Exceptions and Control in ML-like Languages. [Citation Graph (0, 0)][DBLP ] FPCA, 1995, pp:12-23 [Conf ] Carl A. Gunter , Stephen Weeks , Andrew K. Wright Models and Languages for Digital Rights. [Citation Graph (0, 0)][DBLP ] HICSS, 2001, pp:- [Conf ] Michael LeMay , George Gross , Carl A. Gunter , Sanjam Garg Unified Architecture for Large-Scale Attested Metering. [Citation Graph (0, 0)][DBLP ] HICSS, 2007, pp:115- [Conf ] Carl A. Gunter A Universal Domain Technique for Profinite Posets. [Citation Graph (0, 0)][DBLP ] ICALP, 1985, pp:232-243 [Conf ] Michael W. Hicks , Pankaj Kakkar , Jonathan T. Moore , Carl A. Gunter , Scott Nettles Network Programming Using PLAN. [Citation Graph (0, 0)][DBLP ] ICCL Workshop: Internet Programming Languages, 1998, pp:127-143 [Conf ] Bow-Yaw Wang , José Meseguer , Carl A. Gunter Specification and Formal Analysis of a PLAN Algorithm in Maude. [Citation Graph (0, 0)][DBLP ] ICDCS Workshop on Distributed System Validation and Verification, 2000, pp:0-0 [Conf ] Michael W. Hicks , Pankaj Kakkar , Jonathan T. Moore , Carl A. Gunter , Scott Nettles PLAN: A Packet Language for Active Networks. [Citation Graph (0, 0)][DBLP ] ICFP, 1998, pp:86-93 [Conf ] Carl A. Gunter , Elsa L. Gunter , Michael Jackson , Pamela Zave A Reference Model for Requirements and Specifications-Extended Abstract. [Citation Graph (0, 0)][DBLP ] ICRE, 2000, pp:189- [Conf ] Raja Afandi , Jianqing Zhang , Carl A. Gunter AMPol-Q: Adaptive Middleware Policy to Support QoS. [Citation Graph (0, 0)][DBLP ] ICSOC, 2006, pp:165-178 [Conf ] Kevin D. Lux , Michael J. May , Nayan L. Bhattad , Carl A. Gunter WSEmail: Secure Internet Messaging Based on Web Services. [Citation Graph (0, 0)][DBLP ] ICWS, 2005, pp:75-82 [Conf ] Carl A. Gunter Micro Mobile Programs. [Citation Graph (0, 0)][DBLP ] IFIP TCS, 2002, pp:356-369 [Conf ] Michael W. Hicks , Jonathan T. Moore , D. Scott Alexander , Carl A. Gunter , Scott Nettles PLANet: An Active Internetwork. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1999, pp:1124-1133 [Conf ] Karthikeyan Bhargavan , Carl A. Gunter , Moonjoo Kim , Insup Lee , Davor Obradovic , Oleg Sokolsky , Mahesh Viswanathan Verisim: Formal analysis of network simulations. [Citation Graph (0, 0)][DBLP ] ISSTA, 2000, pp:2-13 [Conf ] Pankaj Kakkar , Michael McDougall , Carl A. Gunter , Trevor Jim Certificate Distribution with Local Autonomy. [Citation Graph (0, 0)][DBLP ] IWAN, 2000, pp:277-295 [Conf ] Jawahar Chirimar , Carl A. Gunter , Jon G. Riecke Proving Memory Management Invariants for a Language Based on Linear Logic. [Citation Graph (0, 0)][DBLP ] LISP and Functional Programming, 1992, pp:139-150 [Conf ] Val Tannen , Carl A. Gunter , Andre Scedrov Computing with Coercions. [Citation Graph (0, 0)][DBLP ] LISP and Functional Programming, 1990, pp:44-60 [Conf ] Vijay Gehlot , Carl A. Gunter Normal Process Representatives [Citation Graph (0, 0)][DBLP ] LICS, 1990, pp:200-207 [Conf ] Carl A. Gunter The Largest First-Order-Axiomatizable Cartesian Closed Category of Domains [Citation Graph (0, 0)][DBLP ] LICS, 1986, pp:142-148 [Conf ] Carl A. Gunter , Achim Jung Coherence and Consistency in Domains (Extended Outline) [Citation Graph (0, 0)][DBLP ] LICS, 1988, pp:309-317 [Conf ] Thierry Coquand , Carl A. Gunter , Glynn Winskel DI-Domains as a Model of Polymorphism. [Citation Graph (0, 0)][DBLP ] MFPS, 1987, pp:344-363 [Conf ] Carl A. Gunter Comparing Categories of Domains. [Citation Graph (0, 0)][DBLP ] Mathematical Foundations of Programming Semantics, 1985, pp:101-121 [Conf ] Carl A. Gunter , Sanjeev Khanna , Kaijun Tan , Santosh S. Venkatesh DoS Protection for Reliably Authenticated Broadcast. [Citation Graph (0, 0)][DBLP ] NDSS, 2004, pp:- [Conf ] Carl A. Gunter , Michael J. May , Stuart G. Stubblebine A Formal Privacy System and Its Application to Location Based Services. