[C25] Ali Reza Ghavamipour, Fatih Turkmen, Rui Wang, Kaitai Liang, Federated Synthetic Data Generation with Security Guarantees, ACM Symposium on Access Control Models and Technologies (SACMAT), 2023, [Paper]
[J5] Nafiseh Soveizi, Fatih Turkmen, Dimka Karastoyanova, Security and Privacy Concerns in Cloud-based Scientific and Business Workflows: A Systematic Review, Future Generation Computer Systems, 2023 [Paper]
[C24] Thijs Klooster, Fatih Turkmen, Gerben Broenink, Ruben ten Hove, Marcel Böhme, Effectiveness and Scalability of Fuzzing Techniques in CI/CD Pipelines, The 16th Intl. Workshop on Search-Based and Fuzz Testing (SBFT), In conjunction with ICSE, 2023 [Paper (Arxiv)][Code]
[J4] Mohammed Alghazwi, Fatih Turkmen, Joeri van der Velde, Dimka Karastoyanova, Blockchain for Genomics: A Systematic Literature Review, ACM Distributed Ledger Technologies: Research and Practice, 2022, [Paper]
[J3] Teimour Hosseinalizadeh, Fatih Turkmen and Nima Monshizadeh. Private Computation of Polynomials over Networks, Elsevier Systems & Control Letters, 2022, [Paper] (Extension of C)
[J2] Ali Reza Ghavamipour, Fatih Turkmen, Xiaoqian Jiang, Privacy-preserving Logistic Regression with Secret Sharing, BMC Medical Informatics and Decision Making, 2022, [Paper] [Code]
[C23] Teimour Hosseinalizadeh, Fatih Turkmen and Nima Monshizadeh. Private Computation of Polynomials over Networks, The 60th IEEE conference on Decision and Control (CDC), 2021, [Paper] [Code]
[C22] Sohyung Kim, Arianna Bisazza and Fatih Turkmen. Using Confidential Data for Domain Adaptation of Neural Machine Translation, Third Workshop on Privacy in Natural Language Processing'21 [Paper] [Code]
[C21] Fadi Mohsen, Loran Oosterhaven and Fatih Turkmen. KotlinDetector: Towards Understanding the Implications of Using Kotlin in Android Applications, MobileSoft'21 [Paper] [Code] [DataSet]
[C20] Thorsten Rangnau, Remco van Buijtenen, Frank Fransen and Fatih Turkmen. Continuous Security Testing: A Case Study onIntegrating Dynamic Security Testing Tools in CI/CD Pipelines, EDOC'20 [Paper][Code]
[C19] Alessandro Armando, Giorgia Gazzarata, Fatih Turkmen: Benchmarking UAQ Solvers, SACMAT 2020, 145-152 [Code]
[C18] (Demo) Alessandro Armando, Giorgia A. Gazzarata, Fatih Turkmen: AQUA: An Efficient Solver for the User Authorization Query Problem SACMAT 2020, 153-154
[C17] Alessandro Armando, Giorgia A. Gazzarata, Fatih Turkmen: Benchmarking UAQ Solvers: MAXSAT Instances MaxSAT Evaluation 2020, p63
[C16] Demchenko Y., Turkmen F., de Laat C., Slawik M., Defining Intercloud Security Framework and Architecture Components for Multi-Cloud Data Intensive Applications, 6th Intercloud Workshop in conjunction with CCGrid 2017
[J1] F. Turkmen, J.D. Hartog, S. Ranise, N. Zannone, Formal Analysis of XACML Policies using SMT, Computer & Security (COSE), Elsevier, 2017.
[B1] Demchenko Y., Turkmen F., de Laat C., C. Hsu, Blanchet C., Loomis C., Cloud Computing Infrastructure for Data Intensive Applications, Chapter in the Book Big Data Analytics for Sensor-Network Collected Intelligence, Elsevier 2017
[C15] F. Turkmen, M.R. Asghar, Y. Demchenko, iGenoPri: Privacy-Preserving Genomic Data Processing with Integrity and Correctness Proofs, Privacy, Security and Trust (PST) Conference, 2016 (Short)
[C14] M. Slawik, B.I. Zilci , A. Kuepper, Y. Demchenko, F. Turkmen, C. Blanchet, J.F. Gibrat, An economical security architecture for multi-cloud application deployments in federated environments, 13th International Conference on Economics of Grids, Cloud, Systems and Services (GECON), 2016
[C13] F. Turkmen, Y. Demchenko, Using SMT Solving for XACML Policy Evaluation, 2nd International Workshop on Cloud Security and Data Privacy by Design (CloudSPD) in conjunction with CloudCom, 2016
[C12] Y. Demchenko, F. Turkmen, C. deLaat, C. Blanchet, C. Loomis, Cloud Based Big Data Infrastructure: Functional Components and Automated Provisioning, Intercloud-HPC Symposium at International Conference on High Performance Computing & Simulation (HPCS), 2016
[C11] D. Mocanu, F. Turkmen., A. Liotta, Towards ABAC Policy Mining from Logs with Deep Learning, Intelligent Systems, Information Society, Ljubljana, Slovenia, 2015.
