Computer Engineering / Bilgisayar Mühendisliği

Permanent URI for this collectionhttps://hdl.handle.net/11147/10

Browse

Search Results

Now showing 1 - 10 of 22
  • Editorial
    Message From the Symposium Chairs: Isssr 2022
    (IEEE, 2022) Wong, W. Eric; Wotawa, Franz; Zheng, Liwei; Tuğlular, Tuğkan
    Security, safety, and reliability are the three most important attributes of a system. This is especially the case for mission-critical and life-threatening systems. As the complexity of many systems continues to grow, ensuring security, safety, and reliability has become very critical. Not only does existing technology and tool support need to be enhanced, but we also need new strategies and approaches to satisfy more strict requirements on system security, safety, and reliability. In response to this challenge, the Steering Committee of ISSSR has decided to change its conference name from International Symposium on System and Software Reliability to International Symposium on System Security, Safety, and Reliability. The acronym ISSSR is still the same, but the full name has been slightly modified to emphasize the importance of security, safety, and reliability of many systems.
  • Conference Object
    Citation - WoS: 3
    Citation - Scopus: 2
    Heterogeneous Modeling and Testing of Software Product Lines
    (IEEE, 2021) Belli, Fevzi; Tuğlular, Tuğkan; Ufuktepe, Ekincan
    Software product line (SPL) engineering is a widely accepted approach to systematically realizing software reuse in an industrial environment. Feature models, a centerpiece of most SPL engineering techniques, are appropriate to model the variability and the structure of SPLs, but not their behavior. This paper uses the idea to link feature modeling to model-based behavior modeling and to determine the test direction (top-down or bottom-up) based on the variability binding. This heterogeneous modeling enables a holistic system testing for validating both desirable (positive) and undesirable (negative) properties of the SPL and variants. The proposed approach is validated by a non-trivial example and evaluated by comparison.
  • Conference Object
    Coverage Guided Multiple Base Choice Testing
    (IEEE, 2020) Tuğlular, Tuğkan; Leblebici, Onur
    A coverage guided input domain testing approach is presented with a feedback loop-controlled testing workflow and a tool is developed to support this workflow. Multiple base choices coverage criterion (MBCC) is chosen for systematic unit test generation in the proposed approach and branch coverage information is utilized as feedback to improve selection of bases, which results in improved branch coverage. The proposed workflow is supported with the tool designed and developed for coverage guided MBCC-based unit testing.
  • Article
    Bağlamsal Doğrulama için Bir Yazılım Tasarım Şablonu
    (Dokuz Eylül Üniversitesi, 2017) Tuğlular, Tuğkan
    Yazılım tasarım şablonları, tekrar eden yazılım tasarım problemleri için hazır çözümler sunar. Model-Görünüm-Denetçi (İng. MVC) gibi bileşik tasarım şablonları ise, var olan tasarım şablonlarının biraraya getirilmesi ile daha büyük ölçekli problemleri çözmek için geliştirilmektedir. Bu çalışmada bağlamsal doğrulama problemi için bir bileşik tasarım şablonu geliştirilmiştir. Bağlamsal doğrulama, bir işlem gerçekleş- tirilmeden önce o işlem için gerekli tüm nesnelerin gerekli koşulları sağladığının doğrulanması anlamına gelmektedir. Bileşik tasarım şablonu geliştirme yöntemi ile ortaya konan bağlamsal doğrulama tasarım şablonu; tek sorumluluk, açık-kapalı ve bağımlılığı tersine çevirme nesne temelli tasarım ilkelerine göre geliştirilmiştir. Geliştirilen bağlamsal doğrulama tasarım şablonu bünyesinde Ziyaretçi, Strateji, Dekoratör ve Bildirim tasarım şablonlarını barındırmaktadır. Ortaya konan bağlamsal doğrulama tasarım şablonu, kullanım şekli itibariyle iki örnek uygulama üzerinde tartışılmıştır.
  • Conference Object
    Citation - WoS: 1
    Automatic Enforcement of Location Aware User Based Network Access Control Policies
    (World Scientific and Engineering Academy and Society, 2008) Tuğlular, Tuğkan
    Multiple interconnected network segments distributed across various locations, such as corporate networks, where users or employees constantly travel among segments and require to access servers, need to have network access control mechanisms that are able to adapt to these location changes. The idea of a firewall changing or adapting its rules depending on the location of users is presented by an architecture in this paper. This architecture proposes deployment of a policy server at the management level and policy agents at the firewall level, so that policy-driven network security management is enabled by specifying location aware user based network access control policies at the network security management and enforcing them at the managed firewalls. The architecture presented in this paper utilizes user VPN connection event triggers for dynamic policy configuration and automated policy deployment to firewalls. Location aware user based network access control policies, which are management level policies, are implemented using XACML. A network level policy is usually a configuration, or policy, file local to the firewall. The policy agent incorporated into the firewall performs the mapping from management level policy to firewall policy.
