Gazi University

Displaying 1-15 of 15 results

  • White Papers // Sep 2013

    Data and Endpoint Security in Mobile Computing

    Now-a-days laptops, tablets and Smartphone's have capabilities and abilities once have only been dreamed. Mobile platforms and mobile computing became an inseparable part of daily and professional life. Their widespread use is motivated by the flexibility and productivity they provide as well as rich options of accessing and processing content...

    Provided By Gazi University

  • White Papers // Sep 2013

    Cyber Attack Timing

    Cyber attacks range in magnitude from large scale attacks to more targeted small attacks. Ill-timed and ill-planned sequence of large scale cyber attacks may weaken the power of the ones next to it. Small scale targeted cyber attacks will mostly have one shot opportunity because of the countermeasures taken by...

    Provided By Gazi University

  • White Papers // Sep 2013

    A Secure Internet Voting Protocol Based on Homomorphic Encryption

    In this paper, the authors focus on Internet voting protocol. Their protocol is similar to the Norwegian scheme which has been used in local elections in 2011. The primary focus of this paper is to prevent a possible cooperation between ballot box and receipt generator in the Norwegian scheme. This...

    Provided By Gazi University

  • White Papers // Sep 2013

    A Decision Framework for Combat Cloud Computing Strategy

    Cloud computing presents a significant technology trends not only in public sector but also in military works. Cloud computing has become a vise solution for providing a flexible computing environment for military applications. This work proposes a new decision framework provided by military experts for cloud computing in combat. The...

    Provided By Gazi University

  • White Papers // Sep 2013

    A Hypergame Model for Information Security

    Game theory is one of the most powerful mathematical tools to model information security decision making. However, in game theory it is assumed that all the players have complete knowledge about each player's strategies, preferences, and decision rules used. This assumption is very strong, in reality there is often significant...

    Provided By Gazi University

  • White Papers // Sep 2013

    A Data Security System Design for Hybrid (Cloud & Volunteer) Global Computing

    In this paper, the authors aim to develop a Data Security Infrastructure (DSI) for a hybrid global computing system which consists of cloud and volunteer computing. This paper has put forth potential capacity of a global computing system which is also known as network computing based method, in terms of...

    Provided By Gazi University

  • White Papers // Sep 2013

    A Novel Concept for Cybersecurity: Institutional Cybersecurity

    Broader use of digital technologies in all aspects of the people lives, exponential expansion of cyberspace, along with complex and advanced cyber threats, lead the user to reevaluate the cybersecurity concept that has been involved in the authors' documents and directives differently or inadequately. One of the main issues in...

    Provided By Gazi University

  • White Papers // Sep 2013

    Identity Management Based Security Architecture of Cloud Computing on Multi-Agent Systems

    In traditional identity management systems user authentication is usually carried out on the basis of management list, previously defined in a system. But with the increasing number of users in such environment as a cloud the management of this list becomes more difficult. For this purpose, in this paper the...

    Provided By Gazi University

  • White Papers // Sep 2013

    Test Suite Study for Security Analysis of Digital Signature Applications

    Digital signature technology is used widely for security and trust in electronic business and communications. Now-a-days it becomes commonly used especially in government agencies. At this point of view, it is crucial to implement correct applications to create and verify digital signatures. CEN has introduced the security requirements for signature...

    Provided By Gazi University

  • White Papers // Sep 2013

    Mobile Cloud Authentication and Secure Communication

    The secure communication of today's mobile devices is of high interest because the threats have increased and it is now not easy to handle the billions of devices securely. With the ongoing developments of huge systems being transformed into cloud systems, the authors have the need to provide an easy...

    Provided By Gazi University

  • White Papers // Sep 2013

    Security Challengers in Grid Operating Systems

    Vast nature of internet causes creation an environment \"Grid\" for a developable system creation with high effectiveness, distributing and reliability. In a distributed system like grid, information safe transfer and duties services security guarantee is an important subject. Different architectures are proposed for creating security in grid that the most...

    Provided By Gazi University

  • White Papers // Sep 2013

    A Secure System Development Framework for SaaS Applications in Cloud Computing

    The adoption of cloud computing is ever increasing through its economical and operational benefits. However, it also contains potential security issues in itself. Hence, while using cloud-based solutions, organizations need to be aware of these concerns and develop their solutions in a way that they include the information security management...

    Provided By Gazi University

  • White Papers // Sep 2013

    Attack Types and Intrusion Detection Systems in Cloud Computing

    In recent years, lots of organizations have adopted their systems for enabling cloud based computing to provide scalable, virtualized on-demand access to a shared pool of computing resources such as networks, servers, storage, applications and services. Mainly cloud computing technology enables users/enterprises to eliminate the requirements for setting up of...

    Provided By Gazi University

  • White Papers // Jan 2011

    A Survey of Multicast Routing Protocols in Ad-Hoc Networks

    Multicast routing in wireless networking is the newest technology that works with network groups. Multicast routing plays an important role in point-to-point or multipoint-to-multipoint communications. Multicast routing gives wireless networks more efficient, reliable and secure than unicast routing, because the speed of the protocols and techniques that are developed or...

    Provided By Gazi University

  • White Papers // Sep 2009

    Secure Load Balancing Via Hierarchical Data Aggregation in Heterogeneous Sensor Networks

    In wireless sensor networks, sensing driven nature of data generation and uneven cluster sizes result in unbalanced data traffic load among clusters. Clusters in which the event generation rate is high and/or clusters that have more members than others suffer from congestion and data loss which negatively affect the accuracy...

