If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Article
2020

WSEmail: An architecture and system for secure Internet messaging based on web services

May, M. J., Lux, K. D. & Gunter, C. A., Jan 1 2020, (Accepted/In press) In : Service Oriented Computing and Applications.

Research output: Contribution to journalArticle

2018

De facto diagnosis specialties: Recognition and discovery

Zhang, A., Lu, X., Gunter, C. A., Yao, S., Tao, F., Zhu, R., Gui, H., Fabbri, D., Liebovitz, D. & Malin, B., 2018, In : Learning Health Systems. 2, 3, e10057.

Research output: Contribution to journalArticle

Open Access

Evaluating Detectors on Optimal Attack Vectors That Enable Electricity Theft and der Fraud

Krishna, V. B., Gunter, C. A. & Sanders, W. H., Aug 2018, In : IEEE Journal on Selected Topics in Signal Processing. 12, 4, p. 790-805 16 p., 8355252.

Research output: Contribution to journalArticle

2016

Privacy and Security in Mobile Health: A Research Agenda

Kotz, D., Gunter, C. A., Kumar, S. & Weiner, J. P., Jun 2016, Computer, 49, 6, p. 22-30 9 p.

Research output: Contribution to specialist publicationArticle

2015

Building bridges across electronic health record systems through inferred phenotypic topics

Chen, Y., Ghosh, J., Bejan, C. A., Gunter, C. A., Gupta, S., Kho, A., Liebovitz, D., Sun, J., Denny, J. & Malin, B., Jun 1 2015, In : Journal of Biomedical Informatics. 55, p. 82-93 12 p.

Research output: Contribution to journalArticle

Inferring Clinical Workflow Efficiency via Electronic Medical Record Utilization

Chen, Y., Xie, W., Gunter, C. A., Liebovitz, D., Mehrotra, S., Zhang, H. & Malin, B., Jan 1 2015, In : AMIA ... Annual Symposium proceedings. AMIA Symposium. 2015, p. 416-425 10 p.

Research output: Contribution to journalArticle

Privacy in the genomic era

Naveed, M., Ayday, E., Clayton, E. W., Fellay, J., Gunter, C. A., Hubaux, J. P., Malin, B. A. & Wang, X., Aug 1 2015, In : ACM Computing Surveys. 48, 1, 6.

Research output: Contribution to journalArticle

Toward a science of learning systems: A research agenda for the high-functioning Learning Health System

Friedman, C. P., Rubin, J., Brown, J., Buntin, M., Corn, M., Etheredge, L., Gunter, C., Musen, M., Platt, R., Stead, W., Sullivan, K. & Van Houweling, D., 2015, In : Journal of the American Medical Informatics Association. 22, 1, p. 43-50 8 p.

Research output: Contribution to journalArticle

2014

Security Concerns in Android mHealth Apps

He, D., Naveed, M., Gunter, C. A. & Nahrstedt, K., Jan 1 2014, In : AMIA ... Annual Symposium proceedings / AMIA Symposium. AMIA Symposium. 2014, p. 645-654 10 p.

Research output: Contribution to journalArticle

2013

Mining deviations from patient care pathways via electronic medical record system audits

Zhang, H., Mehotra, S., Liebovitz, D., Gunter, C. A. & Malin, B., Dec 1 2013, In : ACM Transactions on Management Information Systems. 4, 4, 17.

Research output: Contribution to journalArticle

Securing information technology in healthcare

Anthony, D., Campbell, A. T., Candon, T., Gettinger, A., Kotz, D., Marsch, L. A., Molina-Markham, A., Page, K., Smith, S. W., Gunter, C. A. & Johnson, M. E., Nov 1 2013, In : IEEE Security and Privacy. 11, 6, p. 25-33 9 p., 6576746.

