The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Carl A. Gunter: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Carl A. Gunter
    The Mixed Powerdomain. [Citation Graph (2, 0)][DBLP]
    Theor. Comput. Sci., 1992, v:103, n:2, pp:311-334 [Journal]
  2. Val Tannen, Thierry Coquand, Carl A. Gunter, Andre Scedrov
    Inheritance and Explicit Coercion (Preliminary Report) [Citation Graph (1, 0)][DBLP]
    LICS, 1989, pp:112-129 [Conf]
  3. Val Tannen, Thierry Coquand, Carl A. Gunter, Andre Scedrov
    Inheritance as Implicit Coercion [Citation Graph (1, 0)][DBLP]
    Inf. Comput., 1991, v:93, n:1, pp:172-221 [Journal]
  4. Carl A. Gunter, Teow-Hin Ngair, Prakash Panangaden, Devika Subramanian
    The Common Order-Theoretic Structure of Version Spaces and ATMS's. [Citation Graph (0, 0)][DBLP]
    AAAI, 1991, pp:500-505 [Conf]
  5. Carl A. Gunter, Teow-Hin Ngair, Devika Subramanian
    Sets as Anti-Chains. [Citation Graph (0, 0)][DBLP]
    ASIAN, 1996, pp:116-128 [Conf]
  6. Jawahar Chirimar, Carl A. Gunter, Myra Van Inwegen
    Xpnet: A Graphical Interface to Proof Nets with an Efficient Proof Checker. [Citation Graph (0, 0)][DBLP]
    CADE, 1992, pp:711-715 [Conf]
  7. Alwyn Goodloe, Michael McDougall, Carl A. Gunter, Rajeev Alur
    Predictable programs in barcodes. [Citation Graph (0, 0)][DBLP]
    CASES, 2002, pp:298-303 [Conf]
  8. Adam J. Lee, Jodie P. Boyer, Lars Olson, Carl A. Gunter
    Defeasible security policy composition for web services. [Citation Graph (0, 0)][DBLP]
    FMSE, 2006, pp:45-54 [Conf]
  9. Michael J. May, Wook Shin, Carl A. Gunter, Insup Lee
    Securing the drop-box architecture for assisted living. [Citation Graph (0, 0)][DBLP]
    FMSE, 2006, pp:1-12 [Conf]
  10. Pankaj Kakkar, Carl A. Gunter, Martín Abadi
    Reasoning about Secrecy for Active Networks. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:118-129 [Conf]
  11. Kaijun Tan, Jason Crampton, Carl A. Gunter
    The Consistency of Task-Based Authorization Constraints in Workflow Systems. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:155-0 [Conf]
  12. Michael J. May, Carl A. Gunter, Insup Lee
    Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:85-97 [Conf]
  13. Carl A. Gunter
    Open APIs for Embedded Security. [Citation Graph (0, 0)][DBLP]
    ECOOP, 2003, pp:225-247 [Conf]
  14. Raja Afandi, Jianqing Zhang, Munawar Hafiz, Carl A. Gunter
    AMPol: Adaptive Messaging Policy. [Citation Graph (0, 0)][DBLP]
    ECOWS, 2006, pp:53-64 [Conf]
  15. Michael McDougall, Rajeev Alur, Carl A. Gunter
    A model-based approach to integrating security policies for embedded devices. [Citation Graph (0, 0)][DBLP]
    EMSOFT, 2004, pp:211-219 [Conf]
  16. Karthikeyan Bhargavan, Carl A. Gunter, Davor Obradovic
    Fault origin adjudication. [Citation Graph (0, 0)][DBLP]
    FMSP, 2000, pp:61-71 [Conf]
  17. Carl A. Gunter, Didier Rémy, Jon G. Riecke
    A Generalization of Exceptions and Control in ML-like Languages. [Citation Graph (0, 0)][DBLP]
    FPCA, 1995, pp:12-23 [Conf]
  18. Carl A. Gunter, Stephen Weeks, Andrew K. Wright
    Models and Languages for Digital Rights. [Citation Graph (0, 0)][DBLP]
    HICSS, 2001, pp:- [Conf]
  19. Michael LeMay, George Gross, Carl A. Gunter, Sanjam Garg
    Unified Architecture for Large-Scale Attested Metering. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:115- [Conf]
  20. Carl A. Gunter
    A Universal Domain Technique for Profinite Posets. [Citation Graph (0, 0)][DBLP]
    ICALP, 1985, pp:232-243 [Conf]
  21. Michael W. Hicks, Pankaj Kakkar, Jonathan T. Moore, Carl A. Gunter, Scott Nettles
    Network Programming Using PLAN. [Citation Graph (0, 0)][DBLP]
    ICCL Workshop: Internet Programming Languages, 1998, pp:127-143 [Conf]
  22. Bow-Yaw Wang, José Meseguer, Carl A. Gunter
    Specification and Formal Analysis of a PLAN Algorithm in Maude. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshop on Distributed System Validation and Verification, 2000, pp:0-0 [Conf]
  23. Michael W. Hicks, Pankaj Kakkar, Jonathan T. Moore, Carl A. Gunter, Scott Nettles
    PLAN: A Packet Language for Active Networks. [Citation Graph (0, 0)][DBLP]
