Protecting Personal Information in Enterprise Applications Kurumsal Uygulamalarda Kişisel Verilerin Korunmasi

2020-10-07
Yilmaz, Tolga
Arikan, Suleyman Muhammed
Su, Fatma
Yürekten, Özgür
© 2020 IEEE.In the digital environment, personal information gets stored by various service providers and in some situations can be used out of its purpose and without permission. These violations led to various legislation in the world and The Law for Protecting Personal Information (KVKK) in Turkey. Software that collects personal information needs to comply with the legislation as well. However, a model and sets of requirements for transforming the software development process for protecting personal information do not exist for the use of software developers and analysts. In this work, we report the experience we had while preparing a guide for software developers that includes a transformation model and a set of requirements based on KVKK. The relevant guide to this study is used as an input to the Turkish Presidency Digital Transformation Office Information and Communication Security Guide.
14th Turkish National Software Engineering Symposium, UYMS 2020

Suggestions

On password-based authenticated key exchange (PAKE) protocols.
Tonga, Meryem; Doğanaksoy, Ali; Department of Cryptography (2020)
Authentication and key agreement protocols play an important role in today’s digital world. Key agreement methods mostly mimic Diffie-Hellman key exchange protocol, but unfortunately they are susceptible to man-in-the-middle attacks. Password based authenticated key exchange (PAKE) protocols promise to handle these key agreement and authentication without requiring existence of certificate authorities or trusted third parties. More importantly, PAKE protocols enable agreement on low-entropy passwords rather...
Security analysis of electronic signature applications and test suite study
Ergun, Tamer; Özbudak, Ferruh; Department of Cryptography (2013)
Digital signature technology is used widely for security and trust in electronic business and communications. Nowadays it becomes commonly used especially in government agencies. From this point of view, it is crucial to implement correct applications to create and verify digital signatures. CEN (European Commitee for Standardization) has introduced the security requirements for signature applications but neither proposed a PKI model nor implemented a test suite to evaluate the accuracy of signature applica...
A faster intrusion detection method for high-speed computer networks
Tarım, Mehmet Cem; Schmidt, Şenan Ece; Department of Electrical and Electronics Engineering (2011)
The malicious intrusions to computer systems result in the loss of money, time and hidden information which require deployment of intrusion detection systems. Existing intrusion detection methods analyze packet payload to search for certain strings and to match them with a rule database which takes a long time in large size packets. Because of buffer limits, packets may be dropped or the system may stop working due to high CPU load. In this thesis, we investigate signature based intrusion detection with sig...
Object tracking for surveillance applications using thermal and visible band video data fusion
Beyan, Çiğdem; Temizel, Alptekin; Department of Information Systems (2010)
Individual tracking of objects in the video such as people and the luggages they carry is important for surveillance applications as it would enable deduction of higher level information and timely detection of potential threats. However, this is a challenging problem and many studies in the literature track people and the belongings as a single object. In this thesis, we propose using thermal band video data in addition to the visible band video data for tracking people and their belongings separately for ...
Crossing: a framework to develop knowledge-based recommenders in cross domains
Azak, Mustafa; Birtürk, Ayşe Nur; Department of Computer Engineering (2010)
Over the last decade, excess amount of information is being provided on the web and information filtering systems such as recommender systems have become one of the most important technologies to overcome the „Information Overload‟ problem by providing personalized services to users. Several researches have been made to improve quality of recommendations and provide maximum user satisfaction within a single domain based on the domain specific knowledge. However, the current infrastructures of the recommende...
Citation Formats
T. Yilmaz, S. M. Arikan, F. Su, and Ö. Yürekten, “Protecting Personal Information in Enterprise Applications Kurumsal Uygulamalarda Kişisel Verilerin Korunmasi,” presented at the 14th Turkish National Software Engineering Symposium, UYMS 2020, İstanbul, Türkiye, 2020, Accessed: 00, 2021. [Online]. Available: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85097519692&origin=inward.