Access control in windows/netware environment

Download
1997
Yağdereli, Eray

Suggestions

Privacy preserving database external layer construction algorithm via secure decomposition for attribute-based security policies
Turan, Uğur; Toroslu, İsmail Hakkı; Kantarcıoğlu, Murat; Department of Computer Engineering (2018)
Relational DBMS’scontinue to dominate th emarket an dinference problem on external schema has preserved its importance in terms of data privacy. Especially for the last 10 years, external schema construction for application-specific database usage has increased its independency from the conceptual schema, as the definitions and implementations of views and procedures have been optimized. After defining all mathematical background, this work offers an optimized decomposition strategy for the external schema, wh...
Information security, privacy issues and an application.
Arifgoğlu, Saliha Figen; Department of Computer Engineering (1988)
Privacy Signaling Games with Binary Alphabets
Stavrou, Photios A.; Sarıtaş, Serkan; Skoglund, Mikael (2022-01-01)
In this paper, we consider a privacy signaling game problem for binary alphabets and single-bit transmission where a transmitter has a pair of messages, one of which is a casual message that needs to be conveyed, whereas the other message contains sensitive data and needs to be protected. The receiver wishes to estimate both messages to acquire as much information as possible. For this setup, we study the interactions between the transmitter and the receiver with non-aligned information-theoretic objectives...
Privacy protection of tone-mapped HDR images using false colours
ÇİFTÇİ, Serdar; Akyüz, Ahmet Oğuz; PİNHEİRO, Antonio M. G.; Ebrahimi, Touradj (2017-12-01)
High dynamic range (HDR) imaging has been developed for improved visual representation by capturing a wide range of luminance values. Owing to its properties, HDR content might lead to a larger privacy intrusion, requiring new methods for privacy protection. Previously, false colours were proved to be effective for assuring privacy protection for low dynamic range (LDR) images. In this work, the reliability of false colours when used for privacy protection of HDR images represented by tone-mapping operators...
Event detection on social media using transaction based stream processing engine
Çınar, Hüseyin Alper; Karagöz, Pınar; Department of Computer Engineering (2019)
The aim of this study is detecting events on social media by improving current solutions in terms of accuracy and time performance. An event is something that occurs in a short duration of time in a certain place. In this thesis, the problem is modelled as a streaming transaction process. Three different event detection method is adapted to our solution. First one is the keyword-based event detection method that looks for bursty keywords in a period. The second one is the clustering-based event detection me...
Citation Formats
E. Yağdereli, “Access control in windows/netware environment,” Middle East Technical University, 1997.