Kemal Bicakci
Applied Filters
- Kemal Bicakci
- AuthorRemove filter
People
Colleagues
- Kemal Bicakci (38)
- Bülent Tavli (13)
- B. Crispo (5)
- Andrew S. Tanenbaum (4)
- Nart Bedin Atalay (4)
- Davut Incebacak (3)
- Hakan Ezgi Kiziloz (3)
- Ibrahim Ethem Bagci (3)
- Mustafa Yuceel (3)
- Burak Erdeniz (2)
- Chandana Gamage (2)
- Hakan Gultekin (2)
- Hakan Gurbaslar (2)
- José M. Barceló-Ordinas (2)
- Nazife Baykal (2)
- Ruken Zilan (2)
- Yusuf Uzunay (2)
- Zeydin Pala (2)
- Gene Tsudik (1)
- Osman Abul (1)
Publication
Journal/Magazine Names
- Computer Standards & Interfaces (5)
- Ad Hoc Networks (2)
- Computer Networks: The International Journal of Computer and Telecommunications Networking (2)
- Computers and Security (2)
- ACM Transactions on Internet Technology (1)
- Computers and Electrical Engineering (1)
- IEEE Communications Letters (1)
- IEEE Transactions on Computers (1)
- Information Sciences: an International Journal (1)
- International Journal of Human-Computer Studies (1)
- International Journal of Information Security (1)
- Multimedia Tools and Applications (1)
- Telecommunications Systems (1)
Proceedings/Book Names
- ACISP'05: Proceedings of the 10th Australasian conference on Information Security and Privacy (1)
- ACSAC '13: Proceedings of the 29th Annual Computer Security Applications Conference (1)
- CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy (1)
- COMPSAC '09: Proceedings of the 2009 33rd Annual IEEE International Computer Software and Applications Conference - Volume 02 (1)
- DCOSS '13: Proceedings of the 2013 IEEE International Conference on Distributed Computing in Sensor Systems (1)
- DIM '11: Proceedings of the 7th ACM workshop on Digital identity management (1)
- EMS '10: Proceedings of the 2010 Fourth UKSim European Symposium on Computer Modeling and Simulation (1)
- ESAS'05: Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks (1)
- FC'11: Proceedings of the 2011 international conference on Financial Cryptography and Data Security (1)
- ICPADS '05: Proceedings of the 11th International Conference on Parallel and Distributed Systems - Workshops - Volume 02 (1)
- ISCC '06: Proceedings of the 11th IEEE Symposium on Computers and Communications (1)
- ISCC '15: Proceedings of the 2015 IEEE Symposium on Computers and Communication (ISCC) (1)
- MOBILECLOUD '14: Proceedings of the 2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (1)
- NSPW '11: Proceedings of the 2011 New Security Paradigms Workshop (1)
- SAC '05: Proceedings of the 2005 ACM symposium on Applied computing (1)
- SIN '09: Proceedings of the 2nd international conference on Security of information and networks (1)
- SOUPS '09: Proceedings of the 5th Symposium on Usable Privacy and Security (1)
- WETICE '02: Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises (1)
Publisher
- IEEE Computer Society (9)
- Association for Computing Machinery (8)
- Elsevier Science Publishers B. V. (7)
- Springer-Verlag (4)
- Elsevier Advanced Technology Publications (2)
- Elsevier North-Holland, Inc. (2)
- Kluwer Academic Publishers (2)
- Academic Press, Inc. (1)
- Elsevier Science Inc. (1)
- IEEE Press (1)
- Pergamon Press, Inc. (1)
Publication Date
Export Citations
Publications
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-article
ROSTAM: A passwordless web single sign-on solution mitigating server breaches and integrating credential manager and federated identity systems
Amin Mahnamfar
Informatics Institute, Istanbul Technical University, Istanbul, 34467, Türkiye
,Kemal Bicakci
Informatics Institute, Istanbul Technical University, Istanbul, 34467, Türkiye
Computer Engineering Department, Istanbul Technical University, Istanbul, 34467, Türkiye
Securify Information Technology and Security Training Consulting Inc., Ankara, 06378, Türkiye
,Yusuf Uzunay
Securify Information Technology and Security Training Consulting Inc., Ankara, 06378, Türkiye
AbstractThe challenge of achieving passwordless user authentication is real given the prevalence of web applications that keep asking passwords. Complicating this issue further, in an enterprise environment, a single sign-on (SSO) service is often ...
