Publications of Carl A. Gunter

Publications

Detecting AI Trojans Using Meta Neural Analysis.
Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, Bo Li.
IEEE Security Symposium, May, 2021.

DOVE: A Data-Oblivious Virtual Environment.
Hyun Bin Lee, Tushar M. Jois, Christopher W. Fletcher, and Carl A. Gunter.
ISOC Network and Distributed Systems Security (NDSS) Symposium, February, 2021.
NDSS [Video]. Extended arXiv version.

A Pragmatic Approach to Membership Inferences on Machine Learning Models.
Yunhui Long, Lei Wang, Diyue Bu, Vincent Bindschaedler, Xiaofeng Wang, Haixu Tang, Carl A. Gunter, and Kai Chen.
IEEE European Symposium on Security and Privacy (EuroS&P), September, 2020.

Grand Challenges for Embedded Security Research in a Connected World.
Wayne Burleson, Kevin Fu, Denise Anthony, Jorge Guajardo, Carl Gunter, Kyle Ingols, Jean-Baptiste Jeannin, Farinaz Koushanafar, Carl Landwehr, and Susan Squires.
arXiv:2005.06585 [cs.CY], May 2020.

A Hypothesis Testing Approach to Sharing Logs with Confidence,
Yunhui Long, Le Xu, and Carl A. Gunter.
ACM Conference on Data and Application Security and Privacy (CODASPY ’20), New Orleans, LA, March 2020.

You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.
Qi Wang, Wajih Ul Hassan, Ding Li, Kangkook Jee, Xiao Yu, Kexuan Zou, Junghwan Rhee, Zhengzhang Chen, Wei Cheng, Carl A. Gunter, and Haifeng Chen.
ISOC Network and Distributed Systems Security (NDSS ’20) Symposium, February, 2020.

WSEmail: An architecture and system for secure Internet messaging based on web services.
Michael J. May, Kevin D. Lux, and Carl A. Gunter.
Service Oriented Computing and Applications (2020) 14:5–17.

WSEmail: A Retrospective on a System for Secure Internet Messaging Based on Web Services..
Michael J. May, Kevin D. Lux, and Carl A. Gunter.
arXiv:1908.02108 [cs.NI], December, 2019.

Charting the Attack Surface of Trigger-Action IoT Platforms.
Qi Wang, Pubali Datta,Wei Yang, Si Liu, Adam Bates, and Carl A. Gunter.
ACM Computer and Communications Security (CCS ’19), United Kingdom, November, 2019.

BEEER: Distributed Record and Replay for Medical Devices in Hospital Operating Rooms,
Avesta Hojjati, Yunhui Long, Soteris Demetriou, and Carl A. Gunter.
ACM Hot Topics in the Science of Security Symposium (HotSoS), April, 2019, Nashville, TN,  [PPT]

Distributed and Secure ML with Self-tallying Multi-party Aggregation,
Yunhui Long, Tanmay Gangwani, Muhammad Haris Mughees, and Carl A. Gunter.
NeurIPS Workshop on Privacy Preserving Machine Learning, Montréal, Canada, December 2018. [VIDEO]

ReSPonSe: Real-time, Secure, and Privacy-aware Video Redaction System,
Bo Chen, Klara Nahrstedt, and Carl A. Gunter.
ACM Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous ’18), November, 2018, New York, NY.

ReSPonSe: Real-time, Secure, and Privacy-aware Video Redaction System.
Bo Chen, Klara Nahrstedt, and Carl Gunter. 2018.
EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous ’18), New York, NY, November 2018,

Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations,
Karan Ganju, Qi Wang, Wei Yang, Carl A. Gunter, and Nikita Borisov.
ACM Computer and Communications Security (CCS ’18), Toronto Canada, October 2018.

NRF: A Naive Re-identification Framework,
Shubhra Kanti, Karmaker Santu, Vincent Bindschadler, ChengXiang Zhai, and Carl A. Gunter.
ACM Workshop on Privacy in an Electronic Society (WPES ’18), Toronto, Canada, October 2018.

De Facto Diagnosis Specialties: Recognition and Discovery,
Aston Zhang, Xun Lu, Carl A. Gunter, Shuochao Yao, Fangbo Tao, Rongda Zhu, Huan Gui, Daniel Fabbri, David Liebovitz, and Bradley Malin.
Learning Health Systems, 2018:e10057, 2018.

Evaluating Detectors on Optimal Attack Vectors that Enable Electricity Theft and DER Fraud,
Varun Badrinath Krishna, Carl A. Gunter, and William H. Sanders.
IEEE Journal of Selected Topics in Signal Processing, August 2018.

Toward an Extensible Framework for Redaction,
Soteris Demetriou, Nathaniel D. Kaufman, Jonah Baim, Adam J. Goldsher and Carl A. Gunter.
Workshop on Security and Privacy for the Internet-of-Things (IoTSec), Orlando, FL, April 2018.

Fear and Logging in the Internet of Things,
Qi Wang, Wajih Ul Hassan, Adam Bates, and Carl A. Gunter.
ISOC Network and Distributed System Symposium (NDSS ’18), San Diego, CA, February 2018.

Resolving the Predicament of Android Custom Permissions,
Guliz Seray Tuncay, Soteris Demetriou, Karan Ganju, and Carl A. Gunter.
ISOC Network and Distributed System Security (NDSS ’18), San Diego, CA, February 2018. (Distinguished Paper Award)
Video

Towards Measuring Membership Privacy,
Yunhui Long, Vincent Bindschaedler, and Carl A. Gunter.
arXiv:1712.09136 [cs.CR], December 2017.

Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX,
Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, and Carl A. Gunter.
ACM Computer and Communications Security (CCS ’17), October, 2017.

Mining on Someone Else’s Dime: Mitigating Covert Mining Operations in Clouds and Enterprises,
Rashid Tahir, Muhammad Huzaifa, Anupam Das, Mohammad Ahmad, Carl Gunter, Fareed Zaffar, Matthew Caesar, Nikita Borisov.
Research in Attacks, Intrusions and Defenses (RAID ’17), Atlanta, GA, September, 2017.

Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps,
Wei Yang, Deguang Kong, Tao Xie, Carl A. Gunter.
Annual Computer Security Applications Conference (ACSAC ’17), December, 2017.

