Fatih Turkmen

Orcid: 0000-0002-6262-4869

According to our database1, Fatih Turkmen authored at least 41 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Efficient Verifiable Differential Privacy with Input Authenticity in the Local and Shuffle Model.
IACR Cryptol. ePrint Arch., 2024

Collaborative CP-NIZKs: Modular, Composable Proofs for Distributed Secrets.
IACR Cryptol. ePrint Arch., 2024

Undesirable Memorization in Large Language Models: A Survey.
CoRR, 2024

Fuzzing Frameworks for Server-side Web Applications: A Survey.
CoRR, 2024

Privacy-Preserving, Dropout-Resilient Aggregation in Decentralized Learning.
CoRR, 2024

Privacy-Preserving Aggregation for Decentralized Learning with Byzantine-Robustness.
CoRR, 2024

VPAS: Publicly Verifiable and Privacy-Preserving Aggregate Statistics on Distributed Datasets.
CoRR, 2024

2023
Security and privacy concerns in cloud-based scientific and business workflows: A systematic review.
Future Gener. Comput. Syst., November, 2023

Verifiable Privacy-Preserving Computing.
CoRR, 2023

Federated Synthetic Data Generation with Stronger Security Guarantees.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

Continuous Fuzzing: A Study of the Effectiveness and Scalability of Fuzzing in CI/CD Pipelines.
Proceedings of the IEEE/ACM International Workshop on Search-Based and Fuzz Testing, 2023

SecFlow: Adaptive Security-Aware Workflow Management System in Multi-cloud Environments.
Proceedings of the Enterprise Design, Operations, and Computing. EDOC 2023 Workshops, 2023

2022
Private computation of polynomials over networks.
Syst. Control. Lett., 2022

Privacy-preserving logistic regression with secret sharing.
BMC Medical Informatics Decis. Mak., 2022

Blockchain for Genomics: A Systematic Literature Review.
Distributed Ledger Technol. Res. Pract., 2022

Effectiveness and Scalability of Fuzzing Techniques in CI/CD Pipelines.
CoRR, 2022

Poster: Privacy-preserving Genome Analysis using Verifiable Off-Chain Computation.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Privacy-preserving Logistic Regression with Secret Sharing.
CoRR, 2021

KotlinDetector: Towards Understanding the Implications of Using Kotlin in Android Applications.
Proceedings of the 8th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2021

2020
AQUA: An Efficient Solver for the User Authorization Query Problem.
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020

Benchmarking UAQ Solvers.
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020

Continuous Security Testing: A Case Study on Integrating Dynamic Security Testing Tools in CI/CD Pipelines.
Proceedings of the 24th IEEE International Enterprise Distributed Object Computing Conference, 2020

2017
Formal analysis of XACML policies using SMT.
Comput. Secur., 2017

CYCLONE: The Multi-cloud Middleware Stack for Application Deployment and Management.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2017

Defining Intercloud Security Framework and Architecture Components for Multi-Cloud Data Intensive Applications.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

2016
iGenoPri: Privacy-preserving genomic data processing with integrity and correctness proofs.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Cloud based big data infrastructure: Architectural components and automated provisioning.
Proceedings of the International Conference on High Performance Computing & Simulation, 2016

An Economical Security Architecture for Multi-cloud Application Deployments in Federated Environments.
Proceedings of the Economics of Grids, Clouds, Systems, and Services, 2016

On the Use of SMT Solving for XACML Policy Evaluation.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

2015
Analysis of XACML Policies with SMT.
Proceedings of the Principles of Security and Trust - 4th International Conference, 2015

2014
POSTER: Analyzing Access Control Policies with SMT.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Explanations and Relaxations for Policy Conflicts in Physical Access Control.
Proceedings of the 25th IEEE International Conference on Tools with Artificial Intelligence, 2013

2012
Exploring Dynamic Constraint Enforcement and Efficiency in Access Control.
PhD thesis, 2012

Anomaly analysis for Physical Access Control security configuration.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

Efficient run-time solving of RBAC user authorization queries: pushing the envelope.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
Towards Run-Time Verification in Access Control.
Proceedings of the POLICY 2011, 2011

2010
A service-based context management framework for cross-enterprise collaboration.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Reasoning about Relation Based Access Control.
Proceedings of the Fourth International Conference on Network and System Security, 2010

2008
Performance evaluation of XACML PDP implementations.
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008

P-CDN: Extending access control capabilities of P2P systems to provide CDN services.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

Choosing Between Remote I/O versus Staging in Large Scale Distributed Applications.
Proceedings of the ISCA 21st International Conference on Parallel and Distributed Computing and Communication Systems, 2008


  Loading...