Highlights- Introduces passwordless SSO with secure credential management.
- Enhances security and privacy with a client-side Master Key encryption scheme.
- Features novel Master Key sync and recovery techniques.
- Outperforms widely adopted ...
- 0Citation
MetricsTotal Citations0
- research-article
Authentication-enabled attribute-based access control for smart homes
Melike Burakgazi Bilgen
Department of Computer Engineering, TOBB University of Economics and Technology, Ankara, Turkey
,Osman Abul
Department of Computer Engineering, TOBB University of Economics and Technology, Ankara, Turkey
,Kemal Bicakci
Informatics Institute, Istanbul Technical University, Istanbul, Turkey
International Journal of Information Security, Volume 22, Issue 2•Apr 2023, pp 479-495 • https://doi.org/10.1007/s10207-022-00639-xAbstractSmart home technologies constantly bring significant convenience to our daily lives. Unfortunately, increased security risks accompany this convenience. There can be severe consequences when unauthorized or malicious users gain access to smart ...
- 1Citation
MetricsTotal Citations1
- short-paper
Published By ACM
Published By ACM
Automated Generation of Attack Graphs Using NVD
M. Ugur Aksu
STM Defence Technologies Engineering and Trade Inc. & TOBB University of Economics and Technology Ankara, Ankara, Turkey
,Kemal Bicakci
TOBB University of Economics and Technology, Ankara, Turkey
,M. Hadi Dilek
STM Defence Technologies Engineering and Trade Inc., Ankara, Turkey
,A. Murat Ozbayoglu
TOBB University of Economics and Technology, Ankara, Turkey
,E. ıslam Tatli
STM Defence Technologies Engineering and Trade Inc., Ankara, Turkey
CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy•March 2018, pp 135-142• https://doi.org/10.1145/3176258.3176339Today's computer networks are prone to sophisticated multi-step, multi-host attacks. Common approaches of identifying vulnerabilities and analyzing the security of such networks with naive methods such as counting the number of vulnerabilities, or ...
- 30Citation
- 1,009
- Downloads
MetricsTotal Citations30Total Downloads1,009Last 12 Months161Last 6 weeks10
- research-article
Leveraging human computation for pure-text Human Interaction Proofs
Kemal Bicakci
TOBB University of Economics and Technology, Ankara, Turkey
,Hakan Ezgi Kiziloz
TOBB University of Economics and Technology, Ankara, Turkey
International Journal of Human-Computer Studies, Volume 92, Issue C•August 2016, pp 44-54 • https://doi.org/10.1016/j.ijhcs.2016.04.007Even though purely text-based Human Interaction Proofs (HIPs) have desirable usability and accessibility attributes; they could not overcome the security problems yet. Given the fact that fully automated techniques to generate pure-text HIPs securely do ...
- 0Citation
MetricsTotal Citations0
- research-article
Maximizing Wireless Sensor Network lifetime by communication/computation energy optimization of non-repudiation security service
Huseyin Ugur Yildiz
Electrical and Electronics Engineering, TOBB University of Economics and Technology, 06520, Ankara, Turkey
,Kemal Bicakci
Computer Engineering, TOBB University of Economics and Technology, 06520, Ankara, Turkey
,Bulent Tavli
Electrical and Electronics Engineering, TOBB University of Economics and Technology, 06520, Ankara, Turkey
,Hakan Gultekin
Industrial Engineering, TOBB University of Economics and Technology, 06520, Ankara, Turkey
,Davut Incebacak
Computer Engineering, Kocaeli University, 41380, Kocaeli, Turkey
Ad Hoc Networks, Volume 37, Issue P2•February 2016, pp 301-323 • https://doi.org/10.1016/j.adhoc.2015.08.026In a typical Wireless Sensor Network (WSN) application, the basic communication service is the transportation of the data collected from sensors to the base station. For prolonging the network lifetime, energy efficiency should be one of the primary ...
