Fatih Turkmen
Cited by
Cited by
Performance evaluation of XACML PDP implementations
F Turkmen, B Crispo
Proceedings of the 2008 ACM workshop on Secure web services, 37-44, 2008
Analysis of XACML policies with SMT
F Turkmen, J Den Hartog, S Ranise, N Zannone
Principles of Security and Trust: 4th International Conference, POST 2015 …, 2015
Continuous security testing: A case study on integrating dynamic security testing tools in ci/cd pipelines
T Rangnau, R Buijtenen, F Fransen, F Turkmen
2020 IEEE 24th International Enterprise Distributed Object Computing …, 2020
Big data analytics for sensor-network collected intelligence
HH Hsu, CY Chang, CH Hsu
Morgan Kaufmann, 2017
Towards ABAC policy mining from logs with deep learning
D Mocanu, F Turkmen, A Liotta
The 18th International Multiconference, IS2015, Intelligent Systems …, 2015
Formal analysis of XACML policies using SMT
F Turkmen, J den Hartog, S Ranise, N Zannone
Computers & Security 66, 185-203, 2017
Karınca Kolonisi Optimizasyonu
YPBS2002–Yüksek Performanslı Bilişim Sempozyumu, Kocaeli, Ekim, 2002
Defining intercloud security framework and architecture components for multi-cloud data intensive applications
Y Demchenko, F Turkmen, M Slawik, C De Laat
2017 17th IEEE/ACM international symposium on cluster, cloud and grid …, 2017
Anomaly analysis for physical access control security configuration
WM Fitzgerald, F Turkmen, SN Foley, B O'Sullivan
2012 7th International Conference on Risks and Security of Internet and …, 2012
Blockchain for genomics: a systematic literature review
M Alghazwi, F Turkmen, J Van Der Velde, D Karastoyanova
Distributed Ledger Technologies: Research and Practice 1 (2), 1-28, 2022
Cloud based big data infrastructure: Architectural components and automated provisioning
Y Demchenko, F Turkmen, C De Laat, C Blanchet, C Loomis
2016 International Conference on High Performance Computing & Simulation …, 2016
Cyclone: The multi-cloud middleware stack for application deployment and management
M Slawik, C Blanchet, Y Demchenko, F Turkmen, A Ilyushkin, C De Laat, ...
2017 IEEE International Conference on Cloud Computing Technology and Science …, 2017
Efficient run-time solving of RBAC user authorization queries: pushing the envelope
A Armando, S Ranise, F Turkmen, B Crispo
Proceedings of the second ACM conference on Data and Application Security …, 2012
Security and privacy concerns in cloud-based scientific and business workflows: A systematic review
N Soveizi, F Turkmen, D Karastoyanova
Future Generation Computer Systems, 2023
Privacy-preserving logistic regression with secret sharing
AR Ghavamipour, F Turkmen, X Jiang
BMC medical informatics and decision making 22 (1), 89, 2022
Towards run-time verification in access control
F Turkmen, E Jung, B Crispo
2011 IEEE International Symposium on Policies for Distributed Systems and …, 2011
On the use of SMT solving for XACML policy evaluation
F Turkmen, Y Demchenko
2016 IEEE International Conference on Cloud Computing Technology and Science …, 2016
Explanations and relaxations for policy conflicts in physical access control
F Turkmen, S Foley, B O'Sullivan, W Fitzgerald, T Hadzic, S Basagiannis, ...
2013 IEEE 25th International Conference on Tools with Artificial …, 2013
Using confidential data for domain adaptation of neural machine translation
S Kim
Federated Synthetic Data Generation with Stronger Security Guarantees
AR Ghavamipour, F Turkmen, R Wang, K Liang
Proceedings of the 28th ACM Symposium on Access Control Models and …, 2023
The system can't perform the operation now. Try again later.
Articles 1–20