A new design of privilege management infrastructure with binding signature semantics

Bıçakçı, Kemal
Baykal, Nazife
Just like PKI, used to support public key certificates, Privilege Management Infrastructure (PMI) is built to provide a foundation to employ attribute certificates. Although most of the PKI ideas can be applied to PMI as well, PMI has some unique characteristics for instance it should handle attributes containing confidential information. Motivating by this fact, Dawson et al. recently proposed a new PMI design for those who would like to use the outsourced PKI but keep the PMI management inside the organization. In this paper, we propose an alternative design to have a more fine-grained control over attribute certificates. Immediate revocation and simplified verification are two big advantages of our approach.


A size measurement method for enterprise applications
KÜÇÜKATEŞ ÖMÜRAL, NESLİHAN; Koçyiğit, Altan; Demirörs, Onur; Department of Information Systems (2022-8)
Enterprise Applications are complex, effort-intensive applications that include most of the business processes of the enterprises. They differ from traditional software applications by their high reuse rates. Effort predictions for these applications are usually performed in an ad-hoc fashion and result in large variations. Prediction models utilizing traditional software size measures do not produce accurate results either. In this thesis, we developed a size measurement method considering the unique chara...
A Fully decentralized framework for securely sharing digital content
Demir, Ahmet Serhat; Acar, Aybar Can; Department of Cyber Security (2019)
Blockchain is a secure, immutable, and distributed public ledger that stores transactional data. It enables information transfer without the need for a trusted third party via its decentralized consensus mechanism. Besides finance, blockchain technology has the potential to change several industries, through smart contracts and decentralized applications. This thesis explores using blockchain technology, smart contracts, and Ethereum Web 3.0 stack for secure information and file sharing on a fully decentral...
An automated quality measurement approach for business process models
Gürbüz, Özge; Demirörs, Onur; Güceğlioğlu, A. Selçuk; Department of Information Systems (2011)
Business process modeling has become a common need for organizations. Therefore process quality is also having an important role for the organizations. The most of the quality studies are based on cost and time which can be analyzed during or after the execution of the business processes. There are also quality measures which help analyzing measures before the execution of the business processes. This type of measures can give early feedback about the processes. There are three frameworks defined in the lit...
A certificate based authentication control model using smart mobile devices for ubiquitous computing environments
Çavdar, Davut; Eren, Pekin Erhan; Department of Information Systems (2011)
In this thesis work, a certificate based authentication model supported by mobile devices is provided for ubiquitous computing environments. The model primarily aims to create an infrastructure for controlling and regulating access requests through mobile devices to local resources and services. The model also allows users from different domains to use local resources and services within the scope of agreements between domains. In addition to conceptual description of the model, a real prototype implementat...
Improved server assisted signatures
Bicakci, K; Baykal, Nazife (2005-02-21)
It is well known that excessive computational demands of public key cryptography have made its use limited especially when constrained devices are of concern. To reduce the costs of generating public key signatures one viable method is to employ a third party; the server. In open networks, getting help from a verifiable-server has an advantage over proxy-based solutions since as opposed to proxy-server, verifiable-server's cheating can be proven.
Citation Formats
K. Bıçakçı and N. Baykal, “A new design of privilege management infrastructure with binding signature semantics,” PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, pp. 306–313, 2004, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/55704.