    Provided By Gazi University

  • White Papers // Jan 2011

    A Survey of Multicast Routing Protocols in Ad-Hoc Networks

    Multicast routing in wireless networking is the newest technology that works with network groups. Multicast routing plays an important role in point-to-point or multipoint-to-multipoint communications. Multicast routing gives wireless networks more efficient, reliable and secure than unicast routing, because the speed of the protocols and techniques that are developed or...

    Provided By Gazi University

  • White Papers // Sep 2009

    Secure Load Balancing Via Hierarchical Data Aggregation in Heterogeneous Sensor Networks

    In wireless sensor networks, sensing driven nature of data generation and uneven cluster sizes result in unbalanced data traffic load among clusters. Clusters in which the event generation rate is high and/or clusters that have more members than others suffer from congestion and data loss which negatively affect the accuracy...

    Provided By Gazi University

  • White Papers // Sep 2013

    Data and Endpoint Security in Mobile Computing

    Now-a-days laptops, tablets and Smartphone's have capabilities and abilities once have only been dreamed. Mobile platforms and mobile computing became an inseparable part of daily and professional life. Their widespread use is motivated by the flexibility and productivity they provide as well as rich options of accessing and processing content...

    Provided By Gazi University

  • White Papers // Sep 2013

    Cyber Attack Timing

    Cyber attacks range in magnitude from large scale attacks to more targeted small attacks. Ill-timed and ill-planned sequence of large scale cyber attacks may weaken the power of the ones next to it. Small scale targeted cyber attacks will mostly have one shot opportunity because of the countermeasures taken by...

    Provided By Gazi University

  • White Papers // Sep 2013

    A Secure Internet Voting Protocol Based on Homomorphic Encryption

    In this paper, the authors focus on Internet voting protocol. Their protocol is similar to the Norwegian scheme which has been used in local elections in 2011. The primary focus of this paper is to prevent a possible cooperation between ballot box and receipt generator in the Norwegian scheme. This...

    Provided By Gazi University

  • White Papers // Sep 2013

    A Decision Framework for Combat Cloud Computing Strategy

    Cloud computing presents a significant technology trends not only in public sector but also in military works. Cloud computing has become a vise solution for providing a flexible computing environment for military applications. This work proposes a new decision framework provided by military experts for cloud computing in combat. The...

    Provided By Gazi University

  • White Papers // Sep 2013

    A Hypergame Model for Information Security

    Game theory is one of the most powerful mathematical tools to model information security decision making. However, in game theory it is assumed that all the players have complete knowledge about each player's strategies, preferences, and decision rules used. This assumption is very strong, in reality there is often significant...

    Provided By Gazi University

  • White Papers // Sep 2013

    A Data Security System Design for Hybrid (Cloud & Volunteer) Global Computing

    In this paper, the authors aim to develop a Data Security Infrastructure (DSI) for a hybrid global computing system which consists of cloud and volunteer computing. This paper has put forth potential capacity of a global computing system which is also known as network computing based method, in terms of...

    Provided By Gazi University

  • White Papers // Sep 2013

    A Novel Concept for Cybersecurity: Institutional Cybersecurity

    Broader use of digital technologies in all aspects of the people lives, exponential expansion of cyberspace, along with complex and advanced cyber threats, lead the user to reevaluate the cybersecurity concept that has been involved in the authors' documents and directives differently or inadequately. One of the main issues in...

    Provided By Gazi University

  • White Papers // Sep 2013

    Identity Management Based Security Architecture of Cloud Computing on Multi-Agent Systems

    In traditional identity management systems user authentication is usually carried out on the basis of management list, previously defined in a system. But with the increasing number of users in such environment as a cloud the management of this list becomes more difficult. For this purpose, in this paper the...

    Provided By Gazi University

  • White Papers // Sep 2013

    Test Suite Study for Security Analysis of Digital Signature Applications

    Digital signature technology is used widely for security and trust in electronic business and communications. Now-a-days it becomes commonly used especially in government agencies. At this point of view, it is crucial to implement correct applications to create and verify digital signatures. CEN has introduced the security requirements for signature...

    Provided By Gazi University

  • White Papers // Sep 2013

    Mobile Cloud Authentication and Secure Communication

    The secure communication of today's mobile devices is of high interest because the threats have increased and it is now not easy to handle the billions of devices securely. With the ongoing developments of huge systems being transformed into cloud systems, the authors have the need to provide an easy...

    Provided By Gazi University

  • White Papers // Sep 2013

    Security Challengers in Grid Operating Systems

    Vast nature of internet causes creation an environment \"Grid\" for a developable system creation with high effectiveness, distributing and reliability. In a distributed system like grid, information safe transfer and duties services security guarantee is an important subject. Different architectures are proposed for creating security in grid that the most...

    Provided By Gazi University

  • White Papers // Sep 2013

    A Secure System Development Framework for SaaS Applications in Cloud Computing

    The adoption of cloud computing is ever increasing through its economical and operational benefits. However, it also contains potential security issues in itself. Hence, while using cloud-based solutions, organizations need to be aware of these concerns and develop their solutions in a way that they include the information security management...

    Provided By Gazi University

  • White Papers // Sep 2013

    Attack Types and Intrusion Detection Systems in Cloud Computing

    In recent years, lots of organizations have adopted their systems for enabling cloud based computing to provide scalable, virtualized on-demand access to a shared pool of computing resources such as networks, servers, storage, applications and services. Mainly cloud computing technology enables users/enterprises to eliminate the requirements for setting up of...

    Provided By Gazi University