    ICFP, 1998, pp:86-93 [Conf]
  24. Carl A. Gunter, Elsa L. Gunter, Michael Jackson, Pamela Zave
    A Reference Model for Requirements and Specifications-Extended Abstract. [Citation Graph (0, 0)][DBLP]
    ICRE, 2000, pp:189- [Conf]
  25. Raja Afandi, Jianqing Zhang, Carl A. Gunter
    AMPol-Q: Adaptive Middleware Policy to Support QoS. [Citation Graph (0, 0)][DBLP]
    ICSOC, 2006, pp:165-178 [Conf]
  26. Kevin D. Lux, Michael J. May, Nayan L. Bhattad, Carl A. Gunter
    WSEmail: Secure Internet Messaging Based on Web Services. [Citation Graph (0, 0)][DBLP]
    ICWS, 2005, pp:75-82 [Conf]
  27. Carl A. Gunter
    Micro Mobile Programs. [Citation Graph (0, 0)][DBLP]
    IFIP TCS, 2002, pp:356-369 [Conf]
  28. Michael W. Hicks, Jonathan T. Moore, D. Scott Alexander, Carl A. Gunter, Scott Nettles
    PLANet: An Active Internetwork. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1999, pp:1124-1133 [Conf]
  29. Karthikeyan Bhargavan, Carl A. Gunter, Moonjoo Kim, Insup Lee, Davor Obradovic, Oleg Sokolsky, Mahesh Viswanathan
    Verisim: Formal analysis of network simulations. [Citation Graph (0, 0)][DBLP]
    ISSTA, 2000, pp:2-13 [Conf]
  30. Pankaj Kakkar, Michael McDougall, Carl A. Gunter, Trevor Jim
    Certificate Distribution with Local Autonomy. [Citation Graph (0, 0)][DBLP]
    IWAN, 2000, pp:277-295 [Conf]
  31. Jawahar Chirimar, Carl A. Gunter, Jon G. Riecke
    Proving Memory Management Invariants for a Language Based on Linear Logic. [Citation Graph (0, 0)][DBLP]
    LISP and Functional Programming, 1992, pp:139-150 [Conf]
  32. Val Tannen, Carl A. Gunter, Andre Scedrov
    Computing with Coercions. [Citation Graph (0, 0)][DBLP]
    LISP and Functional Programming, 1990, pp:44-60 [Conf]
  33. Vijay Gehlot, Carl A. Gunter
    Normal Process Representatives [Citation Graph (0, 0)][DBLP]
    LICS, 1990, pp:200-207 [Conf]
  34. Carl A. Gunter
    The Largest First-Order-Axiomatizable Cartesian Closed Category of Domains [Citation Graph (0, 0)][DBLP]
    LICS, 1986, pp:142-148 [Conf]
  35. Carl A. Gunter, Achim Jung
    Coherence and Consistency in Domains (Extended Outline) [Citation Graph (0, 0)][DBLP]
    LICS, 1988, pp:309-317 [Conf]
  36. Thierry Coquand, Carl A. Gunter, Glynn Winskel
    DI-Domains as a Model of Polymorphism. [Citation Graph (0, 0)][DBLP]
    MFPS, 1987, pp:344-363 [Conf]
  37. Carl A. Gunter
    Comparing Categories of Domains. [Citation Graph (0, 0)][DBLP]
    Mathematical Foundations of Programming Semantics, 1985, pp:101-121 [Conf]
  38. Carl A. Gunter, Sanjeev Khanna, Kaijun Tan, Santosh S. Venkatesh
    DoS Protection for Reliably Authenticated Broadcast. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  39. Carl A. Gunter, Michael J. May, Stuart G. Stubblebine
    A Formal Privacy System and Its Application to Location Based Services. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2004, pp:256-282 [Conf]
  40. Karthikeyan Bhargavan, Satish Chandra, Peter J. McCann, Carl A. Gunter
    What packets may come: automata for network monitoring. [Citation Graph (0, 0)][DBLP]
    POPL, 2001, pp:206-219 [Conf]
  41. Carl A. Gunter
    Relating Total and Partial Correctness Interpretations of Non-Deterministic Programs. [Citation Graph (0, 0)][DBLP]
    POPL, 1990, pp:306-319 [Conf]
  42. Carl A. Gunter, Trevor Jim
    Generalized Certificate Revocation. [Citation Graph (0, 0)][DBLP]
    POPL, 2000, pp:316-329 [Conf]
  43. Carl A. Gunter
    Abstracting Dependencies between Software Configuration Items. [Citation Graph (0, 0)][DBLP]
    SIGSOFT FSE, 1996, pp:167-178 [Conf]
  44. Charles C. Zhang, Marianne Winslett, Carl A. Gunter
    On the Safety and Efficiency of Firewall Policy Deployment. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:33-50 [Conf]
  45. Jodie P. Boyer, Kaijun Tan, Carl A. Gunter
    Privacy Sensitive Location Information Systems in Smart Buildings. [Citation Graph (0, 0)][DBLP]
    SPC, 2006, pp:149-164 [Conf]
  46. Carl A. Gunter, Elsa L. Gunter, David B. MacQueen
    An Abstract Interpretation for ML Equality Kinds. [Citation Graph (0, 0)][DBLP]
    TACS, 1991, pp:112-130 [Conf]
  47. Karthikeyan Bhargavan, Carl A. Gunter, Elsa L. Gunter, Michael Jackson, Davor Obradovic, Pamela Zave