- 7Citation
MetricsTotal Citations7
- Article
Towards making accessible human-interaction proofs more secure and usable
Hakan Ezgi Kiziloz
TOBB University of Economics and Technology, Ankara, Turkey
,Kemal Bicakci
TOBB University of Economics and Technology, Ankara, Turkey
ISCC '15: Proceedings of the 2015 IEEE Symposium on Computers and Communication (ISCC)•July 2015, pp 607-612• https://doi.org/10.1109/ISCC.2015.7405581Human-Interaction Proof (HIP) systems are widely used to prevent malicious acts of abusers. Legitimate users, however, are not satisfied with their ease of use. The response of Google to the complaints of difficulty in solving audio reCAPTCHAs was to ...
- 0Citation
MetricsTotal Citations0
- research-article
Evaluating energy cost of route diversity for security in wireless sensor networks
Davut Incebacak
Kocaeli University, Kocaeli, Turkey
,Kemal Bicakci
TOBB University of Economics and Technology, Ankara, Turkey
,Bulent Tavli
TOBB University of Economics and Technology, Ankara, Turkey
Computer Standards & Interfaces, Volume 39, Issue C•March 2015, pp 44-57 • https://doi.org/10.1016/j.csi.2014.12.003Route diversity improves the security of Wireless Sensor Networks (WSNs) against adversaries attempting to obtain sensitive sensor data. By limiting the fraction of data relayed over each link and/or routed through each relay node, route diversity can ...
- 2Citation
MetricsTotal Citations2
- research-article
Effects of node mobility on energy balancing in wireless networks
Zeydin Pala
Mus Alparslan University, Computer Engineering Department, Mus, Turkey
,Kemal Bicakci
TOBB University of Economics and Technology, Computer Engineering Department, Ankara, Turkey
,Mustafa Turk
Firat University, Electrical and Electronics Engineering Department, Elazig, Turkey
Computers and Electrical Engineering, Volume 41, Issue C•January 2015, pp 314-324 • https://doi.org/10.1016/j.compeleceng.2014.05.015Display Omitted Utilizing mobility for energy balancing is the key insight of our work.We construct a Linear Programming (LP) framework that jointly captures data routing, mobility, and energy dissipation aspects.Mobility can improve the energy ...
- 2Citation
MetricsTotal Citations2
- research-article
The Impact of Transmission Power Control Strategies on Lifetime of Wireless Sensor Networks
Huseyin Cotuk
TOBB University of Economics and Technology, Ankara, Turkey
,Kemal Bicakci
TOBB University of Economics and Technology, Ankara, Turkey
,Bulent Tavli
TOBB University of Economics and Technology, Ankara, Turkey
,Erkam Uzun
TOBB University of Economics and Technology, Ankara, Turkey
IEEE Transactions on Computers, Volume 63, Issue 11•November 2014, pp 2866-2879 • https://doi.org/10.1109/TC.2013.151Transmission power control has paramount importance in the design of energy-efficient wireless sensor networks (WSNs). In this paper, we systematically explore the effects of various transmission power control strategies on WSN lifetime with an emphasis ...
- 14Citation
MetricsTotal Citations14
- Article
Mobile Authentication Secure against Man-in-the-Middle Attacks
MOBILECLOUD '14: Proceedings of the 2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering•April 2014, pp 273-276• https://doi.org/10.1109/MobileCloud.2014.43Current mobile authentication solutions puts a cognitive burden on users to detect and avoid Man-In-The-Middle attacks. In this paper, we present a mobile authentication protocol named Mobile-ID which prevents Man-In-The-Middle attacks without relying ...
- 1Citation
MetricsTotal Citations1
- research-article
Published By ACM
Published By ACM
Revisiting graphical passwords for augmenting, not replacing, text passwords
Murat Akpulat
Gumushane University, Gumushane, Turkey
,Kemal Bicakci
TOBB University of Economics and Technology, Ankara, Turkey
,Ugur Cil
TOBB University of Economics and Technology, Ankara, Turkey
ACSAC '13: Proceedings of the 29th Annual Computer Security Applications Conference•December 2013, pp 119-128• https://doi.org/10.1145/2523649.2523672Users generally choose weak passwords which can be easily guessed. On the other hand, adoption of alternatives to text passwords has been slow due to cost and usability factors. We acknowledge that incumbent passwords remain difficult to beat and ...
