Search results

  • 2014

    Inside Job: Understanding and Mitigating the Threat of External Device Mis-Bonding on Android

    Naveed, M., Zhou, X., Demetriou, S., Wang, X. F. & Gunter, C. A., 2014.

    Research output: Contribution to conferencePaperpeer-review

  • Joint inference for end-to-end coreference resolution for clinical notes

    Jindal, P., Roth, D. & Gunter, C. A., Sep 20 2014, ACM BCB 2014 - 5th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics. Association for Computing Machinery, p. 192-201 10 p. (ACM BCB 2014 - 5th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Privacy-preserving audit for broker-based health information exchange

    Oh, S. E., Chun, J. Y., Jia, L., Garg, D., Gunter, C. A. & Datta, A., 2014, p. 313-320. 8 p.

    Research output: Contribution to conferencePaperpeer-review

    Open Access
  • Privacy risk in anonymized heterogeneous information networks

    Zhang, A., Gunter, C. A., Xie, X., Han, J., Chang, K. C. C. & Wang, X., 2014, Advances in Database Technology - EDBT 2014: 17th International Conference on Extending Database Technology, Proceedings. Leroy, V., Christophides, V., Christophides, V., Idreos, S., Kementsietsidis, A., Garofalakis, M. & Amer-Yahia, S. (eds.). OpenProceedings.org, University of Konstanz, University Library, p. 595-606 12 p. (Advances in Database Technology - EDBT 2014: 17th International Conference on Extending Database Technology, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Security Concerns in Android mHealth Apps

    He, D., Naveed, M., Gunter, C. A. & Nahrstedt, K., 2014, In: AMIA ... Annual Symposium proceedings / AMIA Symposium. AMIA Symposium. 2014, p. 645-654 10 p.

    Research output: Contribution to journalArticlepeer-review

  • 2013

    Building a smarter health and wellness future: Privacy and security challenges

    Gunter, C. A., 2013, ICTs and the Health Sector: Towards Smarter Health and Wellness Models. Organisation for Economic Cooperation and Development (OECD), Vol. 9789264202863. p. 141-158 18 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Evolving role definitions through permission invocation patterns

    Zhang, W., Chen, Y., Gunter, C. A., Liebovitz, D. & Malin, B., 2013, SACMAT 2013 - Proceedings of the 18th ACM Symposium on Access Control Models and Technologies. p. 37-47 11 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Identity, location, disease and more: Inferring your secrets from android public resources

    Zhou, X., Demetriou, S., He, D., Naveed, M., Pan, X., Wang, X. F., Gunter, C. A. & Nahrstedt, K., 2013, CCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. p. 1017-1028 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Mining deviations from patient care pathways via electronic medical record system audits

    Zhang, H., Mehotra, S., Liebovitz, D., Gunter, C. A. & Malin, B., Dec 2013, In: ACM Transactions on Management Information Systems. 4, 4, 17.

    Research output: Contribution to journalArticlepeer-review

  • Modeling and detecting anomalous topic access

    Gupta, S., Hanson, C., Gunter, C. A., Frank, M., Liebovitz, D. & Malin, B., 2013, IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics. p. 100-105 6 p. 6578795. (IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Requirements and design for an extensible toolkit for analyzing EMR audit logs

    Duffy, E., Nyemba, S., Gunter, C. A., Liebovitz, D. & Malin, B., 2013.

    Research output: Contribution to conferencePaperpeer-review

  • Securing information technology in healthcare

    Anthony, D., Campbell, A. T., Candon, T., Gettinger, A., Kotz, D., Marsch, L. A., Molina-Markham, A., Page, K., Smith, S. W., Gunter, C. A. & Johnson, M. E., Nov 2013, In: IEEE Security and Privacy. 11, 6, p. 25-33 9 p., 6576746.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • 2012

    Adaptive selective verification: An efficient adaptive countermeasure to thwart DoS attacks

    Khanna, S., Venkatesh, S. S., Fatemieh, O., Khan, F. & Gunter, C. A., Jun 2012, In: IEEE/ACM Transactions on Networking. 20, 3, p. 715-728 14 p., 6086738.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • Cumulative attestation kernels for embedded systems

    Lemay, M. & Gunter, C. A., 2012, In: IEEE Transactions on Smart Grid. 3, 2, p. 744-760 17 p., 6204240.

    Research output: Contribution to journalArticlepeer-review

  • Tragedy of anticommons in digital right management of medical records

    Zhu, Q., Gunter, C. & Basar, T., 2012.

    Research output: Contribution to conferencePaperpeer-review

  • 2011

    Application-aware secure multicast for power grid communications

    Zhang, J. & Gunter, C. A., Apr 2011, In: International Journal of Security and Networks. 6, 1, p. 40-52 13 p.

