Journal Article Task-structured probabilistic I/O automata 2018 • Journal of Computer and System Sciences • 94:63-97 Canetti R, Cheung L, Kaynar D, Liskov M, Lynch N, Pereira O, Segala R
Journal Article Probabilistic cost enforcement of security policies 2015 • Journal of Computer Security • 23(6):759-787 Mallios Y, Bauer L, Kaynar D, Martinelli F, Morisset C
Conference Program Actions as Actual Causes: A Building Block for Accountability 2015 • Proceedings of the Computer Security Foundations Workshop • 261-275 Datta A, Garg D, Kaynar D, Sharma D, Sinha A
Conference Enforcing more with less: Formalizing target-aware run-time monitors 2013 • Lecture Notes in Computer Science • 7783 LNCS:17-32 Mallios Y, Bauer L, Kaynar D, Ligatti J
Conference Probabilistic Cost Enforcement of Security Policies 2013 • Lecture Notes in Computer Science • 8203:144-159 Mallios Y, Bauer L, Kaynar D, Martinelli F, Morisset C
Chapter Conclusions and Future Work 2012 • Synthesis Lectures on Computer Science • 91-92 Kaynar DK, Lynch N, Segala R, Vaandrager F
Chapter Describing Timed System Behavior 2012 • Synthesis Lectures on Computer Science • 11-18 Kaynar DK, Lynch N, Segala R, Vaandrager F
Chapter Introduction 2012 • Synthesis Lectures on Computer Science • 1-6 Kaynar DK, Lynch N, Segala R, Vaandrager F
Chapter Mathematical Preliminaries 2012 • Synthesis Lectures on Computer Science • 7-9 Kaynar DK, Lynch N, Segala R, Vaandrager F
Chapter Operations on Timed Automata 2012 • Synthesis Lectures on Computer Science • 53-72 Kaynar DK, Lynch N, Segala R, Vaandrager F
Chapter Operations on Timed I/O Automata 2012 • Synthesis Lectures on Computer Science • 79-90 Kaynar DK, Lynch N, Segala R, Vaandrager F
Chapter Timed Automata 2012 • Synthesis Lectures on Computer Science • 19-51 Kaynar DK, Lynch N, Segala R, Vaandrager F
Chapter Timed I/O Automata 2012 • Synthesis Lectures on Computer Science • 73-78 Kaynar DK, Lynch N, Segala R, Vaandrager F
Conference Formal Verification of Differential Privacy for Interactive Systems 2011 • Electronic Notes in Theoretical Computer Science • 276:61-79 Tschantz MC, Kaynar D, Datta A
Journal Article On Adversary Models and Compositional Security 2011 • IEEE Security and Privacy • 9(3):26-32 Datta A, Franklin J, Garg D, Jia L, Kaynar D
Conference Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms 2011 • Lecture Notes in Computer Science • 7093:1-+ Datta A, Blocki J, Christin N, DeYoung H, Garg D, Jia L, Kaynar D, Sinha A
Conference Compositional System Security with Interface-Confined Adversaries 2010 • Electronic Notes in Theoretical Computer Science • 265:49-71 Garg D, Franklin J, Kaynar D, Datta A
Conference Experiences in the logical specification of the HIPAA and GLBA privacy laws 2010 • Proceedings of the ACM Conference on Computer and Communications Security • 73-82 DeYoung H, Garg D, Jia L, Kaynar D, Datta A
Conference A logic of secure systems and its application to trusted computing 2009 • IEEE Symposium on Security and Privacy: Proceedings • 221-236 Datta A, Franklin J, Garg D, Kaynar D
Journal Article Analyzing security protocols using time-bounded task-PIOAs 2008 • Discrete Event Dynamic Systems: Theory and Applications • 18(1):111-159 Canetti R, Cheung L, Kaynar D, Liskov M, Lynch N, Pereira O, Segala R
Conference Modeling computational security in long-lived systems 2008 • Lecture Notes in Computer Science • 5201 LNCS:114-130 Canetti R, Cheung L, Kaynar D, Lynch N, Pereira O
Conference Compositional security for task-PIOAs 2007 • Proceedings - IEEE Computer Security Foundations Symposium • 125-139 Canetti R, Cheung L, Kaynar D, Lynch N, Pereira O
Conference Task-structured probabilistic I/O automata 2006 • Proceedings - Eighth International Workshop on Discrete Event Systems, WODES 2006 • 207-214 Canetti R, Cheung L, Kaynar D, Liskov M, Lynch N, Pereira O, Segala R
Journal Article The theory of timed I/O automata 2006 • Synthesis Lectures on Computer Science • 1:1-114 Kaynar DK, Lynch N, Segala R, Vaandrager F
Conference Time-bounded task-PIQAs: A framework for analyzing security protocols 2006 • Lecture Notes in Computer Science • 4167 LNCS:238-253 Canetti R, Cheung L, Kaynar D, Liskov M, Lynch N, Pereira O, Segala R