  • Conference Object
    Belge Sorumluluk İş-birliği Modelleme Yöntemi ile Otomatik Kod Üretimi
    (IEEE, 2020) Tuğlular, Tuğkan; Leblebici, Onur
    UML is highly preferred for design in current software development approaches. However, the conceptual gap between entities in business processes and classes in UML designs is not small. To reduce this gap, this paper proposes using documents that are vital to every business. The proposed new method called Document Responsibility Collaboration puts the concept of documents at the center. In the proposed method, documents are meta-models of classes in terms of programming, and at the same time, they are meta-models of relationships in terms of permanence. The proposed Document Responsibility Collaboration method uses the domain concept in which domains are made up of documents, and a document defined in a domain can work with another document in any domain to fulfill its responsibility. Document Responsibility Collaboration method defines a process, which starts at the transition from analysis to design phase and continues to the code generation phase. An example from the order management domain is provided to validate the recommended method. © 2020 IEEE.
  • Conference Object
    Citation - WoS: 1
    Citation - Scopus: 1
    Mutation Operators for Decision Table-Based Contracts Used in Software Testing
    (Institute of Electrical and Electronics Engineers, 2020) Khalilov, Abbas; Tuğlular, Tuğkan; Belli, Fevzi
    The Design by Contract technique allows developers to improve source code with contracts, and testing using contracts helps to identify faults. However, the source code of the program under test is not always available. With black-box testing, it is possible to generate contracts from specifications of the software. In this paper, we apply mutation analysis on a model of a given specifications, where mutants are initially gained by applying proposed in this paper certain mutation operators on corresponding model, and then mutated specifications are examined. © 2020 IEEE.
  • Conference Object
    Citation - Scopus: 4
    Test Case Generation for Firewall Implementation Testing Using Software Testing Techniques
    (Tafford Publishing, 2008) Tuğlular, Tuğkan
    The firewall implementation testing approach checks actions performed by the firewall with respect to corresponding firewall rules. This type of firewall testing can be implemented by developing test cases from firewall rule sequence, generating test packets using those test cases and injecting those test packets into the firewall. Although this method has been already defined in the academic world, an approach to generate test cases does not exist in the literature. In this work, a test case generation approach is developed using software testing techniques. © 2008 Atilla Elçi.
  • Conference Object
    Monitoring of Policy Operations in a Distributed Firewall Environment
    (2008) Çakı, Oğuzhan; Tuğlular, Tuğkan; Çetin, Füsun
    Distributed firewalls concept has been introduced to overcome some drawbacks of traditional firewalls. Distributed firewall approach is based on the idea of enforcing policy rules at the intermediate and end points rather than a single entry point to the network. Management of policy rules in a distributed firewall environment requires surveillance of policy operations performed on each firewall. With this paper, we propose a monitoring architecture and its application prototype for distributed firewalls to keep track of actions, such as create, read, update, and delete, carried out on policy rule sets. We performed some emulation and laboratory experiments to obtain operational values of the proposed architecture. ©2008 by Bo?aziçi University.
  • Conference Object
    Citation - Scopus: 1
    A Semantic Based Certification and Access Control Approach Using Security Patterns on Seagent
    (Knowledge Systems Institute, 2008) Tekbacak, Fatih; Tuğlular, Tuğkan; Dikenelli, Oğuz
    In this paper, we propose a security infrastructure for communication between agents adaptable to FIPA security specifications by employing security patterns and semantic based policy descriptions. Security patterns are used as a generalized approach for generating security based services. This paper analyzes the authentication and semantic based access control among agents by using the security patterns.