


Остановите войну!
for scientists:
Carl A. Gunter
Person information

- affiliation: University of Illinois, Urbana-Champaign, IL, USA
- affiliation: University of Pennsylvania, Philadelphia, PA, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [c124]Hyun Bin Lee, Tushar M. Jois, Christopher W. Fletcher, Carl A. Gunter:
DOVE: A Data-Oblivious Virtual Environment. NDSS 2021 - [c123]Yunhui Long, Boxin Wang, Zhuolin Yang, Bhavya Kailkhura, Aston Zhang, Carl A. Gunter, Bo Li:
G-PATE: Scalable Differentially Private Data Generator via Private Aggregation of Teacher Discriminators. NeurIPS 2021: 2965-2977 - [c122]Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, Bo Li:
Detecting AI Trojans Using Meta Neural Analysis. IEEE Symposium on Security and Privacy 2021: 103-120 - [i19]Hyun Bin Lee, Tushar M. Jois, Christopher W. Fletcher, Carl A. Gunter:
DOVE: A Data-Oblivious Virtual Environment. CoRR abs/2102.05195 (2021) - [i18]George Gunter, Huichen Li, Avesta Hojjati, Matthew Nice, Matthew R. Bunting, Carl A. Gunter, Bo Li, Jonathan Sprinkle, Daniel B. Work:
Compromised ACC vehicles can degrade current mixed-autonomy traffic performance while remaining stealthy against detection. CoRR abs/2112.11986 (2021) - 2020
- [j40]Michael J. May
, Kevin D. Lux, Carl A. Gunter:
WSEmail. Serv. Oriented Comput. Appl. 14(1): 5-17 (2020) - [c121]Yunhui Long, Le Xu, Carl A. Gunter:
A Hypothesis Testing Approach to Sharing Logs with Confidence. CODASPY 2020: 307-318 - [c120]Yunhui Long, Lei Wang, Diyue Bu, Vincent Bindschaedler, XiaoFeng Wang, Haixu Tang, Carl A. Gunter, Kai Chen:
A Pragmatic Approach to Membership Inferences on Machine Learning Models. EuroS&P 2020: 521-534 - [c119]Qi Wang, Wajih Ul Hassan, Ding Li, Kangkook Jee, Xiao Yu, Kexuan Zou, Junghwan Rhee, Zhengzhang Chen, Wei Cheng, Carl A. Gunter, Haifeng Chen:
You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis. NDSS 2020 - [c118]Güliz Seray Tuncay, Jingyu Qian, Carl A. Gunter:
See No Evil: Phishing for Permissions with False Transparency. USENIX Security Symposium 2020: 415-432 - [i17]Wayne P. Burleson, Kevin Fu, Denise L. Anthony, Jorge Guajardo, Carl A. Gunter, Kyle Ingols, Jean-Baptiste Jeannin, Farinaz Koushanfar, Carl E. Landwehr, Susan Squires:
Grand Challenges for Embedded Security Research in a Connected World. CoRR abs/2005.06585 (2020) - [i16]Hsiao-Ying Huang, Soteris Demetriou, Rini Banerjee, Güliz Seray Tuncay, Carl A. Gunter, Masooda N. Bashir:
Smartphone Security Behavioral Scale: A New Psychometric Measurement for Smartphone Security. CoRR abs/2007.01721 (2020)
2010 – 2019
- 2019
- [c117]Qi Wang, Pubali Datta, Wei Yang, Si Liu, Adam Bates, Carl A. Gunter:
Charting the Attack Surface of Trigger-Action IoT Platforms. CCS 2019: 1439-1453 - [c116]Avesta Hojjati, Yunhui Long, Soteris Demetriou, Carl A. Gunter:
BEEER: distributed record and replay for medical devices in hospital operating rooms. HotSoS 2019: 1:1-1:10 - [i15]Yunhui Long, Suxin Lin, Zhuolin Yang, Carl A. Gunter, Bo Li:
Scalable Differentially Private Generative Student Model via PATE. CoRR abs/1906.09338 (2019) - [i14]Kevin D. Lux, Michael J. May, Carl A. Gunter:
WSEmail: A Retrospective on a System for Secure Internet Messaging Based on Web Services. CoRR abs/1908.02108 (2019) - [i13]Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, Bo Li:
Detecting AI Trojans Using Meta Neural Analysis. CoRR abs/1910.03137 (2019) - 2018
- [j39]Varun Badrinath Krishna
, Carl A. Gunter, William H. Sanders:
