[C25] Ali Reza Ghavamipour, Fatih Turkmen, Rui Wang, Kaitai Liang, Federated Synthetic Data Generation with Security Guarantees, ACM Symposium on Access Control Models and Technologies (SACMAT), 2023, [Paper]

[J5] Nafiseh Soveizi, Fatih Turkmen, Dimka Karastoyanova, Security and Privacy Concerns in Cloud-based Scientific and Business Workflows: A Systematic Review, Future Generation Computer Systems, 2023 [Paper]

[C24] Thijs Klooster, Fatih Turkmen, Gerben Broenink, Ruben ten Hove, Marcel Böhme, Effectiveness and Scalability of Fuzzing Techniques in CI/CD Pipelines, The 16th Intl. Workshop on Search-Based and Fuzz Testing (SBFT), In conjunction with ICSE, 2023 [Paper (Arxiv)][Code]


[J4] Mohammed Alghazwi, Fatih Turkmen, Joeri van der Velde, Dimka Karastoyanova, Blockchain for Genomics: A Systematic Literature Review, ACM Distributed Ledger Technologies: Research and Practice, 2022, [Paper]

[J3] Teimour Hosseinalizadeh, Fatih Turkmen and Nima Monshizadeh. Private Computation of Polynomials over Networks, Elsevier Systems & Control Letters, 2022, [Paper] (Extension of C[22])

[J2] Ali Reza Ghavamipour, Fatih Turkmen, Xiaoqian Jiang, Privacy-preserving Logistic Regression with Secret Sharing, BMC Medical Informatics and Decision Making, 2022, [Paper] [Code]


[C23] Teimour Hosseinalizadeh, Fatih Turkmen and Nima Monshizadeh. Private Computation of Polynomials over Networks, The 60th IEEE conference on Decision and Control (CDC), 2021, [Paper] [Code]

[C22] Sohyung Kim, Arianna Bisazza and Fatih Turkmen. Using Confidential Data for Domain Adaptation of Neural Machine Translation, Third Workshop on Privacy in Natural Language Processing'21 [Paper] [Code]

[C21] Fadi Mohsen, Loran Oosterhaven and Fatih Turkmen. KotlinDetector: Towards Understanding the Implications of Using Kotlin in Android Applications, MobileSoft'21 [Paper] [Code] [DataSet]


[C20] Thorsten Rangnau, Remco van Buijtenen, Frank Fransen and Fatih Turkmen. Continuous Security Testing: A Case Study onIntegrating Dynamic Security Testing Tools in CI/CD Pipelines, EDOC'20 [Paper][Code]

[C19] Alessandro Armando, Giorgia Gazzarata, Fatih Turkmen: Benchmarking UAQ Solvers, SACMAT 2020, 145-152 [Code]

[C18] (Demo) Alessandro Armando, Giorgia A. Gazzarata, Fatih Turkmen: AQUA: An Efficient Solver for the User Authorization Query Problem SACMAT 2020, 153-154

[C17] Alessandro Armando, Giorgia A. Gazzarata, Fatih Turkmen: Benchmarking UAQ Solvers: MAXSAT Instances MaxSAT Evaluation 2020, p63


[C16] Demchenko Y., Turkmen F., de Laat C., Slawik M., Defining Intercloud Security Framework and Architecture Components for Multi-Cloud Data Intensive Applications, 6th Intercloud Workshop in conjunction with CCGrid 2017

[J1] F. Turkmen, J.D. Hartog, S. Ranise, N. Zannone, Formal Analysis of XACML Policies using SMT, Computer & Security (COSE), Elsevier, 2017.

[B1] Demchenko Y., Turkmen F., de Laat C., C. Hsu, Blanchet C., Loomis C., Cloud Computing Infrastructure for Data Intensive Applications, Chapter in the Book Big Data Analytics for Sensor-Network Collected Intelligence, Elsevier 2017


[C15] F. Turkmen, M.R. Asghar, Y. Demchenko, iGenoPri: Privacy-Preserving Genomic Data Processing with Integrity and Correctness Proofs, Privacy, Security and Trust (PST) Conference, 2016 (Short)

[C14] M. Slawik, B.I. Zilci , A. Kuepper, Y. Demchenko, F. Turkmen, C. Blanchet, J.F. Gibrat, An economical security architecture for multi-cloud application deployments in federated environments, 13th International Conference on Economics of Grids, Cloud, Systems and Services (GECON), 2016

[C13] F. Turkmen, Y. Demchenko, Using SMT Solving for XACML Policy Evaluation, 2nd International Workshop on Cloud Security and Data Privacy by Design (CloudSPD) in conjunction with CloudCom, 2016

[C12] Y. Demchenko, F. Turkmen, C. deLaat, C. Blanchet, C. Loomis, Cloud Based Big Data Infrastructure: Functional Components and Automated Provisioning, Intercloud-HPC Symposium at International Conference on High Performance Computing & Simulation (HPCS), 2016


[C11] D. Mocanu, F. Turkmen., A. Liotta, Towards ABAC Policy Mining from Logs with Deep Learning, Intelligent Systems, Information Society, Ljubljana, Slovenia, 2015.

