BibTeX records: Dilsun Kirli Kaynar

download as .bib file

@article{DBLP:journals/jcss/CanettiCKLLPS18,
  author    = {Ran Canetti and
               Ling Cheung and
               Dilsun Kirli Kaynar and
               Moses Liskov and
               Nancy A. Lynch and
               Olivier Pereira and
               Roberto Segala},
  title     = {Task-structured probabilistic {I/O} automata},
  journal   = {J. Comput. Syst. Sci.},
  volume    = {94},
  pages     = {63--97},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.jcss.2017.09.007},
  doi       = {10.1016/j.jcss.2017.09.007},
  timestamp = {Tue, 27 Mar 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jcss/CanettiCKLLPS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/MalliosBKMM15,
  author    = {Yannis Mallios and
               Lujo Bauer and
               Dilsun Kirli Kaynar and
               Fabio Martinelli and
               Charles Morisset},
  title     = {Probabilistic cost enforcement of security policies},
  journal   = {Journal of Computer Security},
  volume    = {23},
  number    = {6},
  pages     = {759--787},
  year      = {2015},
  url       = {https://doi.org/10.3233/JCS-150538},
  doi       = {10.3233/JCS-150538},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jcs/MalliosBKMM15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Datta0KSS15,
  author    = {Anupam Datta and
               Deepak Garg and
               Dilsun Kirli Kaynar and
               Divya Sharma and
               Arunesh Sinha},
  title     = {Program Actions as Actual Causes: {A} Building Block for Accountability},
  booktitle = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona,
               Italy, 13-17 July, 2015},
  pages     = {261--275},
  year      = {2015},
  crossref  = {DBLP:conf/csfw/2015},
  url       = {https://doi.org/10.1109/CSF.2015.25},
  doi       = {10.1109/CSF.2015.25},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/Datta0KSS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Datta0KSS15a,
  author    = {Anupam Datta and
               Deepak Garg and
               Dilsun Kirli Kaynar and
               Divya Sharma and
               Arunesh Sinha},
  title     = {Program Actions as Actual Causes: {A} Building Block for Accountability},
  journal   = {CoRR},
  volume    = {abs/1505.01131},
  year      = {2015},
  url       = {http://arxiv.org/abs/1505.01131},
  archivePrefix = {arXiv},
  eprint    = {1505.01131},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/Datta0KSS15a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/MalliosBKMM13,
  author    = {Yannis Mallios and
               Lujo Bauer and
               Dilsun Kirli Kaynar and
               Fabio Martinelli and
               Charles Morisset},
  title     = {Probabilistic Cost Enforcement of Security Policies},
  booktitle = {Security and Trust Management - 9th International Workshop, {STM}
               2013, Egham, UK, September 12-13, 2013. Proceedings},
  pages     = {144--159},
  year      = {2013},
  crossref  = {DBLP:conf/stm/2013},
  url       = {https://doi.org/10.1007/978-3-642-41098-7\_10},
  doi       = {10.1007/978-3-642-41098-7\_10},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/stm/MalliosBKMM13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/MalliosBKL12,
  author    = {Yannis Mallios and
               Lujo Bauer and
               Dilsun Kirli Kaynar and
               Jay Ligatti},
  title     = {Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors},
  booktitle = {Security and Trust Management - 8th International Workshop, {STM}
               2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  pages     = {17--32},
  year      = {2012},
  crossref  = {DBLP:conf/stm/2012},
  url       = {https://doi.org/10.1007/978-3-642-38004-4\_2},
  doi       = {10.1007/978-3-642-38004-4\_2},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/stm/MalliosBKL12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entcs/TschantzKD11,
  author    = {Michael Carl Tschantz and
               Dilsun Kirli Kaynar and
               Anupam Datta},
  title     = {Formal Verification of Differential Privacy for Interactive Systems
               (Extended Abstract)},
  journal   = {Electr. Notes Theor. Comput. Sci.},
  volume    = {276},
  pages     = {61--79},
  year      = {2011},
  url       = {https://doi.org/10.1016/j.entcs.2011.09.015},
  doi       = {10.1016/j.entcs.2011.09.015},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/entcs/TschantzKD11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/DattaFGJK11,