Evaluating Detectors on Optimal Attack Vectors That Enable Electricity Theft and DER Fraud. IEEE J. Sel. Top. Signal Process. 12(4): 790-805 (2018) - [c115]Karan Ganju, Qi Wang, Wei Yang, Carl A. Gunter, Nikita Borisov:
Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations. CCS 2018: 619-633 - [c114]Bo Chen, Klara Nahrstedt, Carl A. Gunter:
ReSPonSe: Real-time, Secure, and Privacy-aware Video Redaction System. MobiQuitous 2018: 39-48 - [c113]Güliz Seray Tuncay, Soteris Demetriou, Karan Ganju, Carl A. Gunter:
Resolving the Predicament of Android Custom Permissions. NDSS 2018 - [c112]Qi Wang, Wajih Ul Hassan, Adam Bates, Carl A. Gunter:
Fear and Logging in the Internet of Things. NDSS 2018 - [c111]Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, Carl A. Gunter:
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. USENIX Security Symposium 2018: 49-64 - [c110]Shubhra Kanti Karmaker Santu, Vincent Bindschaedler, ChengXiang Zhai, Carl A. Gunter:
NRF: A Naive Re-identification Framework. WPES@CCS 2018: 121-132 - [i12]Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, Carl A. Gunter:
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. CoRR abs/1801.08535 (2018) - [i11]Yunhui Long, Vincent Bindschaedler, Lei Wang, Diyue Bu, Xiaofeng Wang, Haixu Tang, Carl A. Gunter, Kai Chen:
Understanding Membership Inferences on Well-Generalized Learning Models. CoRR abs/1802.04889 (2018) - [i10]Yunhui Long, Tanmay Gangwani, Haris Mughees, Carl A. Gunter:
Distributed and Secure ML with Self-tallying Multi-party Aggregation. CoRR abs/1811.10296 (2018) - 2017
- [j38]Vincent Bindschaedler, Reza Shokri
, Carl A. Gunter:
Plausible Deniability for Privacy-Preserving Data Synthesis. Proc. VLDB Endow. 10(5): 481-492 (2017) - [c109]Wei Yang, Deguang Kong, Tao Xie, Carl A. Gunter:
Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps. ACSAC 2017: 288-302 - [c108]Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, Carl A. Gunter:
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX. CCS 2017: 2421-2434 - [c107]Rashid Tahir, Muhammad Huzaifa, Anupam Das, Mohammad Ahmad, Carl A. Gunter, Fareed Zaffar, Matthew Caesar, Nikita Borisov:
Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises. RAID 2017: 287-310 - [c106]Soteris Demetriou
, Nan Zhang, Yeonjoon Lee
, XiaoFeng Wang, Carl A. Gunter, Xiao-yong Zhou, Michael Grace:
HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps. WISEC 2017: 122-133 - [i9]Soteris Demetriou, Nan Zhang, Yeonjoon Lee, XiaoFeng Wang, Carl A. Gunter, Xiao-yong Zhou, Michael Grace:
Guardian of the HAN: Thwarting Mobile Attacks on Smart-Home Devices Using OS-level Situation Awareness. CoRR abs/1703.01537 (2017) - [i8]Nan Zhang, Soteris Demetriou, Xianghang Mi
, Wenrui Diao, Kan Yuan, Peiyuan Zong, Feng Qian, XiaoFeng Wang, Kai Chen, Yuan Tian, Carl A. Gunter, Kehuan Zhang, Patrick Tague, Yue-Hsun Lin:
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be. CoRR abs/1703.09809 (2017) - [i7]Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, Carl A. Gunter:
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX. CoRR abs/1705.07289 (2017) - [i6]Vincent Bindschaedler, Reza Shokri, Carl A. Gunter:
Plausible Deniability for Privacy-Preserving Data Synthesis. CoRR abs/1708.07975 (2017) - [i5]Yunhui Long, Vincent Bindschaedler, Carl A. Gunter:
Towards Measuring Membership Privacy. CoRR abs/1712.09136 (2017) - 2016
- [j37]David Kotz
, Carl A. Gunter, Santosh Kumar, Jonathan P. Weiner:
Privacy and Security in Mobile Health: A Research Agenda. Computer 49(6): 22-30 (2016) - [c105]Güliz Seray Tuncay, Soteris Demetriou
