Mine Altunay

According to our database1, Mine Altunay authored at least 14 papers between 2005 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
ThunderSecure: deploying real-time intrusion detection for 100G research networks by leveraging stream-based features and one-class classification network.
Int. J. Inf. Sec., 2022

2019
HEPCloud, an Elastic Hybrid HEP Facility using an Intelligent Decision Support System.
CoRR, 2019

2018
Intelligently-Automated Facilities Expansion with the HEPCloud Decision Engine.
Proceedings of the 18th IEEE/ACM International Symposium on Cluster, 2018

2016
Bringing Federated Identity to Grid Computing.
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016

2011
A Science Driven Production Cyberinfrastructure - the Open Science Grid.
J. Grid Comput., 2011

Optimal response to attacks on the open science grid.
Comput. Networks, 2011

2010
ACPT: A Tool for Modeling and Verifying Access Control Policies.
Proceedings of the POLICY 2010, 2010

Mining Likely Properties of Access Control Policies via Association Rule Mining.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

2009
Definition and Implementation of a SAML-XACML Profile for Authorization Interoperability Across Grid Middleware in OSG and EGEE.
J. Grid Comput., 2009

2008
An interaction-based access control model (IBAC) for collaborative services.
Proceedings of the 2008 International Symposium on Collaborative Technologies and Systems, 2008

2006
Collaboration Policies: Access Control Management in Decentralized Heterogeneous Workflows.
J. Softw., 2006

2005
Evaluation of Mutual Trust during Matchmaking.
Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing (P2P 2005), 31 August, 2005

High Throughput Web Services for Life Sciences.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Trust-Based Secure Workflow Path Construction.
Proceedings of the Service-Oriented Computing, 2005


  Loading...