[C10] F. Turkmen, J. D. Hartog, S. Ranise, N. Zannone, Analysis of XACML Policies with SMT, 4th Conference on Principles of Security and Trust (POST), London, UK, 2015.


[C9] F. Turkmen, S. Foley, B. O'Sullivan, W. Fitzgerald, T. Hadzic, S. Basagiannis, M. Boubekeur, Explanations and Relaxations for Policy Conflicts in Physical Access Control, International Conference on Tools with Artificial Intelligence (ICTAI), Washington D.C., USA, 2013.


[C8] W. Fitzgerald, F. Turkmen, S. Foley, B. O'Sullivan, Anomaly Analysis for Physical Access Control Security Configuration, 7th International Conference on Risks and Security of Internet and Systems (CRiSIS), October 2012.

[C7] A. Armando, S. Ranise, F. Turkmen., B. Crispo, Efficient Run-time Solving of RBAC User Authorization Queries, Second ACM Conference on Data and Application Security and Privacy (CODASPY), 2012.


[C6] F. Turkmen, E. Jung, B. Crispo, Towards Run-time Verification in Access Control, IEEE International Symposium on Policies for Distributed Systems and Networks (Policy), Pisa, Italy, June, 2011.


[C5] A. Artale, B. Crispo, F. Giunchiglia, F. Turkmen, R. Zhang, Reasoning about Relation Based Access Control, 4th International Conference on Network and System Security (NSS), Melbourne, Australia, September, 2010.

[C4] F. Turkmen, P. Mazzoleni, B. Crispo, A Service-based Context Management Framework for Cross-enterprise Collaboration, Symposium on Applied Computing (SAC), March 2010. 2008

[C3] F. Turkmen, B. Crispo, Performance Evaluation of XACML PDP Implementations, Secure Web Services (SWS), In Conjunction with 15th ACM Conference on Computer and Communications Security (CCS-15), 2008.

[C2] F. Turkmen, P. Mazzoleni, B. Crispo, E. Bertino, P-CDN: Extending Access Control Capabilities of P2P Systems To Provide CDN services, IEEE Symposium on Computers and Communications (ISCC), 2008.

[C1] I.H. Suslu, F. Turkmen, M. Balman, T. Kosar, Choosing Between Remote I/O versus Staging in Large Scale Distributed Applications, 21st International Conference on Parallel and Distributed Computing and Communication Systems (PDCCS), 2008.


[P3] Leon Visscher, Mohammed Alghazwi, Dimka Karastoyanova, Fatih Turkmen, Privacy-preserving Genome Analysis using Verifiable Off-Chain Computation, ACM Conference on Computer and Communications Security (CCS) 2022 [Paper][Code]

[P2] M. Alghazwi, F. Turkmen, D. Karastoyanova, A Self-Sovereign Identity Framework for Patient-Centric Access Management, ICT-Open 202 (Poster).

[P1] F. Turkmen, J. D. Hartog, N. Zannone, Analyzing Access Control Policies with SMT, 21st ACM Conference on Computer and Communications Security (CCS), Scottsdale, Arizona, USA, 2014 (Poster).

Technical Reports 

[R2] F. Turkmen, W. Fitzgerald, S. Foley, B. U'Sullivan, Explanations and Relaxations for Anomaly Analysis in Physical Access Control Policies, Technical Report, University College Cork (UCC), 2013.

[R1] F. Turkmen, L. Kagal, B. Crispo, Interoperability in Access Control: A XACML and RIF Demonstration, Technical Report, Massachusetts Institute of Technology (MIT), 2009. [Paper]


[5] F. Turkmen, Simplified eXtensible Access Control Markup Language (XACML) EBNF, 2008 (pdf).

[4] F. Turkmen, Grid Basics and Data Management On Grids, 6th Annual Academic Computing of Turkey, Denizli, Turkey, 2006 (In Turkish, pdf).

[3] F. Turkmen, I. Korkmaz , A Survey of Pervasive Computing, Biltek 2005, Eskisehir, Turkey, 2005.

[2] S. Kondakci, S. Kumova, F. Turkmen, I. Korkmaz, Analysis of risk profiles for network security, 5th Annual Academic Computing of Turkey, 2005 (In Turkish).

[1] G. Dalkilic. F. Turkmen, Parallel Ant Colony Optimization, Yuksek Performansli Bilisim Sempozyumu (YPBS), GYTE, Kocaeli, 2002 (In Turkish).f