Search results

  • 2007

    Emergency alerts as RSS feeds with interdomain authorization

    Gioachin, F., Shankesi, R., May, M. J., Gunter, C. A. & Shin, W., 2007, Second International Conference on Internet Monitoring and Protection, ICIMP 2007. IEEE Computer Society, p. 13-20 8 p. 4271759. (Second International Conference on Internet Monitoring and Protection, ICIMP 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Fair coalitions for power-aware routing in wireless networks

    Guha, R. K., Gunter, C. A. & Sarkar, S., Feb 2007, In: IEEE Transactions on Mobile Computing. 6, 2, p. 206-220 15 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • Improving multi-tier security using redundant authentication

    Boyer, J. P., Hasan, R., Olson, L. E., Borisov, N., Gunter, C. A. & Raila, D., 2007, CSAW'07 - Proceedings of the 2007 ACM Computer Security Architecture Workshop. Association for Computing Machinery, p. 54-62 9 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • On the safety and efficiency of firewall policy deployment

    Zhang, C. C., Winslett, M. & Gunter, C. A., 2007, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07. p. 33-47 15 p. 4223212. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • PAS: A wireless-enabled, sensor-integrated personal assistance system for independent and assisted living

    Hou, J. C., Wang, Q., Alshebli, B. K., Ball, L., Birge, S., Caccamo, M., Cheah, C. F., Gilbert, E., Gunter, C. A., Gunter, E., Lee, C. G., Karahalios, K., Nam, M. Y., Nitya, N., Rohit, C., Sha, L., Shin, W., Yu, S., Yu, Y. & Zeng, Z., 2007, Proceedings - 2007 Joint Workshop on High Confidence Medical Devices, Software, and Systems and Medical Device Plug-and-Play Interoperability, HCMDSS/MDPnP 2007. p. 64-75 12 p. 4438165. (Proceedings - 2007 Joint Workshop on High Confidence Medical Devices, Software, and Systems and Medical Device Plug-and-Play Interoperability, HCMDSS/MDPnP 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • PolicyMorph: Interactive policy transformations for a logical attribute-based access control framework

    Lemay, M., Fatemieh, O. & Gunter, C., 2007, SACMAT'07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies. p. 205-214 10 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Reasoning about concurrency for security tunnels

    Goodloe, A. E. & Gunter, C. A., 2007, Proceedings - 20th IEEE Computer Security Foundations Symposium, CSFS20. p. 64-78 15 p. 4271641. (Proceedings - IEEE Computer Security Foundations Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Supporting Emergency-Response by Retasking Network Infrastructures

    LeMay, M. & Gunter, C. A., 2007.

    Research output: Contribution to conferencePaperpeer-review

  • Unified architecture for large-scale attested metering

    LeMay, M., Gross, G., Gunter, C. A. & Garg, S., 2007, Proceedings of the 40th Annual Hawaii International Conference on System Sciences 2007, HICSS'07. 4076601. (Proceedings of the Annual Hawaii International Conference on System Sciences).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2006

    AMPol: Adaptive messaging policy

    Afandi, R., Zhang, J., Hafiz, M. & Gunter, C. A., 2006, Proceedings of ECOWS 2006: Fourth European Conference on Web Services. p. 53-63 11 p. 4031150. (Proceedings of ECOWS 2006: Fourth European Conference on Web Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • AMPol-Q: Adaptive middleware policy to support QoS

    Afandi, R., Zhang, J. & Gunter, C. A., 2006, Service-Oriented Computing - ICSOC 2006 - 4th International Conference, Proceedings. p. 165-178 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4294 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Defeasible security policy composition for web services

    Lee, A. J., Boyer, J. P., Olson, L. E. & Gunter, C. A., 2006, Proceedings of the Fourth ACM Workshop on Formal Methods in Security Engineering, FMSE'06. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06. p. 45-54 10 p. (Proceedings of the Fourth ACM Workshop on Formal Methods in Security Engineering, FMSE'06. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • I-living: An open system architecture for assisted living

