Information security, privacy issues and an application.

1988
Arifgoğlu, Saliha Figen

Suggestions

Data communications and networking for personal computers
Benli, İsmet; Tolun, Mehmet R.; Department of Computer Engineering (1989)
Data security in computer communication networks
Alameddine, Nazih; Epir, Bülent; Department of Computer Engineering (1988)
Privacy Signaling Games with Binary Alphabets
Stavrou, Photios A.; Sarıtaş, Serkan; Skoglund, Mikael (2022-01-01)
In this paper, we consider a privacy signaling game problem for binary alphabets and single-bit transmission where a transmitter has a pair of messages, one of which is a casual message that needs to be conveyed, whereas the other message contains sensitive data and needs to be protected. The receiver wishes to estimate both messages to acquire as much information as possible. For this setup, we study the interactions between the transmitter and the receiver with non-aligned information-theoretic objectives...
Cyber threat intelligence sharing technologies and threat sharing model using blockchain
Özdemir, Ahmet; Acar, Aybar Can; Özgit, Attila; Department of Cybersecurity (2021-5-7)
Against the measures taken, the nature of the threats in the cyber environment is evolving day by day. While script kiddie made amateur cyber attacks were usually experienced beforehand, more sophisticated and targeted attacks are frequently encountered nowadays. Besides that, commonly used signature based techniques for attack detection and threat information staying within organization is insufficient for dynamically changing, organized and targeted threats. Furthermore, with the advance of new technolog...
Privacy-preserving data sharing and adaptable service compositions in mission-critical clouds
Bhargava, Bharat; Angın, Pelin; Ranchal, Rohit (2021-01-01)
Existing cloud systems lack robust mechanisms to monitor compliance of services with security and performance policies under changing contexts, and to ensure uninterrupted operation in case of failures. On the other hand, microservices-based cloud system architectures that have become indispensable for defense applications require systematic monitoring of service operations to satisfy their resiliency and antifragility goals. In this work we propose a unified model for enforcing security and performance req...
Citation Formats
S. F. Arifgoğlu, “Information security, privacy issues and an application.,” Middle East Technical University, 1988.