    The Village Telephone System: A Case Study in Formal Software Engineering. [Citation Graph (0, 0)][DBLP]
    TPHOLs, 1998, pp:49-66 [Conf]
  48. Karthikeyan Bhargavan, Carl A. Gunter, Davor Obradovic
    Routing Information Protocol in HOL/SPIN. [Citation Graph (0, 0)][DBLP]
    TPHOLs, 2000, pp:53-72 [Conf]
  49. Carl A. Gunter, Teow-Hin Ngair, Devika Subramanian
    The Common Order-Theoretic Structure of Version Spaces and ATMSs. [Citation Graph (0, 0)][DBLP]
    Artif. Intell., 1997, v:95, n:2, pp:357-407 [Journal]
  50. Carl A. Gunter, John C. Mitchell, David Notkin
    Strategic Directions in Software Engineering and Programming Languages. [Citation Graph (0, 0)][DBLP]
    ACM Comput. Surv., 1996, v:28, n:4, pp:727-737 [Journal]
  51. Carl A. Gunter
    Forms of Semantic Specification. [Citation Graph (0, 0)][DBLP]
    Bulletin of the EATCS, 1991, v:45, n:, pp:98-113 [Journal]
  52. Karthikeyan Bhargavan, Carl A. Gunter
    Requirements for a Practical Network Event Recognition Language. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2002, v:70, n:4, pp:- [Journal]
  53. Pankaj Kakkar, Michael W. Hicks, Jonathan T. Moore, Carl A. Gunter
    Specifying the PLAN Network Programming Langauge. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 1999, v:26, n:, pp:- [Journal]
  54. Karthikeyan Bhargavan, Carl A. Gunter
    Network Event Recognition. [Citation Graph (0, 0)][DBLP]
    Formal Methods in System Design, 2005, v:27, n:3, pp:213-251 [Journal]
  55. Thierry Coquand, Carl A. Gunter, Glynn Winskel
    Domain Theoretic Models of Polymorphism [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1989, v:81, n:2, pp:123-167 [Journal]
  56. Carl A. Gunter
    Universal Profinite Domains [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1987, v:72, n:1, pp:1-30 [Journal]
  57. Carl A. Gunter, Elsa L. Gunter, David B. MacQueen
    Computing ML Equality Kinds Using Abstract Interpretation [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1993, v:107, n:2, pp:303-323 [Journal]
  58. Karthikeyan Bhargavan, Davor Obradovic, Carl A. Gunter
    Formal verification of standards for distance vector routing protocols. [Citation Graph (0, 0)][DBLP]
    J. ACM, 2002, v:49, n:4, pp:538-576 [Journal]
  59. Pankaj Kakkar, Carl A. Gunter, Martín Abadi
    Reasoning About Secrecy for Active Networks. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:2, pp:245-287 [Journal]
  60. Jawahar Chirimar, Carl A. Gunter, Jon G. Riecke
    Reference Counting as a Computational Interpretation of Linear Logic. [Citation Graph (0, 0)][DBLP]
    J. Funct. Program., 1996, v:6, n:2, pp:195-244 [Journal]
  61. Carl A. Gunter, Elsa L. Gunter, Michael Jackson, Pamela Zave
    A Reference Model for Requirements and Specifications. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:3, pp:- [Journal]
  62. Carl A. Gunter, Trevor Jim
    Policy-directed certificate retrieval. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2000, v:30, n:15, pp:1609-1640 [Journal]
  63. Ratul K. Guha, Carl A. Gunter, Saswati Sarkar
    Fair Coalitions for Power-Aware Routing in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2007, v:6, n:2, pp:206-220 [Journal]
  64. Carl A. Gunter
    Abstracting dependencies between software configuration items. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Softw. Eng. Methodol., 2000, v:9, n:1, pp:94-131 [Journal]
  65. Karthikeyan Bhargavan, Carl A. Gunter, Moonjoo Kim, Insup Lee, Davor Obradovic, Oleg Sokolsky, Mahesh Viswanathan
    Verisim: Formal Analysis of Network Simulations. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2002, v:28, n:2, pp:129-145 [Journal]
  66. Rakeshbabu Bobba, Omid Fatemieh, Fariba Khan, Carl A. Gunter, Himanshu Khurana
    Using Attribute-Based Access Control to Enable Attribute-Based Messaging. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:403-413 [Conf]
  67. Michael LeMay, Omid Fatemieh, Carl A. Gunter
    PolicyMorph: interactive policy transformations for a logical attribute-based access control framework. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:205-214 [Conf]