    Qixin, W., Wook, S., Xue, L., Zheng, Z., Oh, C., Alshebli, B. K., Caccamo, M., Gunter, C. A., Gunter, E., Hou, J., Karahalios, K. & Lui, S., 2006, 2006 IEEE International Conference on Systems, Man and Cybernetics. Institute of Electrical and Electronics Engineers Inc., p. 4268-4275 8 p. 4274570. (Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics; vol. 5).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Privacy APIs: Access control techniques to analyze and verify legal privacy policies

    May, M. J., Gunter, C. A. & Lee, I., 2006, Proceedings - 19th IEEE Computer Security Foundations Workshop, CSFW 2006. IEEE Computer Society, p. 13-25 13 p. 1648710. (Proceedings of the Computer Security Foundations Workshop; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Privacy sensitive location information systems in smart buildings

    Boyer, J. P., Tan, K. & Gunter, C. A., 2006, Security in Pervasive Computing - Third International Conference, SPC 2006, Proceedings. Springer, p. 149-164 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3934 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Reducing risk by managing software related failures in networked control systems

    Baliga, G., Graham, S., Gunter, C. A. & Kumar, P. R., 2006, Proceedings of the 45th IEEE Conference on Decision and Control 2006, CDC. Institute of Electrical and Electronics Engineers Inc., p. 2866-2871 6 p. 4177489. (Proceedings of the IEEE Conference on Decision and Control).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Securing the drop-box architecture for assisted living

    May, M. J., Shin, W., Gunter, C. A. & Lee, I., 2006, Proceedings of the Fourth ACM Workshop on Formal Methods in Security Engineering, FMSE'06. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06. p. 1-12 12 p. (Proceedings of the Fourth ACM Workshop on Formal Methods in Security Engineering, FMSE'06. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Using attribute-based access control to enable attribute-based messaging

    Bobba, R., Fatemieh, O., Khan, F., Gunter, C. A. & Khurana, H., 2006, Proceedings - Annual Computer Security Applications Conference, ACSAC. p. 403-413 11 p. 4041185. (Proceedings - Annual Computer Security Applications Conference, ACSAC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2005

    A formal privacy system and its application to location based services

    Gunter, C. A., May, M. J. & Stubblebine, S. G., 2005, In: Lecture Notes in Computer Science. 3424, p. 256-282 27 p.

    Research output: Contribution to journalConference articlepeer-review

  • Formal prototyping in early stages of protocol design

    Goodloe, A., Gunter, C. & Stehr, M. O., 2005, Proceedings of the 2005 Workshop on Issues in the Theory of Security, WITS '05. p. 67-80 14 p. (Proceedings of the 2005 Workshop on Issues in the Theory of Security, WITS '05).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • L3A: A protocol for layer three accounting

    Goodloe, A., Jacobs, M., Shah, G. & Gunter, C., 2005, 2005 First Workshop on Secure Network Protocols, NPSec, held in conjunction with ICNP 2005: 13th IEEE International Conference on Network Protocols. p. 1-6 6 p. 1532045. (2005 First Workshop on Secure Network Protocols, NPSec, held in conjunction with ICNP 2005: 13th IEEE International Conference on Network Protocols; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Mitigating DoS attack through selective bin verification

    Sherr, M., Greenwald, M., Gunter, C. A., Khanna, S. & Venkatesh, S. S., 2005, 2005 First Workshop on Secure Network Protocols, NPSec, held in conjunction with ICNP 2005: 13th IEEE International Conference on Network Protocols. p. 7-12 6 p. 1532046. (2005 First Workshop on Secure Network Protocols, NPSec, held in conjunction with ICNP 2005: 13th IEEE International Conference on Network Protocols; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Network event recognition

    Bhargavan, K. & Gunter, C. A., Nov 2005, In: Formal Methods in System Design. 27, 3 SPEC. ISS., p. 213-251 39 p.

