Data Protection and Security II

2010
Bıçakçı, Kemal
This course allows you to understand the basics of Access Control Mechanisms, Operating System Security and Secure Programming, Identification and Entity Authentication, Standards and Protocols. The materials are also supported with several animations, videos and various references. By the end of this section, the student will be able to: 5.1 Understand access control of operating systems 5.2 Describe security principles of role based access control 5.3 Explain multilevel security models 5.4 Describe Formal Models for Access Control 5.5 Understand how can information flow occur without noticing

Suggestions

Data Protection and Security I
Bıçakçı, Kemal(2010)
This course allows you to understand the basics of data security and protection, computer security and encryption. Various encryption and attack techniques are discussed. Common security problems and vulnerabilities are outlined. By the end of this course, the student will be able to: 1.1 Define the term security and main security concepts. 1.2 List common information security targets. 1.3 Describe what security management means. 1.4 Explain general security principles. 2.1 Define cryptography and understan...
Data integration over horizontally partitioned databases in service-oriented data grids
Sunercan, Hatice Kevser Sönmez; Çiçekli, Fehime Nihan; Alpdemir, Mahmut Nedim; Department of Computer Engineering (2010)
Information integration over distributed and heterogeneous resources has been challenging in many terms: coping with various kinds of heterogeneity including data model, platform, access interfaces; coping with various forms of data distribution and maintenance policies, scalability, performance, security and trust, reliability and resilience, legal issues etc. It is obvious that each of these dimensions deserves a separate thread of research efforts. One particular challenge among the ones listed above tha...
Face recognition using Eigenfaces and neural networks
Akalın, Volkan; Severcan, Mete; Department of Electrical and Electronics Engineering (2003)
A face authentication system based on principal component analysis and neural networks is developed in this thesis. The system consists of three stages; preprocessing, principal component analysis, and recognition. In preprocessing stage, normalization illumination, and head orientation were done. Principal component analysis is applied to find the aspects of face which are important for identification. Eigenvectors and eigenfaces are calculated from the initial face image set. New faces are projected onto ...
A Decision Support System for Optimal Selection of Enterprise Information Security Preventative Actions
Sonmez, Ferda Ozdemir; Günel Kılıç, Banu (2021-09-01)
Types and complexity of information security related vulnerabilities are growing rapidly and present numerous challenges to the enterprises. One of the key challenges is to identify the optimal set of precautions with limited budget. Despite the fact that majority of enterprises have a budget constraint for installing and maintaining the protection systems, the majority of the previous work only focus on prioritization of security targets and do not consider the preventative actions and budget constraints. ...
Privacy-preserving data sharing and adaptable service compositions in mission-critical clouds
Bhargava, Bharat; Angın, Pelin; Ranchal, Rohit (2021-01-01)
Existing cloud systems lack robust mechanisms to monitor compliance of services with security and performance policies under changing contexts, and to ensure uninterrupted operation in case of failures. On the other hand, microservices-based cloud system architectures that have become indispensable for defense applications require systematic monitoring of service operations to satisfy their resiliency and antifragility goals. In this work we propose a unified model for enforcing security and performance req...
Citation Formats
K. Bıçakçı, “Data Protection and Security II,” 00, 2010, Accessed: 00, 2020. [Online]. Available: https://ocw.metu.edu.tr/course/view.php?id=95.