  author    = {Anupam Datta and
               Jason Franklin and
               Deepak Garg and
               Limin Jia and
               Dilsun Kirli Kaynar},
  title     = {On Adversary Models and Compositional Security},
  journal   = {{IEEE} Security {\&} Privacy},
  volume    = {9},
  number    = {3},
  pages     = {26--32},
  year      = {2011},
  url       = {https://doi.org/10.1109/MSP.2010.203},
  doi       = {10.1109/MSP.2010.203},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieeesp/DattaFGJK11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DattaBCDGJKS11,
  author    = {Anupam Datta and
               Jeremiah Blocki and
               Nicolas Christin and
               Henry DeYoung and
               Deepak Garg and
               Limin Jia and
               Dilsun Kirli Kaynar and
               Arunesh Sinha},
  title     = {Understanding and Protecting Privacy: Formal Semantics and Principled
               Audit Mechanisms},
  booktitle = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  pages     = {1--27},
  year      = {2011},
  crossref  = {DBLP:conf/iciss/2011},
  url       = {https://doi.org/10.1007/978-3-642-25560-1\_1},
  doi       = {10.1007/978-3-642-25560-1\_1},
  timestamp = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iciss/DattaBCDGJKS11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1101-2819,
  author    = {Michael Carl Tschantz and
               Dilsun Kirli Kaynar and
               Anupam Datta},
  title     = {Formal Verification of Differential Privacy for Interactive Systems},
  journal   = {CoRR},
  volume    = {abs/1101.2819},
  year      = {2011},
  url       = {http://arxiv.org/abs/1101.2819},
  archivePrefix = {arXiv},
  eprint    = {1101.2819},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1101-2819},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/synthesis/2010Kaynar,
  author    = {Dilsun Kirli Kaynar and
               Nancy A. Lynch and
               Roberto Segala and
               Frits W. Vaandrager},
  title     = {The Theory of Timed {I/O} Automata, Second Edition},
  series    = {Synthesis Lectures on Distributed Computing Theory},
  publisher = {Morgan {\&} Claypool Publishers},
  year      = {2010},
  url       = {https://doi.org/10.2200/S00310ED1V01Y201011DCT005},
  doi       = {10.2200/S00310ED1V01Y201011DCT005},
  timestamp = {Tue, 16 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/series/synthesis/2010Kaynar},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entcs/GargFKD10,
  author    = {Deepak Garg and
               Jason Franklin and
               Dilsun Kirli Kaynar and
               Anupam Datta},
  title     = {Compositional System Security with Interface-Confined Adversaries},
  journal   = {Electr. Notes Theor. Comput. Sci.},
  volume    = {265},
  pages     = {49--71},
  year      = {2010},
  url       = {https://doi.org/10.1016/j.entcs.2010.08.005},
  doi       = {10.1016/j.entcs.2010.08.005},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/entcs/GargFKD10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/DeYoungGJKD10,
  author    = {Henry DeYoung and
               Deepak Garg and
               Limin Jia and
               Dilsun Kirli Kaynar and
               Anupam Datta},
  title     = {Experiences in the logical specification of the {HIPAA} and {GLBA}
               privacy laws},
  booktitle = {Proceedings of the 2010 {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2010, Chicago, Illinois, USA, October 4, 2010},
  pages     = {73--82},
  year      = {2010},
  crossref  = {DBLP:conf/wpes/2010},
  url       = {https://doi.org/10.1145/1866919.1866930},
  doi       = {10.1145/1866919.1866930},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/DeYoungGJKD10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/DattaFGK09,
  author    = {Anupam Datta and
               Jason Franklin and
               Deepak Garg and
               Dilsun Kirli Kaynar},
  title     = {A Logic of Secure Systems and its Application to Trusted Computing},
  booktitle = {30th {IEEE} Symposium on Security and Privacy (S{\&}P 2009), 17-20
               May 2009, Oakland, California, {USA}},
  pages     = {221--236},
  year      = {2009},
  crossref  = {DBLP:conf/sp/2009},
  url       = {https://doi.org/10.1109/SP.2009.16},
  doi       = {10.1109/SP.2009.16},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/DattaFGK09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/deds/CanettiCKLLPS08,
  author    = {Ran Canetti and
               Ling Cheung and
               Dilsun Kirli Kaynar and