, Carl A. Gunter:
Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android. CCS 2016: 104-115 - [c104]Avesta Hojjati, Anku Adhikari, Katarina Struckmann, Edward Chou, Thi Ngoc Tho Nguyen, Kushagra Madan, Marianne Southall Winslett, Carl A. Gunter, William P. King
:
Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets. CCS 2016: 883-894 - [c103]Soteris Demetriou, Whitney Merrill, Wei Yang, Aston Zhang, Carl A. Gunter:
Free for All! Assessing User Data Exposure to Advertising Libraries on Android. NDSS 2016 - [c102]Aston Zhang, Amit Goyal, Ricardo Baeza-Yates
, Yi Chang, Jiawei Han, Carl A. Gunter, Hongbo Deng:
Towards Mobile Query Auto-Completion: An Efficient Mobile Application-Aware Approach. WWW 2016: 579-590 - 2015
- [j36]David Kotz
, Kevin Fu, Carl A. Gunter, Aviel D. Rubin:
Security for mobile and cloud frontiers in healthcare. Commun. ACM 58(8): 21-23 (2015) - [j35]Muhammad Naveed, Erman Ayday, Ellen Wright Clayton, Jacques Fellay
, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang:
Privacy in the Genomic Era. ACM Comput. Surv. 48(1): 6:1-6:44 (2015) - [j34]Charles P. Friedman, Joshua C. Rubin, Jeffrey S. Brown
, Melinda Buntin, Milton Corn, Lynn Etheredge, Carl A. Gunter, Mark A. Musen
, Richard Platt, William W. Stead
, Kevin Sullivan, Douglas Van Houweling:
Toward a science of learning systems: a research agenda for the high-functioning Learning Health System. J. Am. Medical Informatics Assoc. 22(1): 43-50 (2015) - [j33]You Chen, Joydeep Ghosh, Cosmin Adrian Bejan
, Carl A. Gunter, Siddharth Gupta, Abel N. Kho, David M. Liebovitz
, Jimeng Sun, Joshua C. Denny
, Bradley A. Malin:
Building bridges across electronic health record systems through inferred phenotypic topics. J. Biomed. Informatics 55: 82-93 (2015) - [c101]You Chen, Wei Xie, Carl A. Gunter, David M. Liebovitz, Sanjay Mehrotra, He Zhang, Bradley A. Malin:
Inferring Clinical Workflow Efficiency via Electronic Medical Record Utilization. AMIA 2015 - [c100]Xun Lu, Aston Zhang, Carl A. Gunter, Daniel Fabbri, David M. Liebovitz
, Bradley A. Malin:
Discovering de facto diagnosis specialties. BCB 2015: 7-16 - [c99]Michael LeMay, Carl A. Gunter:
Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware. Logic, Rewriting, and Concurrency 2015: 404-426 - [c98]Soteris Demetriou, Xiao-yong Zhou, Muhammad Naveed, Yeonjoon Lee, Kan Yuan, XiaoFeng Wang, Carl A. Gunter:
What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources. NDSS 2015 - [c97]Aston Zhang, Amit Goyal, Weize Kong, Hongbo Deng, Anlei Dong, Yi Chang, Carl A. Gunter, Jiawei Han:
adaQAC: Adaptive Query Auto-Completion via Implicit Negative Feedback. SIGIR 2015: 143-152 - [i4]Muhammad Naveed, Erman Ayday, Ellen Wright Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang:
Privacy in the Genomic Era. IACR Cryptol. ePrint Arch. 2015: 563 (2015) - 2014
- [c96]Dongjing He, Muhammad Naveed, Carl A. Gunter, Klara Nahrstedt:
Security Concerns in Android mHealth Apps. AMIA 2014 - [c95]Prateek Jindal
, Dan Roth, Carl A. Gunter:
Joint inference for end-to-end coreference resolution for clinical notes. BCB 2014: 192-201 - [c94]Prateek Jindal
, Carl A. Gunter, Dan Roth:
Detecting privacy-sensitive events in medical text. BCB 2014: 617-620 - [c93]Wen Zhang, You Chen, Thaddeus Cybulski, Daniel Fabbri, Carl A. Gunter, Patrick Lawlor, David M. Liebovitz
, Bradley A. Malin:
Decide Now or Decide Later?: Quantifying the Tradeoff between Prospective and Retrospective Access Decisions. CCS 2014: 1182-1192 - [c92]Muhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, XiaoFeng Wang, Erman Ayday, Jean-Pierre Hubaux, Carl A. Gunter:
