Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Access control in windows/netware environment
Download
068519.pdf
Date
1997
Author
Yağdereli, Eray
Metadata
Show full item record
Item Usage Stats
75
views
0
downloads
Cite This
URI
https://hdl.handle.net/11511/11712
Collections
Graduate School of Natural and Applied Sciences, Thesis
Suggestions
OpenMETU
Core
Privacy preserving database external layer construction algorithm via secure decomposition for attribute-based security policies
Turan, Uğur; Toroslu, İsmail Hakkı; Kantarcıoğlu, Murat; Department of Computer Engineering (2018)
Relational DBMS’scontinue to dominate th emarket an dinference problem on external schema has preserved its importance in terms of data privacy. Especially for the last 10 years, external schema construction for application-specific database usage has increased its independency from the conceptual schema, as the definitions and implementations of views and procedures have been optimized. After defining all mathematical background, this work offers an optimized decomposition strategy for the external schema, wh...
Information security, privacy issues and an application.
Arifgoğlu, Saliha Figen; Department of Computer Engineering (1988)
Privacy Signaling Games with Binary Alphabets
Stavrou, Photios A.; Sarıtaş, Serkan; Skoglund, Mikael (2022-01-01)
In this paper, we consider a privacy signaling game problem for binary alphabets and single-bit transmission where a transmitter has a pair of messages, one of which is a casual message that needs to be conveyed, whereas the other message contains sensitive data and needs to be protected. The receiver wishes to estimate both messages to acquire as much information as possible. For this setup, we study the interactions between the transmitter and the receiver with non-aligned information-theoretic objectives...
Privacy protection of tone-mapped HDR images using false colours
ÇİFTÇİ, Serdar; Akyüz, Ahmet Oğuz; PİNHEİRO, Antonio M. G.; Ebrahimi, Touradj (2017-12-01)
High dynamic range (HDR) imaging has been developed for improved visual representation by capturing a wide range of luminance values. Owing to its properties, HDR content might lead to a larger privacy intrusion, requiring new methods for privacy protection. Previously, false colours were proved to be effective for assuring privacy protection for low dynamic range (LDR) images. In this work, the reliability of false colours when used for privacy protection of HDR images represented by tone-mapping operators...
Event detection on social media using transaction based stream processing engine
Çınar, Hüseyin Alper; Karagöz, Pınar; Department of Computer Engineering (2019)
The aim of this study is detecting events on social media by improving current solutions in terms of accuracy and time performance. An event is something that occurs in a short duration of time in a certain place. In this thesis, the problem is modelled as a streaming transaction process. Three different event detection method is adapted to our solution. First one is the keyword-based event detection method that looks for bursty keywords in a period. The second one is the clustering-based event detection me...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
E. Yağdereli, “Access control in windows/netware environment,” Middle East Technical University, 1997.