    Research output: Contribution to journalArticlepeer-review

  • WSEmail: Secure internet messaging based on Web services

    Lux, K. D., May, M. J., Bhattad, N. L. & Gunter, C. A., 2005, Proceedings - 2005 IEEE International Conference on Web Services, ICWS 2005. p. 75-84 10 p. 1530785. (Proceedings - 2005 IEEE International Conference on Web Services, ICWS 2005; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2004

    A model-based approach to integrating security policies for embedded devices

    McDougall, M., Alur, R. & Gunter, C. A., 2004, EMSOFT 2004 - Fourth ACM International Conference on Embedded Software. Association for Computing Machinery, p. 211-219 9 p. (EMSOFT 2004 - Fourth ACM International Conference on Embedded Software).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • DoS Protection for Reliably Authenticated Broadcast

    Gunter, C. A., Khanna, S., Tan, K. & Venkatesh, S., 2004, Proceedings of the Symposium on Network and Distributed System Security, NDSS 2004. The Internet Society, (Proceedings of the Symposium on Network and Distributed System Security, NDSS 2004).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Fair coalitions for power-aware routing in wireless networks

    Guha, R. K., Gunter, C. A. & Sarkar, S., 2004, In: Proceedings of the IEEE Conference on Decision and Control. 3, p. 3271-3276 6 p., ThB03.1.

    Research output: Contribution to journalConference articlepeer-review

    Open Access
  • The consistency of task-based authorization constraints in workflow systems

    Tan, K., Crampton, J. & Gunter, C. A., 2004, In: Proceedings of the Computer Security Foundations Workshop. 17, p. 155-169 15 p.

    Research output: Contribution to journalConference articlepeer-review

  • 2003

    Open APIs for embedded security

    Gunter, C. A., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Cardelli, L. (ed.). Springer, p. 225-247 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2743).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Reasoning about secrecy for active networks

    Kakkar, P., Gunter, C. A. & Abadi, M., 2003, In: Journal of Computer Security. 11, 2, p. 245-287 43 p.

    Research output: Contribution to journalArticlepeer-review

  • 2002

    Formal verification of standards for distance vector routing protocols

    Bhargavan, K., Obradovic, D. & Gunter, C. A., Jul 2002, In: Journal of the ACM. 49, 4, p. 538-576 39 p.

    Research output: Contribution to journalArticlepeer-review

  • Micro mobile programs

    Gunter, C. A., 2002, Foundations of Information Technology in the Era of Network and Mobile Computing - IFIP 17th World Computer Congress - TC1 Stream / 2nd IFIP Int. Conference on Theoretical Computer Science (TCS 2002). Springer, p. 356-369 14 p. (IFIP Advances in Information and Communication Technology; vol. 96).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Predictable programs in barcodes

    Goodloe, A., McDougall, M., Gunter, C. A. & Alur, R., 2002, Proceedings of the 2002 International Conference on Compilers, Architecture, and Synthesis for Embedded Systems, CASES '02. p. 298-303 6 p. (Proceedings of the 2002 International Conference on Compilers, Architecture, and Synthesis for Embedded Systems, CASES '02).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Requirements for a practical network event recognition language

    Bhargavan, K. & Gunter, C. A., Dec 2002, In: Electronic Notes in Theoretical Computer Science. 70, 4, p. 1-20 20 p.

    Research output: Contribution to journalConference articlepeer-review

  • Verisim: Formal analysis of network simulations

    Bhargavan, K., Gunter, C. A., Kim, M., Lee, I., Obradovic, D., Sokolsky, O. & Viswanathan, M., Feb 2002, In: IEEE Transactions on Software Engineering. 28, 2, p. 129-145 17 p.

    Research output: Contribution to journalArticlepeer-review

  • 2001

    Models and languages for digital rights

    Gunter, C. A., Weeks, S. T. & Wright, A. K., 2001, In: Proceedings of the Hawaii International Conference on System Sciences. p. 295 1 p.