- 2Citation
- 435
- Downloads
MetricsTotal Citations2Total Downloads435Last 12 Months9
- research-article
Published By ACM
Published By ACM
LAKE: A Server-Side Authenticated Key-Establishment with Low Computational Workload
Kemal Bicakci
TOBB University of Economics and Technology
,Bruno Crispo
University of Trento
,Gabriele Oligeri
University of Trento
ACM Transactions on Internet Technology, Volume 13, Issue 2•December 2013, Article No.: 5, pp 1-27 • https://doi.org/10.1145/2542214.2542216Server-side authenticated key-establishment protocols are characterized by placing a heavy workload on the server. We propose LAKE: a new protocol that enables amortizing servers’ workload peaks by moving most of the computational burden to the clients. ...
- 0Citation
- 283
- Downloads
MetricsTotal Citations0Total Downloads283Last 12 Months1
- article
Neighbor sensor networks: Increasing lifetime and eliminating partitioning through cooperation
Kemal Bicakci
TOBB University of Economics and Technology, Turkey
,Ibrahim Ethem Bagci
Lancaster University, United Kingdom
,Bulent Tavli
TOBB University of Economics and Technology, Turkey
,Zeydin Pala
Mus Alparslan University, Turkey
Computer Standards & Interfaces, Volume 35, Issue 4•June, 2013, pp 396-402 • https://doi.org/10.1016/j.csi.2012.11.001In this paper we consider neighbor sensor networks which are defined as multiple wireless sensor networks under the administration of different authorities but located physically on the same area or close to each other. We construct a Linear Programming ...
- 3Citation
MetricsTotal Citations3
- Article
Uncovering the Impact of Minimum-Energy Routing on Lifetime of Wireless Sensor Networks
DCOSS '13: Proceedings of the 2013 IEEE International Conference on Distributed Computing in Sensor Systems•May 2013, pp 436-441• https://doi.org/10.1109/DCOSS.2013.43It is well-known that in wireless sensor networks using minimum-energy paths to transfer data from sensor nodes to base station is not an energy-balancing option and not the optimal solution if lifetime, defined as the duration till the first node in ...
- 0Citation
MetricsTotal Citations0
- article
A survey of visual sensor network platforms
Bulent Tavli
TOBB University of Economics and Technology, Ankara, Turkey
,Kemal Bicakci
TOBB University of Economics and Technology, Ankara, Turkey
,Ruken Zilan
Technical University of Catalonia, Barcelona, Spain
,Jose M. Barcelo-Ordinas
Technical University of Catalonia, Barcelona, Spain
Multimedia Tools and Applications, Volume 60, Issue 3•October 2012, pp 689-726 • https://doi.org/10.1007/s11042-011-0840-zRecent developments in low-cost CMOS cameras have created the opportunity of bringing imaging capabilities to sensor networks. Various visual sensor platforms have been developed with the aim of integrating visual data to wireless sensor applications. ...
- 30Citation
MetricsTotal Citations30
- article
A second look at the performance of neural networks for keystroke dynamics using a publicly available dataset
Yasin Uzun
Middle East Technical University, Ankara, Turkey
,Kemal Bicakci
TOBB University of Economics and Technology, Ankara, Turkey
Computers and Security, Volume 31, Issue 5•July, 2012, pp 717-726 • https://doi.org/10.1016/j.cose.2012.04.002Keystroke Dynamics, which is a biometric characteristic that depends on typing style of users, could be a viable alternative or a complementary technique for user authentication if tolerable error rates are achieved. Most of the earlier studies on ...