Plausible Deniability for Privacy-Preserving Data Synthesis
Vincent Bindschaedler, Reza Shokri, Carl A. Gunter.
VLDB Endowment International Conference on Very Large Data Bases (VLDB ’17), Munich, Germany, August 28, 2017.

HanGuard: SDN-driven Protection of Smart Home WiFi Devices from Malicious Mobile Apps,
Soteris Demetriou, Nan Zhang, Yeonjoon Lee, XiaoFeng Wang, Carl A. Gunter, Xiaoyong Zhou, and Michael Grace.
ACM Security and Wireless and Mobile Networks (WiSec ’17), Boston, MA, July 2017. [PPT]

Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be,
Nan Zhang, Soteris Demetriou, XiangHang Mi, Wenrui Diao, Kan Yuan, Peiyuan Zong, Feng Qian, Xiaofeng Wang, Kai Chen, Yuan Tian, Carl A. Gunter, Kehuan Zhang, Patrick Tague, and Yue-Hsun Lin.
arXiv:1703.09809v1 [cs.CR], March 2017.

Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android.
Guliz Seray Tuncay, Soteris Demetriou, Carl A. Gunter.
ACM Computer and Communications Security (CCS ’16), October, 2016.

Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets.
Avesta Hojjati, Anku Adhikari, Katarina Struckmann, Edward J. Chou, Thi Ngoc Tho Nguyen, Kushagra Madan, Marianne S. Winslett, Carl A. Gunter, and William P. King.
ACM Computer and Communications Security (CCS ’16), October, 2016.

Privacy and Security in Mobile Health,
David Kotz, Carl A. Gunter, Santosh Kumar, Jonathan P. Weiner.
IEEE Computer 49(6), 2016.

Privacy Research and Best Practices: Summary of a Workshop for the Intelligence Community,
The National Academies of Sciences, Engineering, and Medicine, 
2016.

Free for All! Assessing User Data Exposure to Advertising Libraries on Android,
Soteris Demetriou, Whitney Merrill, Wei Yang, Aston Zhang and Carl A. Gunter.
ISOC Network and Distributed System Security (NDSS ’16), San Diego, February 2016.

Towards Mobile Query Auto-Completion: An Efficient Mobile Application-Aware Approach,
Aston Zhang, Amit Goyal, Ricardo Baeza-Yates, Yi Chang,  Jiawei Han, Carl A. Gunter, and Hongbo Deng.
25th International World Wide Web Conference (WWW ’16), April 2016.

Inferring Clinical Workflow Efficiency via Electronic Medical Record Utilization,
You Chen, Wei Xie, Carl A Gunter, David Liebovitz, Sanjay Mehrotra, He Zhang, and Bradley Malin.
AMIA Symposium, San Francisco, CA, November 2015.

Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware,
Michael LeMay and Carl A. Gunter.
Logic, Rewriting, and Concurrency, Essays Dedicated to José Meseguer on the Occasion of his 65th Birthday, Urbana, IL, September 2015.

Discovering De Facto Diagnosis Specialities,
Xun Lu, Aston Zhang, Carl A. Gunter, Daniel Fabbri, David Liebovitz, and Bradley Malin.
ACM Conference on Bioinformatics, Computational Biology, and Health Informatics (BCB), Atlanta, GA, September 2015. [PPT]

Security for Mobile and Cloud Frontiers in Healthcare,
David Kotz, Kevin Fu, Carl Gunter, and Avi Rubin.
Communications of the ACM, 58(8), August 2015.

Privacy in the Genomic Era,
Muhammad Naveed, Erman Ayday, Ellen W. Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, and XiaoFeng Wang.
ACM Computing Surveys 48, 1, Article 6, August, 2015.
Associated online tutorial on genomics for computer scientists.

adaQAC: Adaptive Query Auto-Completion via Implicit Negative Feedback,
Aston Zhang, Amit Goyal, Weize Kong, Hongbo Deng, Anlei Dong, Yi Chang, Carl A. Gunter, and Jiawei Han.
ACM Special Interest Group on Information Retrieval Conference (SIGIR ’15), August 9-13, 2015, Santiago, Chile.

Building Bridges Across Electronic Health Record Systems through Inferred Phenotypic Topics,
You Chen, Joydeep Ghosh, Cosmin Adrian Bejan, Carl A. Gunter, Siddharth Gupta, Abel Kho, David Liebovitz, Jimeng Sun, Joshua Denny, and Bradley Malin.
Journal of Biomedical Informatics, Volume 55 (2015), pages 82-93. Appendix.

What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources,
Soteris Demetriou , Xiaoyong Zhouz, Muhammad Naveed, Yeonjoon Lee, Kan Yuan, XiaoFeng Wang, and Carl A Gunter.
ISOC Network and Distributed System Security (NDSS ’15), San Diego, February 2015.

Toward a Science of Learning Systems: a Research Agenda for the High-Functioning Learning Health System,
Charles Friedman. Joshua Rubin, Jeffrey Brown, Melinda Buntin, Milton Corn, Lynn Etheredge, Carl Gunter, Mark Musen, Richard Platt, William Stead, Kevin Sullivan, Douglas Van Houweling.
Journal of the American Medical Informatics Association (JAMIA), 22(1), 2015.

Decide Now or Decide Later? Quantifying the Tradeoff between Prospective and Retrospective Access Decisions,
Wen Zhang, You Chen, Thaddeus R. Cybulski, Daniel Fabbri, Carl A. Gunter, Patrick Lawlor, David Liebovitz, Bradley Malin.
ACM Computer and Communication Security (CCS), Scottsdale AZ, November 2014.

Controlled Functional Encryption,
Muhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, Xiaofeng Wang, Erman Ayday, Jean-Pierre Hubaux, and Carl A. Gunter.
ACM Computer and Communication Security (CCS), Scottsdale AZ, November 2014.

Detecting Privacy-Sensitive Events in Medical Text,
Prateek Jindal, Carl A. Gunter, and Dan Roth.
ACM Bioinformatics, Computational Biology, and Health Informatics (BCB),  Newport Beach, CA, September 2014. (Technical Report.)

Decision Support for Data Segmentation (DS2): Application to Pull Architectures for HIE,
Carl A. Gunter, Mike Berry, and Martin French.
USENIX Safety, Security, Privacy, and Interoperability of Health Information Technologies (HealthTech ’14), San Diego, August 2014.

