A new design of privilege management infrastructure with binding signature semantics

Bıçakçı, Kemal
Baykal, Nazife
Just like PKI, used to support public key certificates, Privilege Management Infrastructure (PMI) is built to provide a foundation to employ attribute certificates. Although most of the PKI ideas can be applied to PMI as well, PMI has some unique characteristics for instance it should handle attributes containing confidential information. Motivating by this fact, Dawson et al. recently proposed a new PMI design for those who would like to use the outsourced PKI but keep the PMI management inside the organization. In this paper, we propose an alternative design to have a more fine-grained control over attribute certificates. Immediate revocation and simplified verification are two big advantages of our approach.


A size measurement method for enterprise applications
KÜÇÜKATEŞ ÖMÜRAL, NESLİHAN; Koçyiğit, Altan; Demirörs, Onur; Department of Information Systems (2022-8)
Enterprise Applications are complex, effort-intensive applications that include most of the business processes of the enterprises. They differ from traditional software applications by their high reuse rates. Effort predictions for these applications are usually performed in an ad-hoc fashion and result in large variations. Prediction models utilizing traditional software size measures do not produce accurate results either. In this thesis, we developed a size measurement method considering the unique chara...
A Fully decentralized framework for securely sharing digital content
Demir, Ahmet Serhat; Acar, Aybar Can; Department of Cyber Security (2019)
Blockchain is a secure, immutable, and distributed public ledger that stores transactional data. It enables information transfer without the need for a trusted third party via its decentralized consensus mechanism. Besides finance, blockchain technology has the potential to change several industries, through smart contracts and decentralized applications. This thesis explores using blockchain technology, smart contracts, and Ethereum Web 3.0 stack for secure information and file sharing on a fully decentral...
An automated quality measurement approach for business process models
Gürbüz, Özge; Demirörs, Onur; Güceğlioğlu, A. Selçuk; Department of Information Systems (2011)
Business process modeling has become a common need for organizations. Therefore process quality is also having an important role for the organizations. The most of the quality studies are based on cost and time which can be analyzed during or after the execution of the business processes. There are also quality measures which help analyzing measures before the execution of the business processes. This type of measures can give early feedback about the processes. There are three frameworks defined in the lit...
A size measurement method for Enterprise Applications
Ömüral, Neslihan Küçükateş; Demirörs, Onur (2022-01-01)
Enterprise Applications are known as one of the best practices of software reuse. They are complex applications, including most of the business processes. In this domain, size measurements and effort predictions are mostly performed in an ad-hoc fashion, and they frequently suffer from schedule and budget overruns. We developed a size measurement method for Enterprise Applications and explained this novel method in this paper. We categorized transactions as “unchanged”, “changed”, and “new” in this method. ...
A certificate based authentication control model using smart mobile devices for ubiquitous computing environments
Çavdar, Davut; Eren, Pekin Erhan; Department of Information Systems (2011)
In this thesis work, a certificate based authentication model supported by mobile devices is provided for ubiquitous computing environments. The model primarily aims to create an infrastructure for controlling and regulating access requests through mobile devices to local resources and services. The model also allows users from different domains to use local resources and services within the scope of agreements between domains. In addition to conceptual description of the model, a real prototype implementat...
Citation Formats
K. Bıçakçı and N. Baykal, “A new design of privilege management infrastructure with binding signature semantics,” PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, pp. 306–313, 2004, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/55704.