  68. Improving multi-tier security using redundant authentication. [Citation Graph (, )][DBLP]


  69. A formal framework for reflective database access control policies. [Citation Graph (, )][DBLP]


  70. Using rhythmic nonces for puzzle-based DoS resistance. [Citation Graph (, )][DBLP]


  71. Reasoning about Concurrency for Security Tunnels. [Citation Graph (, )][DBLP]


  72. Implementing Reflective Access Control in SQL. [Citation Graph (, )][DBLP]


  73. Model-Checking DoS Amplification for VoIP Session Initiation. [Citation Graph (, )][DBLP]


  74. Cumulative Attestation Kernels for Embedded Systems. [Citation Graph (, )][DBLP]


  75. Modular Preservation of Safety Properties by Cookie-Based DoS-Protection Wrappers. [Citation Graph (, )][DBLP]


  76. An Integrated Architecture for Demand Response Communications and Control. [Citation Graph (, )][DBLP]


  77. Collaborative Recommender Systems for Building Automation. [Citation Graph (, )][DBLP]


  78. Specifying and Analyzing Workflows for Automated Identification and Data Capture. [Citation Graph (, )][DBLP]


  79. Adaptive SelectiveVerification. [Citation Graph (, )][DBLP]


  80. Diagnostic powertracing for sensor node failure analysis. [Citation Graph (, )][DBLP]


  81. Strong and Weak Policy Relations. [Citation Graph (, )][DBLP]


  82. Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers. [Citation Graph (, )][DBLP]


  83. Formal prototyping in early stages of protocol design. [Citation Graph (, )][DBLP]


  84. Safety in discretionary access control for logic-based publish-subscribe systems. [Citation Graph (, )][DBLP]


  85. How to Bootstrap Security for Ad-Hoc Network: Revisited. [Citation Graph (, )][DBLP]


  86. Sh@re: Negotiated Audit in Social Networks. [Citation Graph (, )][DBLP]


  87. Probabilistic Modeling and Analysis of DoS Protection for the ASV Protocol. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.611secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002