Fatih Turkmen
TitleCited byYear
Performance evaluation of XACML PDP implementations
F Turkmen, B Crispo
Proceedings of the 2008 ACM workshop on Secure web services, 37-44, 2008
Analysis of XACML policies with SMT
F Turkmen, J den Hartog, S Ranise, N Zannone
International Conference on Principles of Security and Trust, 115-134, 2015
Formal analysis of XACML policies using SMT
F Turkmen, J den Hartog, S Ranise, N Zannone
Computers & Security 66, 185-203, 2017
Towards run-time verification in access control
F Turkmen, E Jung, B Crispo
2011 IEEE International Symposium on Policies for Distributed Systems and …, 2011
Anomaly analysis for physical access control security configuration
WM Fitzgerald, F Turkmen, SN Foley, B O'Sullivan
2012 7th International Conference on Risks and Security of Internet and …, 2012
Efficient run-time solving of RBAC user authorization queries: pushing the envelope
A Armando, S Ranise, F Turkmen, B Crispo
Proceedings of the second ACM conference on Data and Application Security …, 2012
Defining intercloud security framework and architecture components for multi-cloud data intensive applications
Y Demchenko, F Turkmen, C de Laat, M Slawik
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud …, 2017
Big Data Analytics for Sensor-Network Collected Intelligence
HH Hsu, CY Chang, CH Hsu
Morgan Kaufmann, 2017
Towards ABAC policy mining from logs with deep learning
D Mocanu, F Turkmen, A Liotta
proc. of the 18th International Multiconference, IS2015, 124-128, 2015
Cloud based big data infrastructure: Architectural components and automated provisioning
Y Demchenko, F Turkmen, C de Laat, C Blanchet, C Loomis
2016 International Conference on High Performance Computing & Simulation …, 2016
Karınca Kolonisi Optimizasyonu
YPBS2002–Yüksek Performanslı Bilişim Sempozyumu, Kocaeli, Ekim, 2002
CYCLONE: The Multi-Cloud Middleware Stack for Application Deployment and Management
M Slawik, C Blanchet, Y Demchenko, F Turkmen, A Ilyushkin, C de Laat, ...
2017 IEEE International Conference on Cloud Computing Technology and Science …, 2017
On the use of SMT solving for XACML policy evaluation
F Turkmen, Y Demchenko
2016 IEEE International Conference on Cloud Computing Technology and Science …, 2016
Explanations and relaxations for policy conflicts in physical access control
F Turkmen, S Foley, B O'Sullivan, W Fitzgerald, T Hadzic, S Basagiannis, ...
2013 IEEE 25th International Conference on Tools with Artificial …, 2013
P-CDN: Extending access control capabilities of P2P systems to provide CDN services
F Turkmen, P Mazzoleni, B Crispo, E Bertino
2008 IEEE Symposium on Computers and Communications, 480-486, 2008
Choosing between remote i/o versus staging in large scale distributed applications
I Suslu, F Turkmen, M Balman, T Kosar
Proceedings of ISCA 21st Int. Conference on Parallel and Distributed …, 2008
Reasoning about relation based access control
A Artale, B Crispo, F Giunchiglia, F Turkmen, R Zhang
2010 Fourth International Conference on Network and System Security, 231-238, 2010
iGenoPri: Privacy-preserving genomic data processing with integrity and correctness proofs
F Turkmen, MR Asghar, Y Demchenko
2016 14th Annual Conference on Privacy, Security and Trust (PST), 407-410, 2016
An Economical Security Architecture for Multi-cloud Application Deployments in Federated Environments
M Slawik, BI Zilci, A Küpper, Y Demchenko, F Turkmen, C Blanchet, ...
International Conference on the Economics of Grids, Clouds, Systems, and …, 2016
Exploring Dynamic Constraint Enforcement and Efficiency in Access Control.
F Turkmen
University of Trento, Italy, 2012
The system can't perform the operation now. Try again later.
Articles 1–20