Repository logoGCRIS
  • English
  • Türkçe
  • Русский
Log In
New user? Click here to register. Have you forgotten your password?
Home
Communities
Browse GCRIS
Entities
Overview
GCRIS Guide
  1. Home
  2. Browse by Author

Browsing by Author "Yildiz, Mehmet"

Filter results by typing the first few letters
Now showing 1 - 3 of 3
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    Conference Object
    Citation - WoS: 24
    Citation - Scopus: 56
    A Layered Security Approach for Cloud Computing Infrastructure
    (IEEE, 2009) Mehmet Yildiz; Jemal Abawajy; Tuncay Ercan; Andrew Bernoth; Ercan, Tuncay; Bernoth, Andrew; Abawajy, Jemal; Yildiz, Mehmet
    This paper introduces a practical security model based on key security considerations by looking at a number of infrastructure aspects of Cloud Computing such as SaaS Utility Web Platform and Managed Services Service commerce platforms and Internet Integration which was introduced with a concise literature review. The purpose of this paper is to offer a macro level solution for identified common infrastructure security requirements. This model with a number of emerged patterns can be applied to infrastructure aspect of Cloud Computing as a proposed shared security approach in system development life cycle focusing on the plan-built-run scope.
  • Loading...
    Thumbnail Image
    Conference Object
    Issues in User Generated Content process and a proposed model to solve them
    (Common Ground Research Networks aaron.clark@commongroundpublishing.com, 2010) Mehmet Yildiz; Tuncay Ercan; Ercan, Tuncay; Yildiz, Mehmet
    User-Generated Content (UGC) in cyberspace is an important aspect of knowledge management discipline. We observed that the technical management of UGC has a number of issues and is not undertaken efficiently in large enterprises. This study provides review of extensive literature search for the technical issues of UGC globally. Based on the experience of authors in the field and considering the gaps identified it provides a macro level technical management model to address these issues using findings from a number of case studies. © 2020 Elsevier B.V. All rights reserved.
  • Loading...
    Thumbnail Image
    Conference Object
    Citation - WoS: 2
    Citation - Scopus: 2
    Semantic access control for corporate mobile devices
    (Springer-Verlag Berlin, 2010) Tuncay Ercan; Mehmet Yildiz; Ercan, Tuncay; Yildiz, Mehmet
    Many of the mobile business applications are executed in different domains as business-to-consumer (B2C) and business-to-business (B2B) operations. Computing environments of mobile wireless devices owned by individuals or organizations have become totally distributed between peers and partners. Designing applicable access control mechanisms in this environment is difficult from the point of traditional security measures. Semantic web technologies offer appropriate access opportunities to the corporate resources by using related context in user devices and servers under the trust philosophy. Semantic web technology combines user requests and service descriptions for an efficient matchmaking. This paper examines various access control mechanisms and semantically analyzes them. The purpose of this paper is to present a more secure access control mechanism for mobile corporate devices. This model can be used as an additional security framework that enforces access control mechanisms in the organizations. © Springer-Verlag Berlin Heidelberg 2010. © 2011 Elsevier B.V. All rights reserved.
Repository logo
Collections
  • Scopus Collection
  • WoS Collection
  • TrDizin Collection
  • PubMed Collection
Entities
  • Research Outputs
  • Organizations
  • Researchers
  • Projects
  • Awards
  • Equipments
  • Events
About
  • Contact
  • GCRIS
  • Research Ecosystems
  • Feedback
  • OAI-PMH

Log in to GCRIS Dashboard

GCRIS Mobile

Download GCRIS Mobile on the App StoreGet GCRIS Mobile on Google Play

Powered by Research Ecosystems

  • Privacy policy
  • End User Agreement
  • Feedback