Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Data Protection and Security II
Date
2010
Author
Bıçakçı, Kemal
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
312
views
0
downloads
Cite This
This course allows you to understand the basics of Access Control Mechanisms, Operating System Security and Secure Programming, Identification and Entity Authentication, Standards and Protocols. The materials are also supported with several animations, videos and various references. By the end of this section, the student will be able to: 5.1 Understand access control of operating systems 5.2 Describe security principles of role based access control 5.3 Explain multilevel security models 5.4 Describe Formal Models for Access Control 5.5 Understand how can information flow occur without noticing
URI
https://ocw.metu.edu.tr/course/view.php?id=95
https://hdl.handle.net/11511/37034
Collections
Graduate School of Informatics, Course Material
Suggestions
OpenMETU
Core
Data Protection and Security I
Bıçakçı, Kemal(2010)
This course allows you to understand the basics of data security and protection, computer security and encryption. Various encryption and attack techniques are discussed. Common security problems and vulnerabilities are outlined. By the end of this course, the student will be able to: 1.1 Define the term security and main security concepts. 1.2 List common information security targets. 1.3 Describe what security management means. 1.4 Explain general security principles. 2.1 Define cryptography and understan...
Data integration over horizontally partitioned databases in service-oriented data grids
Sunercan, Hatice Kevser Sönmez; Çiçekli, Fehime Nihan; Alpdemir, Mahmut Nedim; Department of Computer Engineering (2010)
Information integration over distributed and heterogeneous resources has been challenging in many terms: coping with various kinds of heterogeneity including data model, platform, access interfaces; coping with various forms of data distribution and maintenance policies, scalability, performance, security and trust, reliability and resilience, legal issues etc. It is obvious that each of these dimensions deserves a separate thread of research efforts. One particular challenge among the ones listed above tha...
Face recognition using Eigenfaces and neural networks
Akalın, Volkan; Severcan, Mete; Department of Electrical and Electronics Engineering (2003)
A face authentication system based on principal component analysis and neural networks is developed in this thesis. The system consists of three stages; preprocessing, principal component analysis, and recognition. In preprocessing stage, normalization illumination, and head orientation were done. Principal component analysis is applied to find the aspects of face which are important for identification. Eigenvectors and eigenfaces are calculated from the initial face image set. New faces are projected onto ...
A Decision Support System for Optimal Selection of Enterprise Information Security Preventative Actions
Özdemir Sönmez, Ferda ; Günel Kılıç, Banu (2021-09-01)
Types and complexity of information security related vulnerabilities are growing rapidly and present numerous challenges to the enterprises. One of the key challenges is to identify the optimal set of precautions with limited budget. Despite the fact that majority of enterprises have a budget constraint for installing and maintaining the protection systems, the majority of the previous work only focus on prioritization of security targets and do not consider the preventative actions and budget constraints. ...
Privacy-preserving data sharing and adaptable service compositions in mission-critical clouds
Bhargava, Bharat; Angın, Pelin; Ranchal, Rohit (2021-01-01)
Existing cloud systems lack robust mechanisms to monitor compliance of services with security and performance policies under changing contexts, and to ensure uninterrupted operation in case of failures. On the other hand, microservices-based cloud system architectures that have become indispensable for defense applications require systematic monitoring of service operations to satisfy their resiliency and antifragility goals. In this work we propose a unified model for enforcing security and performance req...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
K. Bıçakçı, “Data Protection and Security II,” 00, 2010, Accessed: 00, 2020. [Online]. Available: https://ocw.metu.edu.tr/course/view.php?id=95.