    Research output: Contribution to journalArticlepeer-review

  • What packets may come: Automata for network monitoring

    Bhargavan, K., Chandra, S., McCann, P. J. & Gunter, C. A., 2001, In: SIGPLAN Notices (ACM Special Interest Group on Programming Languages). 36, 3, p. 206-219 14 p.

    Research output: Contribution to journalArticlepeer-review

  • What packets may come: Automata for network monitoring

    Bhargavan, K., Chandra, S., McCann, P. J. & Gunter, C. A., 2001, In: Conference Record of the Annual ACM Symposium on Principles of Programming Languages. p. 206-219 14 p.

    Research output: Contribution to journalConference articlepeer-review

  • 2000

    Abstracting dependencies between software configuration items

    Gunter, C. A., Jan 2000, In: ACM Transactions on Software Engineering and Methodology. 9, 1, p. 94-131 38 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • Certificate distribution with local autonomy

    Kakkar, P., McDougall, M., Gunter, C. A. & Jim, T., 2000, Active Networks - 2nd International Working Conference, IWAN 2000, Proceedings. Yasuda, H. (ed.). Springer, p. 277-295 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1942).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Fault origin adjudication

    Bhargavan, K., Gunter, C. A. & Obradovic, D., 2000, p. 61-71. 11 p.

    Research output: Contribution to conferencePaperpeer-review

    Open Access
  • Generalized certificate revocation

    Gunter, C. A. & Jim, T., 2000, In: Unknown Journal. p. 316-329 14 p.

    Research output: Contribution to journalConference articlepeer-review

  • Policy-directed certificate retrieval

    Gunter, C. A. & Jim, T., Dec 2000, In: Software - Practice and Experience. 30, 15, p. 1609-1640 32 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • Reasoning about secrecy for active networks

    Kakkar, P., Gunter, C. A. & Abadi, M., 2000, In: Proceedings of the Computer Security Foundations Workshop. p. 118-129 12 p.

    Research output: Contribution to journalArticlepeer-review

  • Reference model for requirements and specifications

    Gunter, C. A., Gunter, E. L., Jackson, M. & Zave, P., 2000, p. 189. 1 p.

    Research output: Contribution to conferencePaperpeer-review

  • Reference model for requirements and specifications

    Gunter, C. A., Gunter, E. L., Jackson, M. & Zave, P., May 2000, In: IEEE Software. 17, 3, p. 37-43 7 p.

    Research output: Contribution to journalArticlepeer-review

  • Routing information protocol in hol/spin

    Bhargavan, K., Gunter, C. A. & Obradovic, D., 2000, Theorem Proving in Higher Order Logics - 13th International Conference, TPHOLs 2000, Proceedings. Aagaard, M. & Harrison, J. (eds.). Springer, p. 53-72 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1869).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Verisim: Formal analysis of network simulations

    Bhargavan, K., Gunter, C. A., Kim, M., Lee, I., Obradovic, D., Sokolsky, O. & Viswanathan, M., 2000, Proceedings of the ACM SIGSOFT 2000 International Symposium on Software Testing and Analysis. Harrold, M. J. & Harrold, M. J. (eds.). p. 2-13 12 p. (Proceedings of the ACM SIGSOFT 2000 International Symposium on Software Testing and Analysis).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 1999

    Network programming using PLAN

    Hicks, M., Kakkar, P., Moore, J. T., Gunter, C. A. & Nettles, S., 1999, Internet Programming Languages - ICCL 1998 Workshop, Proceedings. Bal, H. E., Belkhouche, B. & Cardelli, L. (eds.). Springer, p. 127-143 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1686).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • PLAN: A packet language for active networks

    Hicks, M., Kakkar, P., Moore, J. T., Gunter, C. A. & Nettles, S., Jan 1999, In: SIGPLAN Notices (ACM Special Interest Group on Programming Languages). 34, 1, p. 86-93 8 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access