Dilsun Kirli Kaynar

According to our database1, Dilsun Kirli Kaynar
  • authored at least 30 papers between 2000 and 2018.
  • has a "Dijkstra number"2 of three.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Task-structured probabilistic I/O automata.
J. Comput. Syst. Sci., 2018

2015
Probabilistic cost enforcement of security policies.
Journal of Computer Security, 2015

Program Actions as Actual Causes: A Building Block for Accountability.
CoRR, 2015

Program Actions as Actual Causes: A Building Block for Accountability.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

2013
Probabilistic Cost Enforcement of Security Policies.
Proceedings of the Security and Trust Management - 9th International Workshop, 2013

2012
Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012

2011
On Adversary Models and Compositional Security.
IEEE Security & Privacy, 2011

Formal Verification of Differential Privacy for Interactive Systems (Extended Abstract).
Electr. Notes Theor. Comput. Sci., 2011

Formal Verification of Differential Privacy for Interactive Systems
CoRR, 2011

Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms.
Proceedings of the Information Systems Security - 7th International Conference, 2011

2010
The Theory of Timed I/O Automata, Second Edition
Synthesis Lectures on Distributed Computing Theory, Morgan & Claypool Publishers, 2010

Compositional System Security with Interface-Confined Adversaries.
Electr. Notes Theor. Comput. Sci., 2010

Experiences in the logical specification of the HIPAA and GLBA privacy laws.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

2009
A Logic of Secure Systems and its Application to Trusted Computing.
Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 2009

2008
Modeling Computational Security in Long-Lived Systems, Version 2.
IACR Cryptology ePrint Archive, 2008

Analyzing Security Protocols Using Time-Bounded Task-PIOAs.
Discrete Event Dynamic Systems, 2008

Modeling Computational Security in Long-Lived Systems.
Proceedings of the Theoretical Foundations of Practical Information Security, 30.11., 2008

Modeling Computational Security in Long-Lived Systems.
Proceedings of the CONCUR 2008 - Concurrency Theory, 19th International Conference, 2008

2007
Modeling Computational Security in Long-Lived Systems.
IACR Cryptology ePrint Archive, 2007

Compositional Security for Task-PIOAs.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

2006
The Theory of Timed I/O Automata
Synthesis Lectures on Computer Science, Morgan & Claypool Publishers, 2006

Time-Bounded Task-PIOAs: A Framework for Analyzing Security Protocols.
Proceedings of the Distributed Computing, 20th International Symposium, 2006

2005
Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol.
IACR Cryptology ePrint Archive, 2005

Translating Timed I/O Automata Specifications for Theorem Proving in PVS.
Proceedings of the Formal Modeling and Analysis of Timed Systems, 2005

2004
Using simulated execution in verifying distributed algorithms.
STTT, 2004

Decomposing Verification of Timed I/O Automata.
Proceedings of the Formal Techniques, 2004

2003
Using Simulated Execution in Verifying Distributed Algorithms.
Proceedings of the Verification, 2003

Timed I/O Automata: A Mathematical Framework for Modeling and Analyzing Real-Time Systems.
Proceedings of the 24th IEEE Real-Time Systems Symposium (RTSS 2003), 2003

2002
Distributed call-tracking for security.
Comput. Lang., 2002

2000
An abstract machine model of dynamic module replacement.
Future Generation Comp. Syst., 2000


  Loading...