Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mehmet Tahir Sandikkaya is active.

Publication


Featured researches published by Mehmet Tahir Sandikkaya.


symposium on reliable distributed systems | 2012

Security Problems of Platform-as-a-Service (PaaS) Clouds and Practical Solutions to the Problems

Mehmet Tahir Sandikkaya; Ali Emre Harmanci

Cloud computing is a promising approach for the efficient use of computational resources. It delivers computing as a service rather than a product for a fraction of the cost. However, security concerns prevent many individuals and organizations from using clouds despite its cost effectiveness. Resolving security problems of clouds may alleviate concerns and increase cloud usage; in consequence, it may decrease overall costs spent for the computational devices and infrastructures. This paper particularly focuses on the Platform-as-a-Service (PaaS) clouds. Security of PaaS clouds is considered from multiple perspectives including access control, privacy and service continuity while protecting both the service provider and the user. Security problems of PaaS clouds are explored and classified. Countermeasures are proposed and discussed. The achieved solutions are intended to be the rationales for future PaaS designs and implementations.


InetSec 2009 | 2009

Privacy Policies, Tools and Mechanisms of the Future

Vincent Naessens; Mehmet Tahir Sandikkaya; Jorn Lapon; Kristof Verslype; Pieter Verhaeghe; Girma Enideg Nigusse; Bart De Decker

Although many believe that we have lost the battle for privacy, protection of what’s left of the user’s privacy is all the more important. Not only should a user be able to minimize the disclosure of her personal data, she should also have rights to decide what happens with her data once they have been disclosed. In order to minimize user interaction when deciding whether or not to reveal personal data, privacy policy languages were developed. However, these languages are inadequate and cannot properly deal with the complex interactions between users, service providers, third parties, identity providers and others. Also, tool support for composing and verifying these policies and mechanisms for enforcing them are lagging behind. This paper argues the need for better privacy policies and proposes some solutions. Throughout the paper, our statements are applied to three sample applications in three different domains: e-health, banking and social networks.


computer software and applications conference | 2006

Agent-Based Offline Electronic Voting

Mehmet Tahir Sandikkaya; Bülent Örencik

Many electronic voting systems, classified mainly as homomorphic cryptography based, mix-net based and blind signature based, appear in the eighties after zero knowledge proofs were introduced. The common ground for all these three systems is the fact that none of them works without real time cryptologic computations which should be held on a server. As far as known, the agent-based approach has not yet been used in a secure electronic voting system. In this study, an agent-based electronic voting schema, which does not force real time computations on the server side and lets people vote at home, is proposed. Conventional cryptologic methods are used in the proposed schema to ensure some of the requirements of an electronic voting system where some of the requirements are constructed within distributed agent phenomena


2017 International Conference on Computer Science and Engineering (UBMK) | 2017

Preserving privacy using visual cryptography in surveillance systems

Askin Okkali; Mehmet Tahir Sandikkaya

This study proposes a practical, cost-effective and privacy-enhancing visual cryptographic surveillance system solution to independently store multiple shares of the original camera images. A face-detection algorithm determines faces on the original real-time image, and then the determined faces are replaced with random data to protect peoples identities. The rest of the image are kept, as it is to be able to follow the acts within the surveillance system. Whenever a suspected act occurs, independent entities in the system may act together to re-compose the original image and identify the suspected person. The proof of concept implementation, attack model and security analysis of the proposed model is discussed within the paper.


optical network design and modelling | 2007

Prudent creditization polling (PCP): a novel adaptive polling service for an EPON

Burak Kantarci; Mehmet Tahir Sandikkaya; Aysegul Gencata; Sema Oktuǧ

In this paper a novel adaptive bandwidth allocation scheme called Prudent Creditization Polling (PCP) is proposed and adapted with the reservation protocol IPACT. PCP attempts to reduce the average queue length at the ONUs and the average packet delay throughout the network. At each polling period, PCP attempts to creditize the request of the ONUs that suffer from high RTT, high average delay per packet, and high buffer growth. We implemented PCP with a fuzzy functional approach and a linear regression approach. We simulated PCP and several service disciplines in IPACT and compared their performance in terms of average packet delay and queue length. We show that PCP improves the performance of IPACT significantly in terms of the performance metrics aforementioned.


Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII | 2009

Privacy-Preserving Telemonitoring for eHealth

Mohamed Layouni; Kristof Verslype; Mehmet Tahir Sandikkaya; Bart De Decker; Hans Vangheluwe


global communications conference | 2014

Practical runtime security mechanisms for an aPaaS cloud

Mehmet Tahir Sandikkaya; Bahadir Odevci; Tolga Ovatman


Iet Information Security | 2016

Design and formal verification of a cloud compliant secure logging mechanism

Mehmet Tahir Sandikkaya; Tolga Ovatman; Ali Emre Harmanci


Archive | 2015

A SECURITY PARADIGM FOR PAAS CLOUDS

Mehmet Tahir Sandikkaya; Ali Emre Harmanci


5th International workshop on Personalisation for e-Health | 2012

Privacy in Commercial Medical Storage Systems

Mehmet Tahir Sandikkaya; Bart De Decker; Vincent Naessens

Collaboration


Dive into the Mehmet Tahir Sandikkaya's collaboration.

Top Co-Authors

Avatar

Bart De Decker

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Ali Emre Harmanci

Istanbul Technical University

View shared research outputs
Top Co-Authors

Avatar

Kristof Verslype

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Tolga Ovatman

Istanbul Technical University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Askin Okkali

Istanbul Technical University

View shared research outputs
Top Co-Authors

Avatar

Aysegul Gencata

Istanbul Technical University

View shared research outputs
Top Co-Authors

Avatar

Sema Oktuǧ

Istanbul Technical University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge