The theory of timed I/O automata DK Kaynar Morgan & Claypool Publishers, 2011 | 317 | 2011 |
Timed I/O automata: A mathematical framework for modeling and analyzing real-time systems DK Kaynar, N Lynch, R Segala, F Vaandrager RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003, 166-177, 2003 | 174 | 2003 |
A logic of secure systems and its application to trusted computing A Datta, J Franklin, D Garg, D Kaynar 2009 30th IEEE Symposium on Security and Privacy, 221-236, 2009 | 133 | 2009 |
Experiences in the logical specification of the HIPAA and GLBA privacy laws H DeYoung, D Garg, L Jia, D Kaynar, A Datta Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic …, 2010 | 129 | 2010 |
A formal model for a system’s attack surface PK Manadhata, JM Wing Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, 1-28, 2011 | 117 | 2011 |
The theory of timed I D Kaynar, N Lynch, R Segala, F Vaandrager O automata. Technical Report MIT/LCS/TR-917a, MIT Laboratory for Computer …, 2004 | 81 | 2004 |
Time-bounded task-PIOAs: A framework for analyzing security protocols R Canetti, L Cheung, D Kaynar, M Liskov, N Lynch, O Pereira, R Segala International Symposium on Distributed Computing, 238-253, 2006 | 68 | 2006 |
Dynamic ML without dynamic types S Gilmore, D Kirli, CD Walton University of Edinburgh, 1997 | 65 | 1997 |
Formal verification of differential privacy for interactive systems MC Tschantz, D Kaynar, A Datta Electronic Notes in Theoretical Computer Science 276, 61-79, 2011 | 64 | 2011 |
Task-structured probabilistic I/O automata R Canetti, L Cheung, D Kaynar, M Liskov, N Lynch, O Pereira, R Segala 2006 8th International Workshop on Discrete Event Systems, 207-214, 2006 | 59 | 2006 |
Understanding and protecting privacy: Formal semantics and principled audit mechanisms A Datta, J Blocki, N Christin, H DeYoung, D Garg, L Jia, D Kaynar, ... International Conference on Information Systems Security, 1-27, 2011 | 51 | 2011 |
Compositional system security with interface-confined adversaries D Garg, J Franklin, D Kaynar, A Datta Electronic Notes in Theoretical Computer Science 265, 49-71, 2010 | 39 | 2010 |
Program actions as actual causes: A building block for accountability A Datta, D Garg, D Kaynar, D Sharma, A Sinha 2015 IEEE 28th Computer Security Foundations Symposium, 261-275, 2015 | 38 | 2015 |
Analyzing security protocols using time-bounded task-PIOAs R Canetti, L Cheung, D Kaynar, M Liskov, N Lynch, O Pereira, R Segala Discrete Event Dynamic Systems 18 (1), 111-159, 2008 | 38 | 2008 |
On adversary models and compositional security A Datta, J Franklin, D Garg, L Jia, D Kaynar IEEE Security & Privacy 9 (3), 26-32, 2010 | 32 | 2010 |
Translating timed I/O automata specifications for theorem proving in PVS H Lim, D Kaynar, N Lynch, S Mitra International Conference on Formal Modeling and Analysis of Timed Systems, 17-31, 2005 | 32 | 2005 |
Using simulated execution in verifying distributed algorithms TN Win, MD Ernst, SJ Garland, D Kırlı, NA Lynch International journal on software tools for technology transfer 6, 67-76, 2004 | 30 | 2004 |
Using probabilistic I/O automata to analyze an oblivious transfer protocol R Canetti, L Cheung, D Kaynar, M Liskov, N Lynch, R Segala | 27 | 2005 |
Compositional security for task-pioas R Canetti, L Cheung, D Kaynar, N Lynch, O Pereira 20th IEEE Computer Security Foundations Symposium (CSF'07), 125-139, 2007 | 20 | 2007 |
Task-structured probabilistic I/O automata R Canetti, L Cheung, D Kaynar, M Liskov, N Lynch, O Pereira, R Segala Journal of Computer and System Sciences 94, 63-97, 2018 | 18 | 2018 |