    Research output: Contribution to journalArticlepeer-review

  • Distributed non-intrusive load monitoring

    Bergman, D. C., Jin, D., Juen, J. P., Tanaka, N., Gunter, C. A. & Wright, A. K., 2011, 2011 IEEE PES Innovative Smart Grid Technologies, ISGT 2011. 5759180. (IEEE PES Innovative Smart Grid Technologies Conference Europe, ISGT Europe).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Enforcing executing-implies-verified with the integrity-aware processor

    LeMay, M. & Gunter, C. A., 2011, Trust and Trustworthy Computing - 4th International Conference, TRUST 2011, Proceedings. Springer, p. 202-216 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6740 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Experience-based access management: A life-cycle framework for identity and access management systems

    Gunter, C., Liebovitz, D. & Malin, B., Sep 2011, In: IEEE Security and Privacy. 9, 5, p. 48-55 8 p., 5887313.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • Making DTNs robust against spoofing attacks with localized countermeasures

    Uddin, M. Y. S., Khurshid, A., Jung, H. D., Gunter, C., Caesar, M. C. & Abdelzaher, T., 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2011. p. 332-340 9 p. 5984915. (2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • MyABDAC: Compiling XACML policies for attribute-based database access control

    Jahid, S., Gunter, C., Hoque, I. & Okhravi, H., 2011, CODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy. p. 97-108 12 p. (CODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Nonintrusive load-shed verification

    Bergman, D., Jin, D., Juen, J., Tanaka, N., Gunter, C. & Wright, A., Jan 2011, In: IEEE Pervasive Computing. 10, 1, p. 49-57 9 p., 5582069.

    Research output: Contribution to journalArticlepeer-review

  • Reconstructing Hash Reversal based Proof of Work Schemes

    Green, J., Juen, J., Fatemieh, O., Shankesi, R., Jin, D. & Gunter, C. A., 2011.

    Research output: Contribution to conferencePaperpeer-review

  • Reliable telemetry in white spaces using remote attestation

    Fatemieh, O., LeMay, M. & Gunter, C. A., 2011, Proceedings - 27th Annual Computer Security Applications Conference, ACSAC 2011. p. 323-332 10 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Role prediction using Electronic Medical Record system audits.

    Zhang, W., Gunter, C. A., Liebovitz, D., Tian, J. & Malin, B., 2011, In: AMIA ... Annual Symposium proceedings / AMIA Symposium. AMIA Symposium. 2011, p. 858-867 10 p.

    Research output: Contribution to journalArticlepeer-review

  • Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks

    Fatemieh, O., Farhadi, A., Chandra, R. & Gunter, C. A., 2011.

    Research output: Contribution to conferencePaperpeer-review

  • 2010

    Attribute-Based Messaging: Access control and confidentiality

    Bobba, R., Fatemieh, O., Khan, F., Khan, A., Gunter, C. A., Khurana, H. & Prabhakaran, M., Dec 2010, In: ACM Transactions on Information and System Security. 13, 4, 31.

    Research output: Contribution to journalArticlepeer-review

  • Diagnostic powertracing for sensor node failure analysis

    Khan, M. M. H., Le, H. K., LeMay, M., Moinzadeh, P., Wang, L., Yang, Y., Noh, D. K., Abdelzaher, T., Gunter, C. A., Han, J. & Jin, X., 2010, Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks, IPSN '10. p. 117-128 12 p. (Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks, IPSN '10).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Low cost and secure smart meter communications using the TV white spaces

    Fatemieh, O., Chandra, R. & Gunter, C. A., 2010, Proceedings - ISRCS 2010 - 3rd International Symposium on Resilient Control Systems. p. 37-42 6 p. 5602162. (Proceedings - ISRCS 2010 - 3rd International Symposium on Resilient Control Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secure collaborative sensing for crowdsourcing spectrum data in white space networks

    Fatemieh, O., Chandra, R. & Gunter, C. A., 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum, DySPAN 2010. 5457893. (2010 IEEE Symposium on New Frontiers in Dynamic Spectrum, DySPAN 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Tiered incentives for integrity based queuing

    Khan, F. & Gunter, C. A., 2010.