- 5Citation
MetricsTotal Citations5
- article
Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: The case of digital signatures
Kemal Bicakci
TOBB University of Economics and Technology, Sogutozu Cad. No: 43, Sogutozu, TR-06560, Ankara, Turkey
,Ibrahim Ethem Bagci
TOBB University of Economics and Technology, Sogutozu Cad. No: 43, Sogutozu, TR-06560, Ankara, Turkey
,Bulent Tavli
TOBB University of Economics and Technology, Sogutozu Cad. No: 43, Sogutozu, TR-06560, Ankara, Turkey
Information Sciences: an International Journal, Volume 188•April, 2012, pp 44-63 • https://doi.org/10.1016/j.ins.2011.11.018In the context of wireless sensor networks, computation/communication tradeoffs may appear in many aspects of the system design. In this paper, we present a linear programming framework to guide designers in effectively using these tradeoffs for ...
- 5Citation
MetricsTotal Citations5
- research-article
Published By ACM
Published By ACM
Johnny in internet café: user study and exploration of password autocomplete in web browsers
Kemal Bicakci
TOBB University of Economics and Technology, Ankara, Turkey
,Nart Bedin Atalay
Selcuk University, Konya, Turkey
,Hakan Ezgi Kiziloz
TOBB University of Economics and Technology, Ankara, Turkey
DIM '11: Proceedings of the 7th ACM workshop on Digital identity management•October 2011, pp 33-42• https://doi.org/10.1145/2046642.2046652One of the most popular aids adopted by users to reduce the pain suffered from the use of passwords is browsers' autocomplete feature. This feature, caching username and password after getting the user consent and using them later for automatic ...
- 5Citation
- 309
- Downloads
MetricsTotal Citations5Total Downloads309Last 12 Months8Last 6 weeks1
- research-article
Published By ACM
Published By ACM
A multi-word password proposal (gridWord) and exploring questions about science in security research and usable security evaluation
Kemal Bicakci
TOBB University of Economics and Technology, Ankara, Turkey
,Paul C. van Oorschot
Carleton University, Ottawa, ON, Canada
NSPW '11: Proceedings of the 2011 New Security Paradigms Workshop•September 2011, pp 25-36• https://doi.org/10.1145/2073276.2073280Our agenda is two-fold. First, we introduce and give a technical description of gridWord, a novel knowledge-based authentication mechanism involving elements of both text and graphical passwords. It is intended to address a new research challenge ...
- 11Citation
- 486
- Downloads
MetricsTotal Citations11Total Downloads486Last 12 Months13
- article
Maximizing lifetime of event-unobservable wireless sensor networks
Kemal Bicakci
TOBB University of Economics and Technology, Computer Engineering Department, Ankara, Turkey
,Hakan Gultekin
TOBB University of Economics and Technology, Industrial Engineering Department, Ankara, Turkey
,Bulent Tavli
TOBB University of Economics and Technology, Electrical and Electronics Engineering Department, Ankara, Turkey
,Ibrahim Ethem Bagci
TOBB University of Economics and Technology, Computer Engineering Department, Ankara, Turkey
Computer Standards & Interfaces, Volume 33, Issue 4•June, 2011, pp 401-410 • https://doi.org/10.1016/j.csi.2011.01.001In wireless sensor networks (WSNs) contextual information such as the information regarding whether, when, and where the data is collected cannot be protected using only traditional measures (e.g., encryption). Contextual information can be protected ...
- 6Citation
MetricsTotal Citations6
Author Profile Pages
- Description: The Author Profile Page initially collects all the professional information known about authors from the publications record as known by the ACM bibliographic database, the Guide. Coverage of ACM publications is comprehensive from the 1950's. Coverage of other publishers generally starts in the mid 1980's. The Author Profile Page supplies a quick snapshot of an author's contribution to the field and some rudimentary measures of influence upon it. Over time, the contents of the Author Profile page may expand at the direction of the community.
Please see the following 2007 Turing Award winners' profiles as examples: - History: Disambiguation of author names is of course required for precise identification of all the works, and only those works, by a unique individual. Of equal importance to ACM, author name normalization is also one critical prerequisite to building accurate citation and download statistics. For the past several years, ACM has worked to normalize author names, expand reference capture, and gather detailed usage statistics, all intended to provide the community with a robust set of publication metrics. The Author Profile Pages reveal the first result of these efforts.
- Normalization: ACM uses normalization algorithms to weigh several types of evidence for merging and splitting names.