Research output: Contribution to journalArticle

2012

Adaptive selective verification: An efficient adaptive countermeasure to thwart DoS attacks

Khanna, S., Venkatesh, S. S., Fatemieh, O., Khan, F. & Gunter, C. A., Jun 1 2012, In : IEEE/ACM Transactions on Networking. 20, 3, p. 715-728 14 p., 6086738.

Research output: Contribution to journalArticle

Cumulative attestation kernels for embedded systems

Lemay, M. & Gunter, C. A., 2012, In : IEEE Transactions on Smart Grid. 3, 2, p. 744-760 17 p., 6204240.

Research output: Contribution to journalArticle

2011

Application-aware secure multicast for power grid communications

Zhang, J. & Gunter, C. A., Apr 2011, In : International Journal of Security and Networks. 6, 1, p. 40-52 13 p.

Research output: Contribution to journalArticle

Experience-based access management: A life-cycle framework for identity and access management systems

Gunter, C., Liebovitz, D. & Malin, B., Sep 1 2011, In : IEEE Security and Privacy. 9, 5, p. 48-55 8 p., 5887313.

Research output: Contribution to journalArticle

Nonintrusive load-shed verification

Bergman, D., Jin, D., Juen, J., Tanaka, N., Gunter, C. & Wright, A., Jan 1 2011, In : IEEE Pervasive Computing. 10, 1, p. 49-57 9 p., 5582069.

Research output: Contribution to journalArticle

Role prediction using Electronic Medical Record system audits.

Zhang, W., Gunter, C. A., Liebovitz, D., Tian, J. & Malin, B., 2011, In : AMIA ... Annual Symposium proceedings / AMIA Symposium. AMIA Symposium. 2011, p. 858-867 10 p.

Research output: Contribution to journalArticle

2010

Attribute-Based Messaging: Access control and confidentiality

Bobba, R., Fatemieh, O., Khan, F., Khan, A., Gunter, C. A., Khurana, H. & Prabhakaran, M., Dec 1 2010, In : ACM Transactions on Information and System Security. 13, 4, 31.

Research output: Contribution to journalArticle

2009

Probabilistic Modeling and Analysis of DoS Protection for the ASV Protocol

AlTurki, M., Meseguer, J. & Gunter, C. A., Mar 28 2009, In : Electronic Notes in Theoretical Computer Science. 234, C, p. 3-18 16 p.

Research output: Contribution to journalArticle

2007

Fair coalitions for power-aware routing in wireless networks

Guha, R. K., Gunter, C. A. & Sarkar, S., Feb 2007, In : IEEE Transactions on Mobile Computing. 6, 2, p. 206-220 15 p.

Research output: Contribution to journalArticle

2005

Network event recognition

Bhargavan, K. & Gunter, C. A., Nov 1 2005, In : Formal Methods in System Design. 27, 3 SPEC. ISS., p. 213-251 39 p.

Research output: Contribution to journalArticle

2003

Reasoning about secrecy for active networks

Kakkar, P., Gunter, C. A. & Abadi, M., Jan 1 2003, In : Journal of Computer Security. 11, 2, p. 245-287 43 p.

Research output: Contribution to journalArticle

2002

Formal verification of standards for distance vector routing protocols

Bhargavan, K., Obradovic, D. & Gunter, C. A., Jul 1 2002, In : Journal of the ACM. 49, 4, p. 538-576 39 p.

Research output: Contribution to journalArticle

Verisim: Formal analysis of network simulations

Bhargavan, K., Gunter, C. A., Kim, M., Lee, I., Obradovic, D., Sokolsky, O. & Viswanathan, M., Feb 2002, In : IEEE Transactions on Software Engineering. 28, 2, p. 129-145 17 p.

Research output: Contribution to journalArticle

2001

Models and languages for digital rights

Gunter, C., Weeks, S. T. & Wright, A. K., Jan 1 2001, In : Proceedings of the Hawaii International Conference on System Sciences. 1 p.

