Dilsun Kirli Kaynar

Orcid: 0000-0003-1421-087X

Affiliations:
  • Carnegie Mellon University, Pittsburgh, USA


According to our database1, Dilsun Kirli Kaynar authored at least 25 papers between 2000 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2018
Task-structured probabilistic I/O automata.
J. Comput. Syst. Sci., 2018

2015
Probabilistic cost enforcement of security policies.
J. Comput. Secur., 2015

Program Actions as Actual Causes: A Building Block for Accountability.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

2012
Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012

2011
On Adversary Models and Compositional Security.
IEEE Secur. Priv., 2011

Formal Verification of Differential Privacy for Interactive Systems (Extended Abstract).
Proceedings of the Twenty-seventh Conference on the Mathematical Foundations of Programming Semantics, 2011

Formal Verification of Differential Privacy for Interactive Systems
CoRR, 2011

Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms.
Proceedings of the Information Systems Security - 7th International Conference, 2011

2010
The Theory of Timed I/O Automata, Second Edition
Synthesis Lectures on Distributed Computing Theory, Morgan & Claypool Publishers, ISBN: 978-3-031-02003-2, 2010

Compositional System Security with Interface-Confined Adversaries.
Proceedings of the 26th Conference on the Mathematical Foundations of Programming Semantics, 2010

Experiences in the logical specification of the HIPAA and GLBA privacy laws.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

2009
A Logic of Secure Systems and its Application to Trusted Computing.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

2008
Modeling Computational Security in Long-Lived Systems, Version 2.
IACR Cryptol. ePrint Arch., 2008

Analyzing Security Protocols Using Time-Bounded Task-PIOAs.
Discret. Event Dyn. Syst., 2008

2007
Modeling Computational Security in Long-Lived Systems.
IACR Cryptol. ePrint Arch., 2007

Compositional Security for Task-PIOAs.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

2006
The Theory of Timed I/O Automata
Synthesis Lectures on Computer Science, Morgan & Claypool Publishers, 2006

Time-Bounded Task-PIOAs: A Framework for Analyzing Security Protocols.
Proceedings of the Distributed Computing, 20th International Symposium, 2006

2005
Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol.
IACR Cryptol. ePrint Arch., 2005

Translating Timed I/O Automata Specifications for Theorem Proving in PVS.
Proceedings of the Formal Modeling and Analysis of Timed Systems, 2005

2004
Using simulated execution in verifying distributed algorithms.
Int. J. Softw. Tools Technol. Transf., 2004

Decomposing Verification of Timed I/O Automata.
Proceedings of the Formal Techniques, 2004

2003
Timed I/O Automata: A Mathematical Framework for Modeling and Analyzing Real-Time Systems.
Proceedings of the 24th IEEE Real-Time Systems Symposium (RTSS 2003), 2003

2002
Distributed call-tracking for security.
Comput. Lang. Syst. Struct., 2002

2000
An abstract machine model of dynamic module replacement.
Future Gener. Comput. Syst., 2000


  Loading...