               Moses Liskov and
               Nancy A. Lynch and
               Olivier Pereira and
               Roberto Segala},
  title     = {Analyzing Security Protocols Using Time-Bounded Task-PIOAs},
  journal   = {Discrete Event Dynamic Systems},
  volume    = {18},
  number    = {1},
  pages     = {111--159},
  year      = {2008},
  url       = {https://doi.org/10.1007/s10626-007-0032-1},
  doi       = {10.1007/s10626-007-0032-1},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/deds/CanettiCKLLPS08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/concur/CanettiCKLP08,
  author    = {Ran Canetti and
               Ling Cheung and
               Dilsun Kirli Kaynar and
               Nancy A. Lynch and
               Olivier Pereira},
  title     = {Modeling Computational Security in Long-Lived Systems},
  booktitle = {{CONCUR} 2008 - Concurrency Theory, 19th International Conference,
               {CONCUR} 2008, Toronto, Canada, August 19-22, 2008. Proceedings},
  pages     = {114--130},
  year      = {2008},
  crossref  = {DBLP:conf/concur/2008},
  url       = {https://doi.org/10.1007/978-3-540-85361-9\_12},
  doi       = {10.1007/978-3-540-85361-9\_12},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/concur/CanettiCKLP08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/CanettiCKLP08,
  author    = {Ran Canetti and
               Ling Cheung and
               Dilsun Kirli Kaynar and
               Nancy A. Lynch and
               Olivier Pereira},
  title     = {Modeling Computational Security in Long-Lived Systems},
  booktitle = {Theoretical Foundations of Practical Information Security, 30.11.
               - 05.12.2008},
  year      = {2008},
  crossref  = {DBLP:conf/dagstuhl/2008P8491},
  url       = {http://drops.dagstuhl.de/opus/volltexte/2009/1890/},
  timestamp = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dagstuhl/CanettiCKLP08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiCKLP08,
  author    = {Ran Canetti and
               Ling Cheung and
               Dilsun Kirli Kaynar and
               Nancy A. Lynch and
               Olivier Pereira},
  title     = {Modeling Computational Security in Long-Lived Systems, Version 2},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {492},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/492},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CanettiCKLP08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CanettiCKLP07,
  author    = {Ran Canetti and
               Ling Cheung and
               Dilsun Kirli Kaynar and
               Nancy A. Lynch and
               Olivier Pereira},
  title     = {Compositional Security for Task-PIOAs},
  booktitle = {20th {IEEE} Computer Security Foundations Symposium, {CSF} 2007, 6-8
               July 2007, Venice, Italy},
  pages     = {125--139},
  year      = {2007},
  crossref  = {DBLP:conf/csfw/2007},
  url       = {https://doi.org/10.1109/CSF.2007.15},
  doi       = {10.1109/CSF.2007.15},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/CanettiCKLP07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiCKLP07,
  author    = {Ran Canetti and
               Ling Cheung and
               Dilsun Kirli Kaynar and
               Nancy A. Lynch and
               Olivier Pereira},
  title     = {Modeling Computational Security in Long-Lived Systems},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2007},
  pages     = {406},
  year      = {2007},
  url       = {http://eprint.iacr.org/2007/406},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CanettiCKLP07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/synthesis/2006Kaynar,
  author    = {Dilsun Kirli Kaynar and
               Nancy A. Lynch and
               Roberto Segala and
               Frits W. Vaandrager},
  title     = {The Theory of Timed {I/O} Automata},
  series    = {Synthesis Lectures on Computer Science},
  publisher = {Morgan {\&} Claypool Publishers},
  year      = {2006},
  url       = {https://doi.org/10.2200/S00006ED1V01Y200508CSL001},
  doi       = {10.2200/S00006ED1V01Y200508CSL001},
  timestamp = {Tue, 16 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/series/synthesis/2006Kaynar},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/CanettiCKLLPS06,
  author    = {Ran Canetti and
               Ling Cheung and
               Dilsun Kirli Kaynar and
               Moses Liskov and
               Nancy A. Lynch and
               Olivier Pereira and
               Roberto Segala},
  title     = {Time-Bounded Task-PIOAs: {A} Framework for Analyzing Security Protocols},