These include:- co-authors: if we have two names and cannot disambiguate them based on name alone, then we see if they have a co-author in common. If so, this weighs towards the two names being the same person.
- affiliations: names in common with same affiliation weighs toward the two names being the same person.
- publication title: names in common whose works are published in same journal weighs toward the two names being the same person.
- keywords: names in common whose works address the same subject matter as determined from title and keywords, weigh toward being the same person.
The more conservative the merging algorithms, the more bits of evidence are required before a merge is made, resulting in greater precision but lower recall of works for a given Author Profile. Many bibliographic records have only author initials. Many names lack affiliations. With very common family names, typical in Asia, more liberal algorithms result in mistaken merges.
Automatic normalization of author names is not exact. Hence it is clear that manual intervention based on human knowledge is required to perfect algorithmic results. ACM is meeting this challenge, continuing to work to improve the automated merges by tweaking the weighting of the evidence in light of experience.
- Bibliometrics: In 1926, Alfred Lotka formulated his power law (known as Lotka's Law) describing the frequency of publication by authors in a given field. According to this bibliometric law of scientific productivity, only a very small percentage (~6%) of authors in a field will produce more than 10 articles while the majority (perhaps 60%) will have but a single article published. With ACM's first cut at author name normalization in place, the distribution of our authors with 1, 2, 3..n publications does not match Lotka's Law precisely, but neither is the distribution curve far off. For a definition of ACM's first set of publication statistics, see Bibliometrics
- Future Direction:
The initial release of the Author Edit Screen is open to anyone in the community with an ACM account, but it is limited to personal information. An author's photograph, a Home Page URL, and an email may be added, deleted or edited. Changes are reviewed before they are made available on the live site.
ACM will expand this edit facility to accommodate more types of data and facilitate ease of community participation with appropriate safeguards. In particular, authors or members of the community will be able to indicate works in their profile that do not belong there and merge others that do belong but are currently missing.
A direct search interface for Author Profiles will be built.
An institutional view of works emerging from their faculty and researchers will be provided along with a relevant set of metrics.
It is possible, too, that the Author Profile page may evolve to allow interested authors to upload unpublished professional materials to an area available for search and free educational use, but distinct from the ACM Digital Library proper. It is hard to predict what shape such an area for user-generated content may take, but it carries interesting potential for input from the community.
Bibliometrics
The ACM DL is a comprehensive repository of publications from the entire field of computing.
It is ACM's intention to make the derivation of any publication statistics it generates clear to the user.
- Average citations per article = The total Citation Count divided by the total Publication Count.
- Citation Count = cumulative total number of times all authored works by this author were cited by other works within ACM's bibliographic database. Almost all reference lists in articles published by ACM have been captured. References lists from other publishers are less well-represented in the database. Unresolved references are not included in the Citation Count. The Citation Count is citations TO any type of work, but the references counted are only FROM journal and proceedings articles. Reference lists from books, dissertations, and technical reports have not generally been captured in the database. (Citation Counts for individual works are displayed with the individual record listed on the Author Page.)
- Publication Count = all works of any genre within the universe of ACM's bibliographic database of computing literature of which this person was an author. Works where the person has role as editor, advisor, chair, etc. are listed on the page but are not part of the Publication Count.
- Publication Years = the span from the earliest year of publication on a work by this author to the most recent year of publication of a work by this author captured within the ACM bibliographic database of computing literature (The ACM Guide to Computing Literature, also known as "the Guide".
- Available for download = the total number of works by this author whose full texts may be downloaded from an ACM full-text article server. Downloads from external full-text sources linked to from within the ACM bibliographic space are not counted as 'available for download'.
- Average downloads per article = The total number of cumulative downloads divided by the number of articles (including multimedia objects) available for download from ACM's servers.
- Downloads (cumulative) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server since the downloads were first counted in May 2003. The counts displayed are updated monthly and are therefore 0-31 days behind the current date. Robotic activity is scrubbed from the download statistics.
- Downloads (12 months) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server over the last 12-month period for which statistics are available. The counts displayed are usually 1-2 weeks behind the current date. (12-month download counts for individual works are displayed with the individual record.)