Controlled Functional Encryption. CCS 2014: 1280-1291 - [c91]Se Eun Oh, Ji Young Chun, Limin Jia, Deepak Garg, Carl A. Gunter, Anupam Datta:
Privacy-preserving audit for broker-based health information exchange. CODASPY 2014: 313-320 - [c90]Aston Zhang, Xing Xie
, Kevin Chen-Chuan Chang, Carl A. Gunter, Jiawei Han, XiaoFeng Wang:
Privacy Risk in Anonymized Heterogeneous Information Networks. EDBT 2014: 595-606 - [c89]Muhammad Naveed, Xiao-yong Zhou, Soteris Demetriou, XiaoFeng Wang, Carl A. Gunter:
Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android. NDSS 2014 - [c88]Carl A. Gunter:
Detecting Roles and Anomalies in Hospital Access Audit Logs. SafeConfig 2014: 1 - [c87]Muhammad Naveed, Manoj Prabhakaran, Carl A. Gunter:
Dynamic Searchable Encryption via Blind Storage. IEEE Symposium on Security and Privacy 2014: 639-654 - [i3]Michael LeMay, Carl A. Gunter:
Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware. CoRR abs/1404.3465 (2014) - [i2]Muhammad Naveed, Erman Ayday, Ellen Wright Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang:
Privacy and Security in the Genomic Era. CoRR abs/1405.1891 (2014) - [i1]Muhammad Naveed, Manoj Prabhakaran, Carl A. Gunter:
Dynamic Searchable Encryption via Blind Storage. IACR Cryptol. ePrint Arch. 2014: 219 (2014) - 2013
- [j32]Denise L. Anthony, Andrew T. Campbell, Thomas Candon, Andrew Gettinger, David Kotz
, Lisa A. Marsch
, Andres Molina-Markham, Karen Page, Sean W. Smith, Carl A. Gunter, M. Eric Johnson:
Securing Information Technology in Healthcare. IEEE Secur. Priv. 11(6): 25-33 (2013) - [j31]He Zhang, Sanjay Mehrotra, David M. Liebovitz
, Carl A. Gunter, Bradley A. Malin:
Mining Deviations from Patient Care Pathways via Electronic Medical Record System Audits. ACM Trans. Manag. Inf. Syst. 4(4): 17:1-17:20 (2013) - [c86]Xiao-yong Zhou, Soteris Demetriou
, Dongjing He, Muhammad Naveed, Xiaorui Pan, XiaoFeng Wang, Carl A. Gunter, Klara Nahrstedt:
Identity, location, disease and more: inferring your secrets from android public resources. CCS 2013: 1017-1028 - [c85]Siddharth Gupta, Casey Hanson, Carl A. Gunter, Mario Frank, David M. Liebovitz
, Bradley A. Malin:
Modeling and detecting anomalous topic access. ISI 2013: 100-105 - [c84]Wen Zhang, You Chen, Carl A. Gunter, David M. Liebovitz
, Bradley A. Malin:
Evolving role definitions through permission invocation patterns. SACMAT 2013: 37-48 - [c83]Eric Duffy, Steve Nyemba, Carl A. Gunter, David M. Liebovitz, Bradley A. Malin:
Requirements and Design for an Extensible Toolkit for Analyzing EMR Audit Logs. HealthTech 2013 - 2012
- [j30]Sanjeev Khanna, Santosh S. Venkatesh, Omid Fatemieh, Fariba Khan, Carl A. Gunter:
Adaptive Selective Verification: An Efficient Adaptive Countermeasure to Thwart DoS Attacks. IEEE/ACM Trans. Netw. 20(3): 715-728 (2012) - [j29]Michael LeMay, Carl A. Gunter:
Cumulative Attestation Kernels for Embedded Systems. IEEE Trans. Smart Grid 3(2): 744-760 (2012) - [c82]Quanyan Zhu, Carl A. Gunter, Tamer Basar:
Tragedy of Anticommons in Digital Right Management of Medical Records. HealthSec 2012 - [e1]Carl A. Gunter, Zachary N. J. Peterson:
3rd USENIX Workshop on Health Security and Privacy, HealthSec'12, Bellevue, WA, USA, August 6-7, 2012. USENIX Association 2012 [contents] - 2011
- [j28]Carl A. Gunter, David M. Liebovitz
, Bradley A. Malin:
Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems. IEEE Secur. Priv. 9(5): 48-55 (2011) - [j27]Jianqing Zhang, Carl A. Gunter:
Application-aware secure multicast for power grid communications. Int. J. Secur. Networks 6(1): 40-52 (2011) - [j26]David C. Bergman, Dong (Kevin) Jin, Joshua Juen, Naoki Tanaka, Carl A. Gunter, Andrew K. Wright:
Nonintrusive Load-Shed Verification. IEEE Pervasive Comput. 10(1): 49-57 (2011) - [c81]Omid Fatemieh, Michael LeMay, Carl A. Gunter:
Reliable telemetry in white spaces using remote attestation. ACSAC 2011: 323-332 - [c80]Sonia Jahid, Carl A. Gunter, Imranul Hoque, Hamed Okhravi:
MyABDAC: compiling XACML policies for attribute-based database access control. CODASPY 2011: 97-108 - [c79]Jeff Green, Joshua Juen, Omid Fatemieh, Ravinder Shankesi, Dong (Kevin) Jin, Carl A. Gunter:
Reconstructing Hash Reversal based Proof of Work Schemes. LEET 2011 - [c78]Omid Fatemieh, Ali Farhadi, Ranveer Chandra, Carl A. Gunter:
Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks. NDSS 2011 - [c77]Md. Yusuf Sarwar Uddin
, Ahmed Khurshid, Hee Dong Jung, Carl A. Gunter, Matthew Caesar, Tarek F. Abdelzaher:
Making DTNs robust against spoofing attacks with localized countermeasures. SECON 2011: 332-340 - [c76]Michael LeMay, Carl A. Gunter:
Enforcing Executing-Implies-Verified with the Integrity-Aware Processor. TRUST 2011: 202-216 - [c75]Wen Zhang, Carl A. Gunter, David M. Liebovitz, Jian Tian:
Role Prediction Using Electronic Medical Record System Audits. HealthSec 2011 - 2010
- [j25]Rakeshbabu Bobba
, Omid Fatemieh, Fariba Khan, Arindam Khan, Carl A. Gunter, Himanshu Khurana, Manoj Prabhakaran:
Attribute-Based Messaging: Access Control and Confidentiality. ACM Trans. Inf. Syst. Secur. 13(4): 31:1-31:35 (2010) - [c74]Mohammad Maifi Hasan Khan, Hieu Khac Le, Michael LeMay, Paria Moinzadeh, Lili Wang, Yong Yang, Dong Kun Noh
, Tarek F. Abdelzaher, Carl A. Gunter, Jiawei Han, Xin Jin:
Diagnostic powertracing for sensor node failure analysis. IPSN 2010: 117-128 - [c73]Fariba Khan, Carl A. Gunter:
Tiered Incentives for Integrity Based Queuing. NetEcon 2010: 8:1-8:7 - [c72]Carl A. Gunter, David M. Liebovitz, Bradley A. Malin:
EBAM: Experience-Based Access Management for Healthcare. HealthSec 2010
2000 – 2009
- 2009
- [j24]Musab AlTurki
, José Meseguer, Carl A. Gunter:
Probabilistic Modeling and Analysis of DoS Protection for the ASV Protocol. Electron. Notes Theor. Comput. Sci. 234: 3-18 (2009) - [j23]Paul Anderson, Carl A. Gunter, Charles R. Kalmanek, Sanjai Narain, Jonathan M. Smith, Rajesh Talpade, Geoffrey G. Xie:
Guest editorial network infrastructure configuration. IEEE J. Sel. Areas Commun. 27(3): 249-252 (2009) - [c71]Lars E. Olson, Carl A. Gunter, William R. Cook, Marianne Winslett:
Implementing Reflective Access Control in SQL. DBSec 2009: 17-32 - [c70]Ravinder Shankesi, Musab AlTurki
, Ralf Sasse
, Carl A. Gunter, José Meseguer:
Model-Checking DoS Amplification for VoIP Session Initiation. ESORICS 2009: 390-405 - [c69]Michael LeMay, Carl A. Gunter:
Cumulative Attestation Kernels for Embedded Systems. ESORICS 2009: 655-670 - [c68]Elsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, Anh Nguyen:
Specifying and Analyzing Workflows for Automated Identification and Data Capture. HICSS 2009: 1-11 - [c67]Michael LeMay, Jason J. Haas, Carl A. Gunter:
Collaborative Recommender Systems for Building Automation. HICSS 2009: 1-10 - [c66]Michael J. May, Carl A. Gunter, Insup Lee, Steve Zdancewic:
Strong and Weak Policy Relations. POLICY 2009: 33-36 - [c65]Carl A. Gunter:
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers. POLICY 2009: 114-117 - [c64]Kazuhiro Minami, Nikita Borisov, Carl A. Gunter:
Safety in discretionary access control for logic-based publish-subscribe systems. SACMAT 2009: 3-12 - [c63]Alwyn Goodloe, Carl A. Gunter:
Completeness of discovery protocols. SafeConfig 2009: 29-36 - [c62]Wook Shin, Carl A. Gunter, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
How to Bootstrap Security for Ad-Hoc Network: Revisited. SEC 2009: 119-131 - [c61]Alejandro Gutierrez, Apeksha Godiyal, Matt Stockton, Michael LeMay, Carl A. Gunter, Roy H. Campbell:
Sh@re: Negotiated Audit in Social Networks. SMC 2009: 74-79 - 2008
- [c60]Ellick Chan, Carl A. Gunter, Sonia Jahid, Evgeni Peryshkin, Daniel Rebolledo:
Using rhythmic nonces for puzzle-based DoS resistance. CSAW 2008: 51-58 - [c59]Lars E. Olson, Carl A. Gunter, P. Madhusudan:
A formal framework for reflective database access control policies. CCS 2008: 289-298 - [c58]Rohit Chadha, Carl A. Gunter, José Meseguer, Ravinder Shankesi, Mahesh Viswanathan:
Modular Preservation of Safety Properties by Cookie-Based DoS-Protection Wrappers. FMOODS 2008: 39-58 - [c57]Michael LeMay, Rajesh Nelli, George Gross, Carl A. Gunter:
An Integrated Architecture for Demand Response Communications and Control. HICSS 2008: 174 - [c56]Sanjeev Khanna, Santosh S. Venkatesh, Omid Fatemieh, Fariba Khan, Carl A. Gunter:
Adaptive SelectiveVerification. INFOCOM 2008: 529-537 - 2007
- [j22]Ratul K. Guha, Carl A. Gunter, Saswati Sarkar:
Fair Coalitions for Power-Aware Routing in Wireless Networks. IEEE Trans. Mob. Comput. 6(2): 206-220 (2007) - [c55]Jodie P. Boyer, Ragib Hasan
, Lars E. Olson, Nikita Borisov, Carl A. Gunter, David Raila:
Improving multi-tier security using redundant authentication. CSAW 2007: 54-62 - [c54]Alwyn Goodloe, Carl A. Gunter:
Reasoning about Concurrency for Security Tunnels. CSF 2007: 64-78 - [c53]Michael LeMay, George Gross, Carl A. Gunter, Sanjam Garg:
Unified Architecture for Large-Scale Attested Metering. HICSS 2007: 115 - [c52]Michael LeMay, Carl A. Gunter:
Supporting Emergency-Response by Retasking Network Infrastructures. HotNets 2007 - [c51]Michael LeMay, Omid Fatemieh, Carl A. Gunter:
PolicyMorph: interactive policy transformations for a logical attribute-based access control framework. SACMAT 2007: 205-214 - [c50]Charles C. Zhang, Marianne Winslett, Carl A. Gunter:
On the Safety and Efficiency of Firewall Policy Deployment. IEEE Symposium on Security and Privacy 2007: 33-50 - 2006
- [c49]Rakeshbabu Bobba
, Omid Fatemieh, Fariba Khan, Carl A. Gunter, Himanshu Khurana:
Using Attribute-Based Access Control to Enable Attribute-Based Messaging. ACSAC 2006: 403-413 - [c48]Michael J. May, Wook Shin, Carl A. Gunter, Insup Lee:
Securing the drop-box architecture for assisted living. FMSE 2006: 1-12 - [c47]Adam J. Lee, Jodie P. Boyer, Lars E. Olson, Carl A. Gunter:
Defeasible security policy composition for web services. FMSE 2006: 45-54 - [c46]Girish Baliga, Scott R. Graham, Carl A. Gunter, Panganamala R. Kumar:
Reducing Risk by Managing Software Related Failures in Networked Control Systems. CDC 2006: 2866-2871 - [c45]Michael J. May, Carl A. Gunter, Insup Lee:
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies. CSFW 2006: 85-97 - [c44]Raja Afandi, Jianqing Zhang, Munawar Hafiz, Carl A. Gunter:
AMPol: Adaptive Messaging Policy. ECOWS 2006: 53-64 - [c43]Raja Afandi, Jianqing Zhang, Carl A. Gunter:
AMPol-Q: Adaptive Middleware Policy to Support QoS. ICSOC 2006: 165-178 - [c42]Qixin Wang, Wook Shin, Xue Liu, Zheng Zeng, Cham Oh, Bedoor K. AlShebli
, Marco Caccamo, Carl A. Gunter,