[C10] F. Turkmen, J. D. Hartog, S. Ranise, N. Zannone, Analysis of XACML Policies with SMT, 4th Conference on Principles of Security and Trust (POST), London, UK, 2015.
[C9] F. Turkmen, S. Foley, B. O'Sullivan, W. Fitzgerald, T. Hadzic, S. Basagiannis, M. Boubekeur, Explanations and Relaxations for Policy Conflicts in Physical Access Control, International Conference on Tools with Artificial Intelligence (ICTAI), Washington D.C., USA, 2013.
[C8] W. Fitzgerald, F. Turkmen, S. Foley, B. O'Sullivan, Anomaly Analysis for Physical Access Control Security Configuration, 7th International Conference on Risks and Security of Internet and Systems (CRiSIS), October 2012.
[C7] A. Armando, S. Ranise, F. Turkmen., B. Crispo, Efficient Run-time Solving of RBAC User Authorization Queries, Second ACM Conference on Data and Application Security and Privacy (CODASPY), 2012.
[C6] F. Turkmen, E. Jung, B. Crispo, Towards Run-time Verification in Access Control, IEEE International Symposium on Policies for Distributed Systems and Networks (Policy), Pisa, Italy, June, 2011.
[C5] A. Artale, B. Crispo, F. Giunchiglia, F. Turkmen, R. Zhang, Reasoning about Relation Based Access Control, 4th International Conference on Network and System Security (NSS), Melbourne, Australia, September, 2010.
[C4] F. Turkmen, P. Mazzoleni, B. Crispo, A Service-based Context Management Framework for Cross-enterprise Collaboration, Symposium on Applied Computing (SAC), March 2010. 2008
[C3] F. Turkmen, B. Crispo, Performance Evaluation of XACML PDP Implementations, Secure Web Services (SWS), In Conjunction with 15th ACM Conference on Computer and Communications Security (CCS-15), 2008.
[C2] F. Turkmen, P. Mazzoleni, B. Crispo, E. Bertino, P-CDN: Extending Access Control Capabilities of P2P Systems To Provide CDN services, IEEE Symposium on Computers and Communications (ISCC), 2008.
[C1] I.H. Suslu, F. Turkmen, M. Balman, T. Kosar, Choosing Between Remote I/O versus Staging in Large Scale Distributed Applications, 21st International Conference on Parallel and Distributed Computing and Communication Systems (PDCCS), 2008.
[P3] Leon Visscher, Mohammed Alghazwi, Dimka Karastoyanova, Fatih Turkmen, Privacy-preserving Genome Analysis using Verifiable Off-Chain Computation, ACM Conference on Computer and Communications Security (CCS) 2022 [Paper][Code]
[P2] M. Alghazwi, F. Turkmen, D. Karastoyanova, A Self-Sovereign Identity Framework for Patient-Centric Access Management, ICT-Open 202 (Poster).
[P1] F. Turkmen, J. D. Hartog, N. Zannone, Analyzing Access Control Policies with SMT, 21st ACM Conference on Computer and Communications Security (CCS), Scottsdale, Arizona, USA, 2014 (Poster).
[R2] F. Turkmen, W. Fitzgerald, S. Foley, B. U'Sullivan, Explanations and Relaxations for Anomaly Analysis in Physical Access Control Policies, Technical Report, University College Cork (UCC), 2013.
[R1] F. Turkmen, L. Kagal, B. Crispo, Interoperability in Access Control: A XACML and RIF Demonstration, Technical Report, Massachusetts Institute of Technology (MIT), 2009. [Paper]
 F. Turkmen, Simplified eXtensible Access Control Markup Language (XACML) EBNF, 2008 (pdf).
 F. Turkmen, Grid Basics and Data Management On Grids, 6th Annual Academic Computing of Turkey, Denizli, Turkey, 2006 (In Turkish, pdf).
 F. Turkmen, I. Korkmaz , A Survey of Pervasive Computing, Biltek 2005, Eskisehir, Turkey, 2005.
 S. Kondakci, S. Kumova, F. Turkmen, I. Korkmaz, Analysis of risk profiles for network security, 5th Annual Academic Computing of Turkey, 2005 (In Turkish).
 G. Dalkilic. F. Turkmen, Parallel Ant Colony Optimization, Yuksek Performansli Bilisim Sempozyumu (YPBS), GYTE, Kocaeli, 2002 (In Turkish).f