Research output: Contribution to journalArticle

What packets may come: Automata for network monitoring

Bhargavan, K., Chandra, S., McCann, P. J. & Gunter, C. A., 2001, In : SIGPLAN Notices (ACM Special Interest Group on Programming Languages). 36, 3, p. 206-219 14 p.

Research output: Contribution to journalArticle

2000

Abstracting dependencies between software configuration items

Gunter, C. A., Jan 2000, In : ACM Transactions on Software Engineering and Methodology. 9, 1, p. 94-131 38 p.

Research output: Contribution to journalArticle

Policy-directed certificate retrieval

Gunter, C. A. & Jim, T., Dec 2000, In : Software - Practice and Experience. 30, 15, p. 1609-1640 32 p.

Research output: Contribution to journalArticle

Reasoning about secrecy for active networks

Kakkar, P., Gunter, C. A. & Abadi, M., Jan 1 2000, In : Proceedings of the Computer Security Foundations Workshop. p. 118-129 12 p.

Research output: Contribution to journalArticle

Reference model for requirements and specifications

Gunter, C. A., Gunter, E. L., Jackson, M. & Zave, P., May 1 2000, In : IEEE Software. 17, 3, p. 37-43 7 p.

Research output: Contribution to journalArticle

1999

PLAN: A packet language for active networks

Hicks, M., Kakkar, P., Moore, J. T., Gunter, C. A. & Nettles, S., Jan 1999, In : SIGPLAN Notices (ACM Special Interest Group on Programming Languages). 34, 1, p. 86-93 8 p.

Research output: Contribution to journalArticle

1998

The switchware active network architecture

Alexander, D. S., Arbaugh, W. A., Hicks, M. W., Kakkar, P., Keromytis, A. D., Moore, J. T., Gunter, C. A., Nettles, S. M. & Smith, J. M., May 1 1998, In : IEEE Network. 12, 3, p. 29-36 8 p.

Research output: Contribution to journalArticle

1997

The common order-theoretic structure of version spaces and ATMSs

Gunter, C. A., Ngair, T. H. & Subramanian, D., Sep 1997, In : Artificial Intelligence. 95, 2, p. 357-407 51 p.

Research output: Contribution to journalArticle

1996

Reference counting as a computational interpretation of linear logic

Chirimar, J., Gunter, C. A. & Riecke, J. G., Mar 1996, In : Journal of Functional Programming. 6, 2, p. 195-244 50 p.

Research output: Contribution to journalArticle

Strategic directions in software engineering and programming languages

Gunter, C., Mitchell, J. & Notkin, D., Dec 1996, In : ACM Computing Surveys. 28, 4, p. 727-737 11 p.

Research output: Contribution to journalArticle

1993

Computing ml equality kinds using abstract interpretation

Gunter, C. A., Gunter, E. L. & Macqueen, D. B., Dec 1993, In : Information and Computation. 107, 2, p. 303-323 21 p.

Research output: Contribution to journalArticle

1992

The mixed powerdomain

Gunter, C. A., Sep 14 1992, In : Theoretical Computer Science. 103, 2, p. 311-334 24 p.

Research output: Contribution to journalArticle

1991

Inheritance as implicit coercion

Breazu-Tannen, V., Coquand, T., Gunter, C. A. & Scedrov, A., Jul 1991, In : Information and Computation. 93, 1, p. 172-221 50 p.

Research output: Contribution to journalArticle

1990

Coherence and consistency in domains

Gunter, C. A. & Jung, A., Feb 23 1990, In : Journal of Pure and Applied Algebra. 63, 1, p. 49-66 18 p.

Research output: Contribution to journalArticle

1989

Domain theoretic models of polymorphism

Coquand, T., Gunter, C. & Winskel, G., May 1989, In : Information and Computation. 81, 2, p. 123-167 45 p.

Research output: Contribution to journalArticle

1987

Universal profinite domains

Gunter, C. A., Jan 1987, In : Information and Computation. 72, 1, p. 1-30 30 p.

Research output: Contribution to journalArticle