Security Concerns in Android mHealth Apps
Dongjing He, Muhammad Naveed, Carl A. Gunter, and Klara Nahrstedt
AMIA Symposium, Washington DC, November 2014

Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware,
Michael LeMay and Carl A. Gunter.
arXiv:1404.3465 [cs.CR], April 2014.

Dynamic Searchable Encryption via Blind Storage,
Muhammad Naveed, Manoj Prabhakaran, and Carl A. Gunter.
IEEE Symposium on Security and Privacy, San Jose, CA, May 2014.

Privacy Risk in Anonymized Heterogeneous Information Networks,
Aston Zhang, Xing Xie, Kevin Chen-Chuan Chang, Carl A. Gunter, Jiawei Han, and XiaoFeng Wang.
Extending Database Technologies (EDBT’14), Athens, Greece, March 2014.

Privacy-Preserving Audit for Broker-Based Health Information Exchange
Se Eun Oh, Ji Young Chun, Limin Jia, Deepak Garg, Carl A. Gunter, Anupam Datta.
ACM Conference on Data and Application Security and Privacy (CODASPY ’14), San Antonio, TX, March 2014.

Privacy-Preserving Audit for Broker-Based Health Information Exchange,
Se Eun Oh, Ji Young Chun, Limin Jia, Deepak Garg, Carl A. Gunter, Anupam Datta.
ACM Conference on Data and Application Security and Privacy (CODASPY ’14), San Antonio, TX, March 2014.

Inside Job: Understanding and Mitigating the Threat of External Device Mis-Bonding on Android,
Muhammad Naveed, Xiaoyong Zhou, Soteris Demetriou, XiaoFeng Wang, Carl A Gunter.
ISOC Network and Distributed Computing Security (NDSS 14), San Diego, CA, February 2014.

Securing Information Technology in Healthcare
Denise Anthony, Andrew T. Campbell, Thomas Candon, Andrew Gettinger, David Kotz, Lisa A. Marsch, Andres Molina-Markham, Karen Page, Sean Smith, Carl A. Gunter, and M. Eric Johnson
IEEE Security & Privacy, Vol.11, No.6, pp.25,33, Nov.-Dec. 2013.

Identity, Location, Disease and More: Inferring Your Secrets from Android Public Resources,
Xiaoyong Zhou, Soteris Demetriou, Dongjing He, Muhammad Naveed, Xiaorui Pan, Xiaofeng Wang Carl A. Gunter, Klara Nahrstedt.
ACM Computer and Communication Security (CCS ’13), Berlin Germany, November 2013.

Building a Smarter Health and Wellness Future: Privacy and Security Challenges,
Carl A. Gunter. 
Chapter 9 in ICTs and the Health Sector: Towards Smarter Health and Wellness Models, OECD, October 2013, pages 141-157.

Requirements and Design for an Extensible Toolkit for Analyzing EMR Audit Logs,
Eric Duffy, Steve Nyemba, Carl A. Gunter, David Liebovitz, and Bradley Malin.
USENIX Workshop on Health Information Technologies (HealthTech 13), August 2013.

Modeling and Detecting Anomalous Topic Access
Siddharth Gupta, Casey Hanson, Carl A. Gunter, Mario Frank, David Liebovitz, and Bradley Malin
IEEE Intelligence and Security Informatics (ISI 13), June 2013. [BIB][PPT]

Evolving Role Definitions Through Permission Invocation Patterns
Wen Zhang, You Chen, Carl A. Gunter, David Liebovitz, and Bradley Malin
ACM Symposium on Access Control Models and Technologies (SACMAT ’13), June 2013. [BIB]

Mining Deviations from Patient Care Pathways via Electronic Medical Record System Audits,
He Zhang, Sanjay Mehotra, David Liebovitz, Carl A. Gunter, and Bradley Malin.
ACM Transactions on Management Information Systems, Vol. 4, No. 4, Article 17, December 2013.

Report of Preliminary Findings and Recommendations
State of Illinois Health Information Exchange Authority Data Security and Privacy Committee
September 2012.

Tragedy of Anticommons in Digital Right Management of Medical Records
Quanyan Zhu, Carl Gunter, and Tamar Basar
USENIX Workshop on Health Security and Privacy (HealthSec12), August 2012. [BIB]

Cumulative Attestation Kernels for Embedded Systems
Michael LeMay and Carl A. Gunter
IEEE Transactions on Smart Grid, June 2012. [BIB]

Adaptive Selective Verification: An Efficient Adaptive Countermeasure to Thwart DoS Attacks
Sanjeev Khanna, Santosh S. Venkatesh, Omid Fatemieh, Fariba Khan, and Carl A. Gunter
IEEE/ACM Transactions on Networking, June 2012. [BIB]

Reliable Telemetry in White Spaces using Remote Attestation
Omid Fatemieh, Michael LeMay, and Carl A. Gunter
Annual Computer Security Applications Conference (ACSAC ’11), Orlando, FL, December 2011. [PPT][BIB][Related]

Role Prediction using Electronic Medical Record System Audits
Wen Zhang, Carl A. Gunter, David Liebovitz, Jian Tian, and Bradley Malin
AMIA 2011 Annual Symposium, Washington, DC, October 2011. [PPT][BIB]

Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems
Carl A. Gunter, David M. Liebovitz, and Bradley Malin
IEEE Security & Privacy, volume 9, number 5, September/October 2011. [BIB]

Enforcing Executing-Implies-Verified with the Integrity-Aware Processor
Michael LeMay and Carl A. Gunter
International Conference on Trust and Trustworthy Computing (TRUST ’11), Pittsburgh, PA, June 2011. [PPT][BIB][Related]
The original publication is available at www.springerlink.com.

Making DTNs Robust Against Spoofing Attacks with Localized Countermeasures
Md Yusuf Sarwar Uddin, Ahmed Khurshid, Hee Dong Jung, Carl Gunter, Matthew Caesar and Tarek Abdelzaher
IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON ’11), Salt Lake City, UT, June 2011. [BIB]

PCAST Workgroup Letter to the National Coordinator
Paul Egerman (Chair), Bill Stead (Vice Chair) and the PCAST Workgroup Members
Office of the National Coordinator for Health and Human Services Health Information Policy Committee, April 2011.

