Author of the publication

A Semantic Based Certification and Access Control Approach Using Security Patterns on SEAGENT.

, , and . SEKE, page 741-744. Knowledge Systems Institute Graduate School, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Tuglular, Tugkan
add a person with the name Tuglular, Tugkan
 

Other publications of authors with the same name

Mutation Operators for Decision Table-Based Contracts Used in Software Testing., , and . UYMS, page 1-6. IEEE, (2020)Heterogeneous Modeling and Testing of Software Product Lines., , and . QRS Companion, page 1079-1088. IEEE, (2021)Repository Landscape in Turkiye and GCRIS: The first National Research Information System., , , and . CRIS, volume 211 of Procedia Computer Science, page 222-229. Elsevier, (2022)Directed Acyclic Graph Modeling of Security Policies for Firewall Testing., , , and . SSIRI, page 393-398. IEEE Computer Society, (2009)Panel 5: Cloud Computing for Developing Countries Panelists.. COMPSAC, page 612. IEEE Computer Society, (2012)Message from the WEDA 2016 Program Chairs., , , , and . COMPSAC, page 561. IEEE Computer Society, (2016)SPL-AT Gherkin: A Gherkin Extension for Feature Oriented Testing of Software Product Lines., and . COMPSAC (2), page 344-349. IEEE, (2019)Automatic Code Generation with Document Responsibility Collaboration Modelling Method., and . UYMS, page 1-6. IEEE, (2020)End-to-end security implementation for mobile devices using TLS protocol., and . J. Comput. Virol., 2 (1): 87-97 (2006)Rule-Based Automatic Question Generation Using Semantic Role Labeling., , and . IEICE Trans. Inf. Syst., 102-D (7): 1362-1373 (2019)