  booktitle = {Distributed Computing, 20th International Symposium, {DISC} 2006,
               Stockholm, Sweden, September 18-20, 2006, Proceedings},
  pages     = {238--253},
  year      = {2006},
  crossref  = {DBLP:conf/wdag/2006},
  url       = {https://doi.org/10.1007/11864219\_17},
  doi       = {10.1007/11864219\_17},
  timestamp = {Fri, 02 Jun 2017 13:01:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wdag/CanettiCKLLPS06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/formats/LimKLM05,
  author    = {Hongping Lim and
               Dilsun Kirli Kaynar and
               Nancy A. Lynch and
               Sayan Mitra},
  title     = {Translating Timed {I/O} Automata Specifications for Theorem Proving
               in {PVS}},
  booktitle = {Formal Modeling and Analysis of Timed Systems, Third International
               Conference, {FORMATS} 2005, Uppsala, Sweden, September 26-28, 2005,
               Proceedings},
  pages     = {17--31},
  year      = {2005},
  crossref  = {DBLP:conf/formats/2005},
  url       = {https://doi.org/10.1007/11603009\_3},
  doi       = {10.1007/11603009\_3},
  timestamp = {Fri, 02 Jun 2017 20:50:11 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/formats/LimKLM05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiCKLLPS05,
  author    = {Ran Canetti and
               Ling Cheung and
               Dilsun Kirli Kaynar and
               Moses Liskov and
               Nancy A. Lynch and
               Olivier Pereira and
               Roberto Segala},
  title     = {Using Probabilistic {I/O} Automata to Analyze an Oblivious Transfer
               Protocol},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2005},
  pages     = {452},
  year      = {2005},
  url       = {http://eprint.iacr.org/2005/452},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CanettiCKLLPS05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sttt/WinEGKL04,
  author    = {Toh Ne Win and
               Michael D. Ernst and
               Stephen J. Garland and
               Dilsun Kirli Kaynar and
               Nancy A. Lynch},
  title     = {Using simulated execution in verifying distributed algorithms},
  journal   = {{STTT}},
  volume    = {6},
  number    = {1},
  pages     = {67--76},
  year      = {2004},
  url       = {https://doi.org/10.1007/s10009-003-0126-5},
  doi       = {10.1007/s10009-003-0126-5},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/sttt/WinEGKL04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/formats/KaynarL04,
  author    = {Dilsun Kirli Kaynar and
               Nancy A. Lynch},
  title     = {Decomposing Verification of Timed {I/O} Automata},
  booktitle = {Formal Techniques, Modelling and Analysis of Timed and Fault-Tolerant
               Systems, Joint International Conferences on Formal Modelling and Analysis
               of Timed Systems, {FORMATS} 2004 and Formal Techniques in Real-Time
               and Fault-Tolerant Systems, {FTRTFT} 2004, Grenoble, France, September
               22-24, 2004, Proceedings},
  pages     = {84--101},
  year      = {2004},
  crossref  = {DBLP:conf/formats/2004},
  url       = {https://doi.org/10.1007/978-3-540-30206-3\_8},
  doi       = {10.1007/978-3-540-30206-3\_8},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/formats/KaynarL04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rtss/KaynarLSV03,
  author    = {Dilsun Kirli Kaynar and
               Nancy A. Lynch and
               Roberto Segala and
               Frits W. Vaandrager},
  title     = {Timed {I/O} Automata: {A} Mathematical Framework for Modeling and
               Analyzing Real-Time Systems},
  booktitle = {Proceedings of the 24th {IEEE} Real-Time Systems Symposium {(RTSS}
               2003), 3-5 December 2003, Cancun, Mexico},
  pages     = {166--177},
  year      = {2003},
  crossref  = {DBLP:conf/rtss/2003},
  url       = {https://doi.org/10.1109/REAL.2003.1253264},
  doi       = {10.1109/REAL.2003.1253264},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/rtss/KaynarLSV03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vmcai/WinEGKL03,
  author    = {Toh Ne Win and
               Michael D. Ernst and
               Stephen J. Garland and
               Dilsun Kirli Kaynar and
               Nancy A. Lynch},
  title     = {Using Simulated Execution in Verifying Distributed Algorithms},
  booktitle = {Verification, Model Checking, and Abstract Interpretation, 4th International
               Conference, {VMCAI} 2003, New York, NY, USA, January 9-11, 2002, Proceedings},
  pages     = {283--297},
  year      = {2003},
  crossref  = {DBLP:conf/vmcai/2003},