Reconstructing Hash Reversal-Based Proof of Work Schemes
Jeff Green, Joshua Juen, Omid Fatemieh, Ravinder Shankesi, Dong Jin and Carl A. Gunter
USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’11), Boston, MA, March 2011. [BIB]

Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks
Omid Fatemieh, Ali Farhadi, Ranveer Chandra and Carl A. Gunter
Network and Distributed System Security Symposium (NDSS ’11), San Diego, CA, February 2011. [PPT][BIB]

MyABDAC: Compiling XACML Policies for Attribute-Based Database Access Control
Sonia Jahid, Carl A. Gunter, Imranul Hoque and Hamed Okhravi 
ACM Conference on Data and Application Security and Privacy, San Antonio, TX, February 2011. [BIB]

Distributed Non-Intrusive Load Monitoring
David C. Bergman, Dong Jin, Joshua P. Juen, Naoki Tanaka, Carl A. Gunter and Andrew Wright
IEEE/PES Conference on Innovative Smart Grid Technologies (ISGT ’11), Anaheim, CA, January 2011. [BIB][Related]

Application-Aware Secure Multicast for Power Grid Communications
Jianqing Zhang and Carl A. Gunter
International Journal of Security and Networks (IJSN), volume 6, number 1, 2011. [BIB][Related]

Nonintrusive Load-Shed Verification
David C. Bergman, Dong Jin, Joshua P. Juen, Naoki Tanaka, Carl A. Gunter and Andrew K. Wright
IEEE Pervasive Computing, Special Issue on Smart Energy Systems, volume 10, number 1, pages 49-57, 2011. [BIB][Related]

Attribute-Based Messaging: Access Control and Confidentiality
Rakesh Bobba, Omid Fatemieh, Fariba Khan, Arindam Khan, Carl A. Gunter, Himanshu Khurana and Manoj Prabhakaran
ACM Transactions on Information and Systems Security (TISSEC), volume 13, number 4, December 2010.

Tiered Incentives for Integrity Based Queuing
Fariba Khan and Carl A. Gunter
USENIX OSDI, Workshop on the Economics of Networks, Systems, and Computation (NetEcon ’10), Vancouver, BC, Canada, October 2010. [BIB]

Application-Aware Secure Multicast for Power Grid Communications
Jianqing Zhang and Carl A. Gunter
IEEE International Conference on Smart Grid Communications (SmartGridComm ’10), Gaithersburg, MD, October 2010. [PPT][BIB][Related]

Resource Inflation Threats to Denial of Service Countermeasures
Ravinder Shankesi, Omid Fatemieh and Carl A. Gunter
Technical Report, University of Illinois at Urbana-Champaign, October 2010.

Low Cost and Secure Smart Meter Communications using the TV White Spaces
Omid Fatemieh, Ranveer Chandra and Carl A. Gunter
IEEE International Symposium on Resilient Control Systems (ISRCS ’10), Idaho Falls, ID, August 2010. [PPT][BIB][Related]

Secure Collaborative Sensing for Crowdsourcing Spectrum Data in White Space Networks
Omid Fatemieh, Ranveer Chandra and Carl A. Gunter
IEEE Symposia on New Frontiers in Dynamic Spectrum Access Networks (DySPAN ’10), Singapore, April 2010. [BIB]

Diagnostic Powertracing for Sensor Node Failure Analysis
Mohammad Maifi Hasan Khan, Hieu K. Le, Michael LeMay, Parya Moinzadeh, Lili Wang, Yong Yang, Dong K. Noh, Tarek Abdelzaher, Carl A. Gunter, Jiawei Han and Xin Jin
ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN ’10), Stockholm, Sweden, April 2010. [Related]

A Medical Database Case Study for Reflective Databases Access Control
Lars Olson, Carl A. Gunter and Sarah Peterson Olson
Security and Privacy in Medical and Homecare Systems (SPIMACS ’09), Chicago, IL, November 2009. [PPT]

Completeness of Discovery Protocols
Alwyn Goodloe and Carl A. Gunter
Assurable and Usable Security Configuration (SafeConfig ’09), Chicago, IL, November 2009.

Sh@re: Negotiated Audit in Social Networks
Alejandro Gutierrez, Apeksha Godiyal, Matt Stockton, Michael LeMay, Carl A. Gunter and Roy H. Campbell
IEEE International Conference on Systems, Man, and Cybernetics (SMC ’09), San Antonio, TX, October 2009.

Cumulative Attestation Kernels for Embedded Systems
Michael LeMay and Carl A. Gunter
European Symposium on Research in Computer Security (ESORICS ’09), Saint Malo, France, September 2009. The original publication is available at www.springerlink.com [PPT][Related]

Model-Checking DoS Amplification for VoIP Session Initiation
Ravinder Shankesi, Musab AlTurki, Ralf Sasse, Carl A. Gunter and Jose Meseguer
European Symposium on Research in Computer Security (ESORICS ’09), Saint Malo, France, September 2009.

Implementing Reflective Access Control in SQL
Lars E. Olson, Carl A. Gunter, William R. Cook and Marianne Winslett
23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec ’09), Montreal, QC, July 2009. [PPT]

Strong and Weak Policy Relations
Michael J. May, Insup Lee, Carl A. Gunter and Steve Zdancewic
IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY ’09), London, UK, July 2009.

Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers
Carl A. Gunter
IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY ’09), London, UK, July 2009. [PPT][Related]

Addressing Safety and Security Contradictions in Cyber-Physical Systems
Mu Sun, Sibin Mohan, Lui Sha and Carl A. Gunter
Workshop on Future Directions in Cyber-Physical Systems, July 2009.

Safety in Discretionary Access Control for Logic-based Publish-Subscribe Systems
Kazuhiro Minami, Nikita Borisov and Carl A. Gunter
ACM Access Control Models and Technologies (Sacmat ’09), Stresa, Italy, June 2009.

How to Bootstrap Security for Ad-Hoc Networks: Revisited
Wook Shin, Carl A. Gunter, Shinsaku Kiyomoto, Kazuhide Fukushima and Toshiaki Tanaka
IFIP Information Security Conference (SEC ’09), Pafos, Cyprus, May 2009.

Probabilistic Modeling and Analysis of DoS Protection for the ASV Protocol
Musab AlTurki, Jose Meseguer and Carl A. Gunter
Electronic Notes in Theoretical Computer Science 234, pages 3-18, 2009. [BIB]

Collaborative Recommender Systems for Building Automation
Michael LeMay, Jason J. Haas and Carl A. Gunter
IEEE Hawaii International Conference on System Sciences (HICSS ’09), Waikoloa, HI, January 2009. [PPT][BIB][Related]

Guest Editorial Network Infrastructure Configuration
Paul Anderson, Carl A. Gunter, Charles R. Kalmanek, Sanjai Narain, Jonathan M. Smith, Rajesh Talpade and Geoffrey G. Xie
IEEE Journal on Selected Areas in Communications, volume 27, issue 3, pages 249-252, 2009.

Specifying and Analyzing Workflows for Automated Identification and Data Capture
Elsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter and Anh Nguyen
IEEE Hawaii International Conference on System Sciences (HICSS ’09), Waikoloa, HI, January 2009.

Using Rhythmic Nonces for Puzzle-Based DoS Resistance
Ellick M. Chan, Carl A. Gunter, Sonia Jahid, Evgeni Peryshkin and Daniel Rebolledo
ACM Computer Security Architectures Workshop (CSAW ’08), Fairfax, VA, October 2008. [PPT][BIB]

A Formal Framework for Reflective Database Access Control Policies
Lars E. Olson, Carl A. Gunter and P. Madhusudan
ACM Conference on Computer and Communications Security (CCS ’08), Alexandria, VA, October 2008. [PPT]

Probabilistic Modeling and Analysis of DoS Protection for the ASV Protocol
Musab AlTurki, Jose Meseguer and Carl A. Gunter
International Workshop on Security and Rewriting Techniques (SecRet ’08), Pittsburgh, PA, June 2008.

Modular Preservation of Safety Properties by Cookie-Based DoS-Protection Wrappers
Rohit Chadha, Carl A. Gunter, Jose Meseguer, Ravinder Shankesi and Mahesh Viswanathan
IFIP Formal Methods for Open Object-based Distributed Systems (FMOODS ’08), Oslo, Norway, June 2008. [BIB]

Adaptive Selective Verification
Sanjeev Khanna, Santosh S. Venkatesh, Omid Fatemieh, Fariba Khan and Carl A. Gunter
IEEE Conference on Computer Communications (INFOCOM ’08), Phoenix, AZ, April 2008. [PPT][BIB]

An Integrated Architecture for Demand Response Communications and Control (awarded best paper)
Michael LeMay, Rajesh Nelli, George Gross and Carl A. Gunter
IEEE Hawaii International Conference on System Sciences (HICSS ’08), Waikoloa, HI, January 2008. [PPT][BIB][Related]

Improving Multi-Tier Security Using Redundant Authentication
Jodie P. Boyer, Ragib Hasan, Lars E. Olson, Nikita Borisov, Carl A. Gunter and David Raila
ACM Computer Security Architecture Workshop (CSAW ’07), Fairfax, VA, November 2007. [PPT][BIB][PSTR]

Reasoning about Concurrency for Security Tunnels
Alwyn E. Goodloe and Carl A. Gunter
IEEE Computer Security Foundations (CSF ’07), Venice, Italy, July 2007. [PPT][BBT]

Emergency Alerts as RSS Feeds with Interdomain Authorization
Filippo Gioachin, Ravinder Shankesi, Michael J. May, Carl A. Gunter and Wook Shin
IARIA International Conference on Internet Monitoring and Protection (ICIMP ’07), Santa Clara, CA, July 2007. [PPT][BIB]

PolicyMorph: Interactive Policy Transformations for a Logical Attribute-Based Access Control Framework
Michael LeMay, Omid Fatemieh and Carl A. Gunter
ACM Symposium on Access Control Models And Technologies (SACMAT ’07), Sophia Antipolis, France, Jun 2007. [PPT][BIB]

PAS: A Wireless-Enabled, Sensor-Integrated Personal Assistance System for Independent and Assisted Living
Jennifer C. Hou, Qixin Wang, Bedoor K. AlShebli, Linda Ball, Stanley Birge, Marco Caccamo, Chin-Fei Cheah, Eric Gilbert, Carl A. Gunter, Elsa Gunter, Chang-Gun Lee, Karrie Karahalios, Min-Young Nam, Narasimhan Nitya, Chaudhri Rohit, Lui Sha, Wook Shin, Sammy Yu, Yang Yu and Zheng Zeng
High Confidence Medical Device Software and Systems (HCMDSS ’07), Boston, MA, June 2007.

On the Safety and Efficiency of Firewall Policy Deployment
Charles C. Zhang, Marianne Winslett and Carl A. Gunter
IEEE Security and Privacy, Oakland CA, May 2007. [PPT][BIB]

Fair Coalitions for Power-Aware Routing in Wireless Networks
Ratul K. Guha, Carl A. Gunter and Saswati Sarkar
IEEE Transactions on Mobile Computing, volume 6, nubmer 2, pages 206-220, February 2007. [BIB]

Unified Architecture for Large-Scale Attested Metering
Michael LeMay, George Gross, Carl A. Gunter and Sanjam Garg
IEEE Hawaii International Conference On System Sciences (HICSS ’07), Waikoloa, HI, January 2007. [PPT][BIB][Related]

AMPol-Q: Adaptive Middleware Policy to Support QoS
Raja Afandi, Jianqing Zhang and Carl A. Gunter
ACM International Conference on Service Oriented Computing (ICSOC ’06), Chicago, IL, December 2006. [PPT][BIB]

AMPol: Adaptive Messaging Policy
Raja Afandi, Jianqing Zhang, Munawar Hafiz and Carl A. Gunter
IEEE European Conference on web Services (ECOWS ’06), Zurich, Switzerland, December 2006. [PPT][BIB]

Using Attribute-Based Access Control to Enable Attribute-Based Messaging
Rakesh Bobba, Omid Fatemieh, Fariba Khan, Carl A. Gunter and Himanshu Khurana
IEEE Annual Computer Security Applications Conference (ACSAC ’06) , Miami, FL, December 2006. [PPT][BIB]

Reducing Risk by Managing Software Related Failures in Networked Control Systems
Girish Baliga, Scott Graham, Carl A. Gunter and P. R. Kumar
IEEE Conference on Decision and Control (CDC ’06), San Diego, CA, December 2006. [PPT][BIB]

Defeasible Security Policy Composition for Web Services
Adam J. Lee, Jodie P. Boyer, Lars E. Olson and Carl A. Gunter
ACM Formal Methods in Software Engineering (FMSE ’06), Alexandria, VA, November 2006. [PPT][BIB]

