* Faculty       * Staff       * Students & Alumni       * Committees       * Contact       * Institute Directory
* Undergraduate Program       * Graduate Program       * Courses       * Institute Catalog      
* Undergraduate       * Graduate       * Institute Admissions: Undergraduate | Graduate      
* Colloquia       * Seminars       * News       * Events       * Institute Events      
* Overview       * Lab Manual       * Institute Computing      
No Menu Selected

* News


Formal Modeling of Trust and Mobility from Computer Security Point of View

Speaker: Mehmet Ufuk Caglayan

September 5, 2013 - 4:00 p.m.
Location: CII (LOW) 3051
Hosted By: Dr. Bulent Yener (x6907)


Core-Crust Modeling (CCM) for formal representation of trust in relation to computer security is a new hybrid modeling approach of trust. CCM components consist of Trust Core Model, Trust Extraction Crust Model, Information Flow Crust Model and Interoperability Crust Model. FPFM (Formal Policy Framework for Mobility) is a new formal specification and verification framework for security policies in multi-domain mobile networks. FPFM components consist of Formal Policy Model for Mobility with Role Based Access Control, XML Based Formal Policy Language for Mobility with Role Based Access Control, Spatio-Temporal Model Checking of Security Policies with Ambient Calculus and Theorem Proving of Security Policies with the Coq Proof Assistant


Mehmet Ufuk Caglayan received his BSEE and MSCS degrees from Middle East Technical University, Ankara, Turkey, in 1973 and 1975 respectively, and his PhD degree from Northwestern University, Evanston, Illinois, in 1981. Dr. Caglayan was an instructor at DePaul University, Northwestern University and later an assistant professor at University of Petroleum and Minerals, Dhahran, Saudi Arabia. He served as a computer scientist in BASF AG, Ludwigshafen, Germany. Dr. Caglayan is currently a full professor in the Department of Computer Engineering, Bogazici University, Istanbul. His research interests are mainly in computer and network security, formal models and analysis of security and secure software design.

Last updated: September 4, 2013