  url       = {https://doi.org/10.1007/3-540-36384-X\_23},
  doi       = {10.1007/3-540-36384-X\_23},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/vmcai/WinEGKL03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cl/Kirli02,
  author    = {Dilsun Kirli Kaynar},
  title     = {Distributed call-tracking for security},
  journal   = {Comput. Lang.},
  volume    = {28},
  number    = {1},
  pages     = {129--154},
  year      = {2002},
  url       = {https://doi.org/10.1016/S0096-0551(02)00010-3},
  doi       = {10.1016/S0096-0551(02)00010-3},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cl/Kirli02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/WaltonKG00,
  author    = {Chris Walton and
               Dilsun Kirli Kaynar and
               Stephen Gilmore},
  title     = {An abstract machine model of dynamic module replacement},
  journal   = {Future Generation Comp. Syst.},
  volume    = {16},
  number    = {7},
  pages     = {793--808},
  year      = {2000},
  url       = {https://doi.org/10.1016/S0167-739X(99)00091-6},
  doi       = {10.1016/S0167-739X(99)00091-6},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/fgcs/WaltonKG00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2015,
  editor    = {C{\'{e}}dric Fournet and
               Michael W. Hicks and
               Luca Vigan{\`{o}}},
  title     = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona,
               Italy, 13-17 July, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7243288},
  isbn      = {978-1-4673-7538-2},
  timestamp = {Mon, 22 Aug 2016 18:03:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stm/2013,
  editor    = {Rafael Accorsi and
               Silvio Ranise},
  title     = {Security and Trust Management - 9th International Workshop, {STM}
               2013, Egham, UK, September 12-13, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8203},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-41098-7},
  doi       = {10.1007/978-3-642-41098-7},
  isbn      = {978-3-642-41097-0},
  timestamp = {Wed, 24 May 2017 08:30:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/stm/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stm/2012,
  editor    = {Audun J{\o}sang and
               Pierangela Samarati and
               Marinella Petrocchi},
  title     = {Security and Trust Management - 8th International Workshop, {STM}
               2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7783},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-38004-4},
  doi       = {10.1007/978-3-642-38004-4},
  isbn      = {978-3-642-38003-7},
  timestamp = {Wed, 24 May 2017 08:30:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/stm/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2011,
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7093},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25560-1},
  doi       = {10.1007/978-3-642-25560-1},
  isbn      = {978-3-642-25559-5},
  timestamp = {Wed, 24 May 2017 08:28:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iciss/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2010,
  editor    = {Ehab Al{-}Shaer and
               Keith B. Frikken},
  title     = {Proceedings of the 2010 {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2010, Chicago, Illinois, USA, October 4, 2010},
  publisher = {{ACM}},
  year      = {2010},
  isbn      = {978-1-4503-0096-4},
  timestamp = {Fri, 04 Feb 2011 17:20:23 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2009,
  title     = {30th {IEEE} Symposium on Security and Privacy (S{\&}P 2009), 17-20
               May 2009, Oakland, California, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5207631},
  isbn      = {978-0-7695-3633-0},
  timestamp = {Thu, 08 Jan 2015 16:59:42 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/concur/2008,
  editor    = {Franck van Breugel and
               Marsha Chechik},
  title     = {{CONCUR} 2008 - Concurrency Theory, 19th International Conference,
               {CONCUR} 2008, Toronto, Canada, August 19-22, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5201},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-85361-9},
  doi       = {10.1007/978-3-540-85361-9},
  isbn      = {978-3-540-85360-2},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/concur/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2008P8491,
  editor    = {Ran Canetti and
               Shafi Goldwasser and
               G{\"{u}}nter M{\"{u}}ller and
               Rainer Steinwandt},
  title     = {Theoretical Foundations of Practical Information Security, 30.11.