    Research output: Contribution to conferencePaperpeer-review

    Open Access
  • 2009

    A medical database case study for reflective database access control

    Olson, L. E., Gunter, C. A. & Olson, S. P., 2009, Proceedings of the 1st ACM Workshop on Security and Privacy in Medical and Home-Care Systems, SPIMACS '09, Co-located with the 16th ACM Computer and Communications Security Conference, CCS'09. p. 41-51 11 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Collaborative recommender systems for building automation

    LeMay, M., Haas, J. J. & Gunter, C., 2009, Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS. 4755525. (Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Completeness of discovery protocols

    Goodloe, A. E. & Gunter, C. A., 2009, Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig '09, Co-located with the 16th ACM Computer and Communications Security Conference, CCS'09. p. 29-36 8 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Cumulative attestation kernels for embedded systems

    Lemay, M. & Gunter, C. A., 2009, Computer Security - ESORICS 2009 - 14th European Symposium on Research in Computer Security, Proceedings. p. 655-670 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5789 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • How to bootstrap security for ad-hoc network: Revisited

    Shin, W., Gunter, C. A., Kiyomoto, S., Fukushima, K. & Tanaka, T., 2009, Emerging Challenges for Security, Privacy and Trust - 24th IFIP TC 11 International Information Security Conference, SEC 2009, Proceedings. Gritzalis, D. & Lopez, J. (eds.). Springer, p. 119-131 13 p. (IFIP Advances in Information and Communication Technology; vol. 297).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Implementing reflective access control in SQL

    Olson, L. E., Gunter, C. A., Cook, W. R. & Winslett, M., 2009, Data and Applications Security XXIII - 23rd Annual IFIP WG 11.3 Working Conference, Proceedings. p. 17-32 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5645 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Model-checking DoS amplification for VoIP session initiation

    Shankesi, R., Alturki, M., Sasse, R., Gunter, C. A. & Meseguer, J., 2009, Computer Security - ESORICS 2009 - 14th European Symposium on Research in Computer Security, Proceedings. p. 390-405 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5789 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Network infrastructure configuration

    Anderson, P., Gunter, C., Kalmanek, C., Narain, S., Smith, J., Talpade, R. & Xie, G., Apr 2009, In: IEEE Journal on Selected Areas in Communications. 27, 3, p. 249-252 4 p., 4808469.

    Research output: Contribution to journalEditorialpeer-review

  • Probabilistic Modeling and Analysis of DoS Protection for the ASV Protocol

    AlTurki, M., Meseguer, J. & Gunter, C. A., Mar 28 2009, In: Electronic Notes in Theoretical Computer Science. 234, C, p. 3-18 16 p.

    Research output: Contribution to journalArticlepeer-review

  • Safety in discretionary access control for logic-based publish-subscribe systems

    Minami, K., Borisov, N. & Gunter, C. A., 2009, SACMAT'09 - Proceedings of the 14th ACM Symposium on Access Control Models and Technologies. p. 3-12 10 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Security policy implementation strategies for common carrier monitoring service providers

    Gunter, C. A., 2009, Proceedings - 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2009. p. 114-117 4 p. 5197394. (Proceedings - 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Sh@re: Negotiated audit in social networks

    Gutierrez, A., Godiyal, A., Stockton, M., LeMay, M., Gunter, C. A. & Campbell, R. H., 2009, Proceedings 2009 IEEE International Conference on Systems, Man and Cybernetics, SMC 2009. p. 74-79 6 p. 5346318. (Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Specifying and analyzing workflows for automated identification and data capture

    Gunter, E. L., Yasmeen, A., Gunter, C. A. & Nguyen, A., 2009, Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS. 4755592. (Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Strong and weak policy relations

    May, M. J., Gunter, C. A., Lee, I. & Zdancewic, S., 2009, Proceedings - 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2009. p. 33-36 4 p. 5197378. (Proceedings - 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2008

    Adaptive selective verification

    Khanna, S., Venkatesh, S. S., Fatemieh, O., Khan, F. & Gunter, C. A., 2008, INFOCOM 2008: 27th IEEE Communications Society Conference on Computer Communications. p. 1202-1210 9 p. 4509696. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • A formal framework for reflective database access control policies

    Olson, L. E., Gunter, C. A. & Madhusudan, P., 2008, Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS'08. p. 289-298 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • An integrated architecture for demand response communications and control

    LeMay, M., Nelli, R., Gross, G. & Gunter, C. A., 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences 2008, HICSS. 4438878. (Proceedings of the Annual Hawaii International Conference on System Sciences).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Modular preservation of safety properties by cookie-based DoS-protection wrappers

    Chadha, R., Gunter, C. A., Meseguer, J., Shankesi, R. & Viswanathan, M., 2008, Formal Methods for Open Object-Based Distributed Systems - 10th IFIP WG 6.1 International Conference, FMOODS 2008, Proceedings. p. 39-58 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5051 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Using rhythmic nonces for puzzle-based DoS resistance

    Chan, E. M., Gunter, C. A., Jahid, S., Peryshkin, E. & Rebolledo, D., 2008, Proceedings of the 2nd ACM Workshop on Computer Security Architectures, CSAW'08, Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08. p. 51-57 7 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access