Securing the Drop-Box Architecture for Assisted Living
Michael J. May, Wook Shin, Carl A. Gunter and Insup Lee
ACM Formal Methods in Security Engineering (FMSE ’06), Alexandria, VA, November 2006. [BIB]

I-Living: An Open System Architecture for Assisted Living
Qixin Wang, Wook Shin, Xue Liu, Zheng Zeng, Cham Oh, Bedoor K. AlShebli, Marco Caccamo, Carl A. Gunter, Elsa L. Gunter, Jennifer Hou, Karrie Karahalios and Lui Sha
IEEE Systems, Man, and Cybernetics (SMC ’06), Taipei, Taiwan, October 2006. [PPT][CITES]

Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
Michael J. May, Carl A. Gunter and Insup Lee
IEEE Computer Security Foundations Workshop (CSFW  ’06), Venice, Italy, July 2006. [PPT][BIB][CITES]

Privacy Sensitive Location Information Systems in Smart Buildings
Jodie P. Boyer, Kaijun Tan and Carl A. Gunter
Springer Security in Pervasive Computing (SPC ’06), Lecture Notes in Computer Science, pages 149-164, York, UK, April 2006. [PPT][BIB]

U.S. Patent Number 6,981,148, December 2005
Trevor Jim and Carl A. Gunter
Method for Integrating Online and Offline Cryptographic Signatures and Providing Secure Revocation

L3A: A Protocol for Layer Three Accounting
Alwyn Goodloe, Carl A. Gunter, Matthew Jacobs and Gaurav Shah
IEEE Workshop on Secure Network Protocols (NPsec ’05), Boston, MA, November 2005. [PPT][BIB]

Mitigating DoS Attack Through Selective Bin Verification
Micah Sherr, Michael Greenwald, Carl A. Gunter, Sanjeev Khanna and Santosh Venkatesh
IEEE Workshop on Secure Network Protocols (NPsec ’05), Boston, MA, November 2005. [PPT][BIB]

WSEmail: Secure Internet Messaging Based on Web Services
Kevin D. Lux, Michael J. May, Nayan L. Bhattad and Carl A. Gunter
IEEE International Conference on Web Services (ICWS ’05), Orlando, FL, July 2005. [PPT][BIB]

Formal Modeling and Analysis of DoS Using Probabilistic Rewrite Theories
Gul Agha, Michael Greenwald, Carl A. Gunter, Sanjeev Khanna, Jose Meseguer, Koushik Sen and Prasannaa Thati
IEEE Workshop on Foundations of Computer Security (FCS ’05), Chicago, IL, June 2005. [PPT][BIB]

U.S. Patent Number 6,885,388, April 2005
Carl A. Gunter, Tomas J. Remaley, and David J. Ruggieri
Method for Automatically Generating List of Meeting Participants and Delegation Permision

Formal Prototyping in Early Stages of Protocol Design
Alwyn Goodloe, Carl A. Gunter and Mark-Oliver Stehr
IFIP/ACM Workshop on Issues in the Theory of Security (WITS ’05), Long Beach, CA, January 2005. [PPT][BIB]

Network Event Recognition
Karthikeyan Bhargavan and Carl A. Gunter
Formal Methods in System Design, volume 27, number 3, pages 213-251, 2005.

Fair Coalitions for Power-Aware Routing in Wireless Networks
Ratul K. Guha, Carl A. Gunter and Saswati Sarkar
IEEE Conference on Decision and Control (CDC ’04), Paradise Island, Bahamas, December 2004.

A Model-Based Approach to Integrating Security Policies for Embedded Devices
Michael McDougall, Rajeev Alur and Carl A. Gunter
ACM International Conference on Embedded Software (EMSOFT ’04), Pisa, Italy, September 2004.

The Consistency of Task-Based Authorization Constraints in Workflow Systems
Kaijun Tan, Jason Crampton and Carl A. Gunter
IEEE Computer Security Foundations Workshop (CSFW ’04), Monterey, CA, July 2004.

A Formal Privacy System and its Application to Location Based Services,
Carl A. Gunter, Michael J. May, Stuart Stubblebine.
Workshop on Privacy Enhancing Technologies (PET 04), Toronto, Canada, May 2004. [CITES]

DoS Protection for Reliably Authenticated Broadcast
Carl A. Gunter, Sanjeev Khanna, Kaijun Tan and Santosh Venkatesh
ICSOC Network and Distributed Systems Security Symposium (NDSS ’04), San Diego, CA, February 2004.

Open APIs for Embedded Security
Carl A. Gunter
European Conference on Object-Oriented Programming (ECOOP ’03), volume 2743, Lecture Notes in Computer Science, pages 225-247, Darmstadt, Germany, July 2003. Invited paper. [BIB]

Reasoning About Secrecy for Active Networks
Pankaj Kakkar, Carl A. Gunter and Martin Abadi
Journal of Computer Security, volume 11, number 2, pages 245-287, April 2003.

Predictable Programs in Barcodes
Alwyn Goodloe, Michael McDougall, Rajeev Alur and Carl A. Gunter
International Conference on Compilers, Architecture, and Synthesis for Embedded Systems (CASES ’02), pages 298-303, Grenoble, France, October 2002. [BIB]

U.S. Patent Application 016199, October 2002
Carl A. Gunter, Michael C. Berry, and David J. Ruggieri
Method and System for Expediting Delegation of Permission

Micro Mobile Programs
Carl A. Gunter
IFIP World Computer Congress, Foundation of Information Technology in the Era of Network and Mobile Computing, pages 356-369, Montreal, Canada, August 2002. Invited paper.

Formal Verification of Standards for Distance Vector Routing Protocols
Karthikeyan Bhargavan, Davor Obradovic and Carl A. Gunter
Journal of the ACM, volume 49, number 4, pages 538-576, July 2002.

Verisim: Formal Analysis of Network Simulations
Karthikeyan Bhargavan, Carl A. Gunter, Moonjoo Kim, Insup Lee, Davor Obradovic, Oleg Sokolsky and Mahesh Viswanathan
IEEE Transactions on Software Engineering, volume 28, number 2, pages 129-145, February 2002.

Requirements for a Practical Network Event Recognition Language
Karthikeyan Bhargavan and Carl A. Gunter
Electronic Notes in Theoretical Computer Science, volume 70, number 4, 2002.

