Browsing by Author "Yildiz, Mehmet"
Now showing 1 - 3 of 3
- Results Per Page
- Sort Options
Conference Object Citation - WoS: 24Citation - Scopus: 56A Layered Security Approach for Cloud Computing Infrastructure(IEEE, 2009) Mehmet Yildiz; Jemal Abawajy; Tuncay Ercan; Andrew Bernoth; Ercan, Tuncay; Bernoth, Andrew; Abawajy, Jemal; Yildiz, MehmetThis paper introduces a practical security model based on key security considerations by looking at a number of infrastructure aspects of Cloud Computing such as SaaS Utility Web Platform and Managed Services Service commerce platforms and Internet Integration which was introduced with a concise literature review. The purpose of this paper is to offer a macro level solution for identified common infrastructure security requirements. This model with a number of emerged patterns can be applied to infrastructure aspect of Cloud Computing as a proposed shared security approach in system development life cycle focusing on the plan-built-run scope.Conference Object Issues in User Generated Content process and a proposed model to solve them(Common Ground Research Networks aaron.clark@commongroundpublishing.com, 2010) Mehmet Yildiz; Tuncay Ercan; Ercan, Tuncay; Yildiz, MehmetUser-Generated Content (UGC) in cyberspace is an important aspect of knowledge management discipline. We observed that the technical management of UGC has a number of issues and is not undertaken efficiently in large enterprises. This study provides review of extensive literature search for the technical issues of UGC globally. Based on the experience of authors in the field and considering the gaps identified it provides a macro level technical management model to address these issues using findings from a number of case studies. © 2020 Elsevier B.V. All rights reserved.Conference Object Citation - WoS: 2Citation - Scopus: 2Semantic access control for corporate mobile devices(Springer-Verlag Berlin, 2010) Tuncay Ercan; Mehmet Yildiz; Ercan, Tuncay; Yildiz, MehmetMany of the mobile business applications are executed in different domains as business-to-consumer (B2C) and business-to-business (B2B) operations. Computing environments of mobile wireless devices owned by individuals or organizations have become totally distributed between peers and partners. Designing applicable access control mechanisms in this environment is difficult from the point of traditional security measures. Semantic web technologies offer appropriate access opportunities to the corporate resources by using related context in user devices and servers under the trust philosophy. Semantic web technology combines user requests and service descriptions for an efficient matchmaking. This paper examines various access control mechanisms and semantically analyzes them. The purpose of this paper is to present a more secure access control mechanism for mobile corporate devices. This model can be used as an additional security framework that enforces access control mechanisms in the organizations. © Springer-Verlag Berlin Heidelberg 2010. © 2011 Elsevier B.V. All rights reserved.