               - 05.12.2008},
  series    = {Dagstuhl Seminar Proceedings},
  volume    = {08491},
  publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year      = {2008},
  url       = {http://drops.dagstuhl.de/portals/08491/},
  timestamp = {Wed, 08 Apr 2015 11:56:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dagstuhl/2008P8491},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2007,
  title     = {20th {IEEE} Computer Security Foundations Symposium, {CSF} 2007, 6-8
               July 2007, Venice, Italy},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4271630},
  isbn      = {0-7695-2819-8},
  timestamp = {Fri, 13 May 2016 11:48:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wdag/2006,
  editor    = {Shlomi Dolev},
  title     = {Distributed Computing, 20th International Symposium, {DISC} 2006,
               Stockholm, Sweden, September 18-20, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4167},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11864219},
  doi       = {10.1007/11864219},
  isbn      = {3-540-44624-9},
  timestamp = {Fri, 02 Jun 2017 13:01:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wdag/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/formats/2005,
  editor    = {Paul Pettersson and
               Wang Yi},
  title     = {Formal Modeling and Analysis of Timed Systems, Third International
               Conference, {FORMATS} 2005, Uppsala, Sweden, September 26-28, 2005,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3829},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11603009},
  doi       = {10.1007/11603009},
  isbn      = {3-540-30946-2},
  timestamp = {Fri, 02 Jun 2017 20:50:11 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/formats/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/formats/2004,
  editor    = {Yassine Lakhnech and
               Sergio Yovine},
  title     = {Formal Techniques, Modelling and Analysis of Timed and Fault-Tolerant
               Systems, Joint International Conferences on Formal Modelling and Analysis
               of Timed Systems, {FORMATS} 2004 and Formal Techniques in Real-Time
               and Fault-Tolerant Systems, {FTRTFT} 2004, Grenoble, France, September
               22-24, 2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3253},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b100824},
  doi       = {10.1007/b100824},
  isbn      = {3-540-23167-6},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/formats/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/rtss/2003,
  title     = {Proceedings of the 24th {IEEE} Real-Time Systems Symposium {(RTSS}
               2003), 3-5 December 2003, Cancun, Mexico},
  publisher = {{IEEE} Computer Society},
  year      = {2003},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8877},
  isbn      = {0-7695-2044-8},
  timestamp = {Tue, 20 Jan 2015 18:18:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/rtss/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vmcai/2003,
  editor    = {Lenore D. Zuck and
               Paul C. Attie and
               Agostino Cortesi and
               Supratik Mukhopadhyay},
  title     = {Verification, Model Checking, and Abstract Interpretation, 4th International
               Conference, {VMCAI} 2003, New York, NY, USA, January 9-11, 2002, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2575},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/3-540-36384-X},
  doi       = {10.1007/3-540-36384-X},
  isbn      = {3-540-00348-7},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/vmcai/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI, founded at University of Trier