Models and Languages for Digital Rights
Carl A. Gunter, Stephen Weeks and Andrew K. Wright
IEEE Hawaii International Conference on System Sciences (HICSS ’01), Maui, HI, January 2001.

What Packets May Come: Automata for Network Monitoring
Karthikeyan Bhargavan, Satish Chandra, Peter J. McCann and Carl A. Gunter
ACM Symposium on Principles of Programming Languages (POPL ’01), Maui, HI, January 2001.

Certificate Distribution with Local Autonomy
Pankaj Kakkar, Michael McDougall, Carl A. Gunter and Trevor Jim
2nd International Working Conference on Active Networks (IWAN ’00), Lecture Notes in Computer Science, volume 1942, pages 277-295, Tokyo, Japan, October 2000.

Policy Directed Certificate Retrieval
Carl A. Gunter and Trevor Jim
Software Practice and Experience, volume 30, pages 1609-1640, September 2000.

Routing Information Protocol in HOL/SPIN
Karthikeyan Bhargavan, Carl A. Gunter and Davor Obradovic
Theorem Proving in Higher Order Logics (TPHOLs ’00), Lecture Notes in Computer Science, volume 1869, pages 53-72, Portland, OR, August 2000.

Verisim: Formal Analysis of Network Simulations
Karthikeyan Bhargavan, Carl A. Gunter, Moonjoo Kim, Insup Lee, Davor Obradovic, Oleg Sokolsky and Mahesh Viswanathan
ACM International Symposium on Software Testing and Analysis (ISSTA ’00), pages 2-13, Portland, OR, August 2000.

Fault Origin Adjudication
Karthikeyan Bhargavan, Carl A. Gunter and Davor Obradovic
ACM Formal Methods in Software Practice (FMSP ’00), Portland, OR, August 2000.

Reasoning About Secrecy for Active Networks
Carl A. Gunter, Pankaj Kakkar and Martin Abadi
IEEE Computer Security Foundations Workshop (CSFW ’00), pages 118-131, Cambridge, England, July 2000.

A Reference Model for Requirements and Specifications
Carl A. Gunter, Elsa L. Gunter, Michael Jackson and Pamela Zave
IEEE International Conference on Requirements Engineering (ICRE ’00), Schaumburg, IL, June 2000. Best paper award.

A Reference Model for Requirements and Specifications
Carl A. Gunter, Elsa L. Gunter, Michael Jackson and Pamela Zave
IEEE Software, volume 17, number 3, pages 37-43, May/June 2000.

Specification and Formal Verification of PLAN Algorithm in Maude
Bow-Yaw Wang, Jose Meseguer and Carl A. Gunter
IEEE Workshop on Distributed System Validation and Verification (ICDCS ’00), pages E:49-E56, April 2000.

Generalized Certificate Revocation
Carl A. Gunter and Trevor Jim
ACM Symposium on Principles of Programming Languages (POPL ’00), pages 316-329, Boston, MA, January 2000.

Abstracting Dependencies between Software Configuration Items
Carl A. Gunter
Transactions on Software Engineering and Methodology, volume 9, number 1, pages 94-131, 2000.

Specifying the PLAN Networking Programming Language
Pankaj Kakkar, Michael Hicks, Jonathan T. Moore and Carl A. Gunter
Higher Order Operational Techniques in Semantics, Electronic Notes in Theoretical Computer Science, volume 26, September 1999.

PLANet: An Active Internetwork
Michael Hicks, Jonathan T. Moore, D. Scott Alexander, Carl A. Gunter and Scott Nettles
IEEE Conference on Computer Communications (INFOCOM ’99), pages 1124-1133, Boston, MA, March 1999.

The SwitchWare Active Network Implementation
D. Scott Alexander, Michael W. Hicks, Pankaj Kakkar, Angelos D. Keromytis, Marianne Shaw, Jonathan T. Moore, Carl A. Gunter, Trevor Jim, Scott M. Nettles and Jonathan M. Smith
ACM ML Workshop, Baltimore, MD, September 1998.

PLAN: A Packet Language for Active Networks
Michael W. Hicks, Pankaj Kakkar, Jonathan T. Moore, Carl A. Gunter and Scott M. Nettles
ACM International Conference on Functional Programming Languages (ICFP ’98), pages 86-93, Baltimore, MD, September 1998.

The Village Telephone System: A Case Study in Formal Software Engineering
Karthikeyan Bhargavan, Carl A. Gunter, Elsa L. Gunter, Michael Jackson, Davor Obradovic and Pamela Zave
Theorem Proving Higher Order Logics (TPHOLs ’98), Lecture Notes in Computer Science, volume 1479, pages 49-66, Canberra, Australia, September 1998.

Network Programming Using PLAN
Michael Hicks, Pankaj Kakkar, Jonathan T. Moore, Carl A. Gunter and Scott M. Nettles
Workshop on Internet Programming Languages, Lecture Notes in Computer Science, volume 1686, pages 127-143, Chicago, IL, May 1998.

The SwitchWare Active Network Architecture
D. Scott Alexander, William A. Arbaugh, Michael Hicks, Pankaj Kakkar, Angelos Keromytis, Jonathan T. Moore, Carl A. Gunter, Scott M. Nettles and Jonathan M. Smith
IEEE Network Magazine, Special Issue on Active and Controllable Networks, volume 12, number 3, pages 29-36, May/June 1998.

Active Network Encapsulation Protocol (ANEP)
D. Scott Alexander, Bob Braden, Carl A. Gunter, Alden W. Jackson, Angelos D. Keromytis, Gary J. Minden and David Wetherall
Active Networks RFC, July 1997.

The Common Order-Theoretic Structure of Version Spaces and ATMS’s
Carl A. Gunter, Teow-Hin Ngair and Devika Subramanian
Artificial Intelligence Journal (AIJ), volume 95, number 2, pages 357-407, 1997.

Sets as Anti-Chains
Carl A. Gunter, Teow-Hin Ngair and Devika Subramanian
Asian Computing Conference (ASIAN ’96), Lecture Notes in Computer Science, volume 1179, pages 116-128, Singapore, December 1996.

Strategic Directions in Software Engineering and Programming Languages
Carl A. Gunter, John C. Mitchell and David Notkin
ACM Computing Surveys, volume 28, number 4, pages 726-737, December 1996.

Abstracting Dependencies between Software Configuration Items
Carl A. Gunter
ACM Symposium on the Foundations of Software Engineering (FSE ’96), pages 167-178, San Francisco, CA, October 1996.