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2004, pp:256-282 [Conf ] Karthikeyan Bhargavan , Satish Chandra , Peter J. McCann , Carl A. Gunter What packets may come: automata for network monitoring. [Citation Graph (0, 0)][DBLP ] POPL, 2001, pp:206-219 [Conf ] Carl A. Gunter Relating Total and Partial Correctness Interpretations of Non-Deterministic Programs. [Citation Graph (0, 0)][DBLP ] POPL, 1990, pp:306-319 [Conf ] Carl A. Gunter , Trevor Jim Generalized Certificate Revocation. [Citation Graph (0, 0)][DBLP ] POPL, 2000, pp:316-329 [Conf ] Carl A. Gunter Abstracting Dependencies between Software Configuration Items. [Citation Graph (0, 0)][DBLP ] SIGSOFT FSE, 1996, pp:167-178 [Conf ] Charles C. Zhang , Marianne Winslett , Carl A. Gunter On the Safety and Efficiency of Firewall Policy Deployment. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:33-50 [Conf ] Jodie P. Boyer , Kaijun Tan , Carl A. Gunter Privacy Sensitive Location Information Systems in Smart Buildings. [Citation Graph (0, 0)][DBLP ] SPC, 2006, pp:149-164 [Conf ] Carl A. Gunter , Elsa L. Gunter , David B. MacQueen An Abstract Interpretation for ML Equality Kinds. [Citation Graph (0, 0)][DBLP ] TACS, 1991, pp:112-130 [Conf ] Karthikeyan Bhargavan , Carl A. Gunter , Elsa L. Gunter , Michael Jackson , Davor Obradovic , Pamela Zave The Village Telephone System: A Case Study in Formal Software Engineering. [Citation Graph (0, 0)][DBLP ] TPHOLs, 1998, pp:49-66 [Conf ] Karthikeyan Bhargavan , Carl A. Gunter , Davor Obradovic Routing Information Protocol in HOL/SPIN. [Citation Graph (0, 0)][DBLP ] TPHOLs, 2000, pp:53-72 [Conf ] Carl A. Gunter , Teow-Hin Ngair , Devika Subramanian The Common Order-Theoretic Structure of Version Spaces and ATMSs. [Citation Graph (0, 0)][DBLP ] Artif. Intell., 1997, v:95, n:2, pp:357-407 [Journal ] Carl A. Gunter , John C. Mitchell , David Notkin Strategic Directions in Software Engineering and Programming Languages. [Citation Graph (0, 0)][DBLP ] ACM Comput. Surv., 1996, v:28, n:4, pp:727-737 [Journal ] Carl A. Gunter Forms of Semantic Specification. [Citation Graph (0, 0)][DBLP ] Bulletin of the EATCS, 1991, v:45, n:, pp:98-113 [Journal ] Karthikeyan Bhargavan , Carl A. Gunter Requirements for a Practical Network Event Recognition Language. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2002, v:70, n:4, pp:- [Journal ] Pankaj Kakkar , Michael W. Hicks , Jonathan T. Moore , Carl A. Gunter Specifying the PLAN Network Programming Langauge. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 1999, v:26, n:, pp:- [Journal ] Karthikeyan Bhargavan , Carl A. Gunter Network Event Recognition. [Citation Graph (0, 0)][DBLP ] Formal Methods in System Design, 2005, v:27, n:3, pp:213-251 [Journal ] Thierry Coquand , Carl A. Gunter , Glynn Winskel Domain Theoretic Models of Polymorphism [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1989, v:81, n:2, pp:123-167 [Journal ] Carl A. Gunter Universal Profinite Domains [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1987, v:72, n:1, pp:1-30 [Journal ] Carl A. Gunter , Elsa L. Gunter , David B. MacQueen Computing ML Equality Kinds Using Abstract Interpretation [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1993, v:107, n:2, pp:303-323 [Journal ] Karthikeyan Bhargavan , Davor Obradovic , Carl A. Gunter Formal verification of standards for distance vector routing protocols. [Citation Graph (0, 0)][DBLP ] J. ACM, 2002, v:49, n:4, pp:538-576 [Journal ] Pankaj Kakkar , Carl A. Gunter , Martín Abadi Reasoning About Secrecy for Active Networks. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2003, v:11, n:2, pp:245-287 [Journal ] Jawahar Chirimar , Carl A. Gunter , Jon G. Riecke Reference Counting as a Computational Interpretation of Linear Logic. [Citation Graph (0, 0)][DBLP ] J. Funct. Program., 1996, v:6, n:2, pp:195-244 [Journal ] Carl A. Gunter , Elsa L. Gunter , Michael Jackson , Pamela Zave A Reference Model for Requirements and Specifications. [Citation Graph (0, 0)][DBLP ] IEEE Software, 2000, v:17, n:3, pp:- [Journal ] Carl A. Gunter , Trevor Jim Policy-directed certificate retrieval. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 2000, v:30, n:15, pp:1609-1640 [Journal ] Ratul K. Guha , Carl A. Gunter , Saswati Sarkar Fair Coalitions for Power-Aware Routing in Wireless Networks. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Mob. Comput., 2007, v:6, n:2, pp:206-220 [Journal ] Carl A. Gunter Abstracting dependencies between software configuration items. [Citation Graph (0, 0)][DBLP ] ACM Trans. Softw. Eng. Methodol., 2000, v:9, n:1, pp:94-131 [Journal ] Karthikeyan Bhargavan , Carl A. Gunter , Moonjoo Kim , Insup Lee , Davor Obradovic , Oleg Sokolsky , Mahesh Viswanathan Verisim: Formal Analysis of Network Simulations. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2002, v:28, n:2, pp:129-145 [Journal ] Rakeshbabu Bobba , Omid Fatemieh , Fariba Khan , Carl A. Gunter , Himanshu Khurana Using Attribute-Based Access Control to Enable Attribute-Based Messaging. [Citation Graph (0, 0)][DBLP ] ACSAC, 2006, pp:403-413 [Conf ] Michael LeMay , Omid Fatemieh , Carl A. Gunter PolicyMorph: interactive policy transformations for a logical attribute-based access control framework. [Citation Graph (0, 0)][DBLP ] SACMAT, 2007, pp:205-214 [Conf ] Improving multi-tier security using redundant authentication. [Citation Graph (, )][DBLP ] A formal framework for reflective database access control policies. [Citation Graph (, )][DBLP ] Using rhythmic nonces for puzzle-based DoS resistance. [Citation Graph (, )][DBLP ] Reasoning about Concurrency for Security Tunnels. [Citation Graph (, )][DBLP ] Implementing Reflective Access Control in SQL. [Citation Graph (, )][DBLP ] Model-Checking DoS Amplification for VoIP Session Initiation. [Citation Graph (, )][DBLP ] Cumulative Attestation Kernels for Embedded Systems. [Citation Graph (, )][DBLP ] Modular Preservation of Safety Properties by Cookie-Based DoS-Protection Wrappers. [Citation Graph (, )][DBLP ] An Integrated Architecture for Demand Response Communications and Control. [Citation Graph (, )][DBLP ] Collaborative Recommender Systems for Building Automation. [Citation Graph (, )][DBLP ] Specifying and Analyzing Workflows for Automated Identification and Data Capture. [Citation Graph (, )][DBLP ] Adaptive SelectiveVerification. [Citation Graph (, )][DBLP ] Diagnostic powertracing for sensor node failure analysis. [Citation Graph (, )][DBLP ] Strong and Weak Policy Relations. [Citation Graph (, )][DBLP ] Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers. [Citation Graph (, )][DBLP ] Formal prototyping in early stages of protocol design. [Citation Graph (, )][DBLP ] Safety in discretionary access control for logic-based publish-subscribe systems. [Citation Graph (, )][DBLP ] How to Bootstrap Security for Ad-Hoc Network: Revisited. [Citation Graph (, )][DBLP ] Sh@re: Negotiated Audit in Social Networks. [Citation Graph (, )][DBLP ] Probabilistic Modeling and Analysis of DoS Protection for the ASV Protocol. [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.611secs