Reference Counting as a Computational Interpretation of Linear Logic
Jawahar Chirimar, Carl A. Gunter and Jon G. Riecke
Journal of Functional Programming, volume 6, number 2, pages 195-244, March 1996.

A Generalization of Exceptions and Control in ML-like Languages
Carl A. Gunter, Didier Remy and Jon G. Riecke
ACM Conference on Functional Programming Languages and Computer Architecture (FPCA ’95), pages 12-23, La Jolla, CA, June 1995.

Theoretical Aspects on Object-Oriented Programming: Types, Semantics and Language Design
Carl A. Gunter and John C. Mitchell, editors
The MIT Press, 1994.

The Semantics of Types in Programming Languages
Carl A. Gunter
Oxford University Press Handbook of Logic in Theoretical Computer Science, volume 3, Semantic Structures, pages 395-475, 1994.

Computing ML Equality Kinds Using Abstract Interpretation
Carl A. Gunter, Elsa L. Gunter and David B. MacQueen
Information and Computation, volume 107, number 2, pages 303-323, December 1993.

Forms of Semantic Specification
Carl A. Gunter
Current Trends in Theoretical Computer Science: Essays and Tutorials, World Scientific Series in Computer Science, pages 332-353, 1993.

Proving Memory Management Invariants for Language Based on Linear Logic
Jawahar Chirimar, Carl A. Gunter and Jon G. Riecke
ACM Conference on Lisp and Functional Programming (LFP ’92), pages 139-150, San Francisco, CA, June 1992.

Xpnet: A Graphical Interface to Proof Nets with an Efficient Proof Checker
Jawahar Chirimar, Carl A. Gunter and Myra VanInwegen
Conference on Automated Deduction (CADE ’92), Lecture Notes in Artificial Intelligence, volume 607, pages 711-715, Saratoga Springs, NY, June 1992.

The Mixed Powerdomain
Carl A. Gunter
Theoretical Computer Science, volume 103, number 2, pages 311-334, 1992.

Semantics of Programming Languages: Structures and Techniques
Carl A. Gunter
The MIT Press, 1992. [Google Books]

An Abstract Interpretation for ML Equality Kinds
Carl A. Gunter, Elsa L. Gunter and David B. MacQueen
Theoretical Aspects of Computer Software International Conference (TACS ’91), Lecture Notes in Computer Science, volume 526, pages 112-130, Sendai, Japan, September 1991.

The Common Order-Theoretic Structure of Version Spaces and ATMS’s
Carl A. Gunter, Teow-Hin Ngair, Prakash Panangaden and Devika Subramanian
AAAI 9th National Conference on Artificial Intelligence (AAAI ’91), volume 1, pages 500-505, Anaheim, CA, July 1991.

Inheritance as Implicit Coercion
Val Breazu-Tannen, Thierry Coquand, Carl A. Gunter and Andre Scedrov
Information and Computation, volume 93, number 1, pages 172-221, July 1991. Invited paper from LICS ’89.

Computing with Coercions
Val Breazu-Tannen, Carl A. Gunter and Andre Scedrov
ACM Conference on Lisp and Functional Programming (LFP ’90), pages 44-60, Nice, France, June 1990.

Normal Process Representatives
Vijay Gehlot and Carl A. Gunter
IEEE Symposium on Logic on Computer Science (LICS ’90), pages 200-207, Philadelphia, PA, June 1990.

Relating Partial and Total Correctness Interpretations of Nondeterministic Programs
Carl A. Gunter
ACM Symposium on Principles of Programming Languages (POPL ’90), pages 306-319, San Francisco, CA, January 1990.

Coherence and Consistency in Domains
Carl A. Gunter and Achim Jung
Journal of Pure and Applied Algebra, volume 63, pages 49-66, 1990.

Semantic Domains
Carl A. Gunter and Dana S. Scott
Handbook of Theoretical Computer Science, volume B, pages 633-674, North-Holland, 1990.

Inheritance and Explicit Coercion
Val Breazu-Tannen, Thierry Coquand, Carl A. Gunter and Andre Scedrov
IEEE 4th Annual Symposium on Logic in Computer Science (LICS ’89), Pages 112-129, Pacific Grove, CA, June 1989. [BIB]

Domain Theoretic Models of Polymorphism
Thierry Coquand, Carl A. Gunter and Glynn Winskel
Information and Computation, volume 82, number 2, pages 123-167, May 1989.

Nets as Tensor Theories
Carl A. Gunter and Vijay Gehlot
International Conference on the Application and Theory of Petri Nets, pages 174-191, 1989.

Coherence and Consistency in Domains
Carl A. Gunter and Achim Jung
Logic in Computer Science (LICS ’08), pages 309-317, Edinburgh, Scotland, July 1988.

Typed Functional Programming for the Rapid Development of Reliable Software
Val Breazu-Tannen, O. Peter Buneman and Carl A. Gunter
ACM Productivity: Progress, Prospects and Payoff, pages 115-125, Gaithersburg, MD, June 1988.

DI-domains as a Model of Polymorphism
Thierry Coquand, Carl A. Gunter and Glynn Winskel
Mathematical Foundations of Programming Language Semantics (MFPS ’87), Lecture Notes in Computer Science, volume 298, pages 344-363, New Orleans, LA, April 1987. [BIB]

Universal Profinite Domains
Carl A. Gunter
Information and Computation, volume 72, pages 1-30, January 1987.

The Largest First-Order Axiomatizable Cartesian Closed Category of Domains
Carl A. Gunter
IEEE Symposium on Logic in Computer Science (LICS ’86), pages 142-148, Cambridge, MA, June 1986. [BIB]

A Universal Domain Technique for Profinite Posets
Carl A. Gunter
International Colloquium on Automata Languages and Programs (ICALP ’85), Lecture Notes in Computer Science, volume 194, pages 232-243, Nafplion, Greece, July 1985.

Comparing Categories of Domains
Carl A. Gunter
Mathematical Foundations of Programming Semantics (MFPS ’85), Lecture Notes in Computer Science, volume 239, pages 101-121, Manhattan, KS, April 1985.

Profinite Solutions for Recursive Domain Equations
Carl A. Gunter
Doctoral Dissertation, University of Wisconsin at Madison, 1985.

See Also

Last updated on Thursday, June 26, 2014, 12:43 pm