- Downloads (6 weeks) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server over the last 6-week period for which statistics are available. The counts displayed are usually 1-2 weeks behind the current date. (6-week download counts for individual works are displayed with the individual record.)
ACM Author-Izer Service
Summary Description
ACM Author-Izer is a unique service that enables ACM authors to generate and post links on both their homepage and institutional repository for visitors to download the definitive version of their articles from the ACM Digital Library at no charge.
Downloads from these sites are captured in official ACM statistics, improving the accuracy of usage and impact measurements. Consistently linking to definitive version of ACM articles should reduce user confusion over article versioning.
ACM Author-Izer also extends ACM’s reputation as an innovative “Green Path” publisher, making ACM one of the first publishers of scholarly works to offer this model to its authors.
To access ACM Author-Izer, authors need to establish a free ACM web account. Should authors change institutions or sites, they can utilize the new ACM service to disable old links and re-authorize new links for free downloads from a different site.
How ACM Author-Izer Works
Authors may post ACM Author-Izer links in their own bibliographies maintained on their website and their own institution’s repository. The links take visitors to your page directly to the definitive version of individual articles inside the ACM Digital Library to download these articles for free.
The Service can be applied to all the articles you have ever published with ACM.
Depending on your previous activities within the ACM DL, you may need to take up to three steps to use ACM Author-Izer.
For authors who do not have a free ACM Web Account:
- Go to the ACM DL http://dl.acm.org/ and click SIGN UP. Once your account is established, proceed to next step.
For authors who have an ACM web account, but have not edited their ACM Author Profile page:
- Sign in to your ACM web account and go to your Author Profile page. Click "Add personal information" and add photograph, homepage address, etc. Click ADD AUTHOR INFORMATION to submit change. Once you receive email notification that your changes were accepted, you may utilize ACM Author-izer.
For authors who have an account and have already edited their Profile Page:
- Sign in to your ACM web account, go to your Author Profile page in the Digital Library, look for the ACM Author-izer link below each ACM published article, and begin the authorization process. If you have published many ACM articles, you may find a batch Authorization process useful. It is labeled: "Export as: ACM Author-Izer Service"
ACM Author-Izer also provides code snippets for authors to display download and citation statistics for each “authorized” article on their personal pages. Downloads from these pages are captured in official ACM statistics, improving the accuracy of usage and impact measurements. Consistently linking to the definitive version of ACM articles should reduce user confusion over article versioning.
Note: You still retain the right to post your author-prepared preprint versions on your home pages and in your institutional repositories with DOI pointers to the definitive version permanently maintained in the ACM Digital Library. But any download of your preprint versions will not be counted in ACM usage statistics. If you use these AUTHOR-IZER links instead, usage by visitors to your page will be recorded in the ACM Digital Library and displayed on your page.
FAQ
- Q. What is ACM Author-Izer?
A. ACM Author-Izer is a unique, link-based, self-archiving service that enables ACM authors to generate and post links on either their home page or institutional repository for visitors to download the definitive version of their articles for free.
- Q. What articles are eligible for ACM Author-Izer?
- A. ACM Author-Izer can be applied to all the articles authors have ever published with ACM. It is also available to authors who will have articles published in ACM publications in the future.
- Q. Are there any restrictions on authors to use this service?
- A. No. An author does not need to subscribe to the ACM Digital Library nor even be a member of ACM.
- Q. What are the requirements to use this service?
- A. To access ACM Author-Izer, authors need to have a free ACM web account, must have an ACM Author Profile page in the Digital Library, and must take ownership of their Author Profile page.
- Q. What is an ACM Author Profile Page?
- A. The Author Profile Page initially collects all the professional information known about authors from the publications record as known by the ACM Digital Library. The Author Profile Page supplies a quick snapshot of an author's contribution to the field and some rudimentary measures of influence upon it. Over time, the contents of the Author Profile page may expand at the direction of the community. Please visit the ACM Author Profile documentation page for more background information on these pages.
- Q. How do I find my Author Profile page and take ownership?
- A. You will need to take the following steps:
- Create a free ACM Web Account
- Sign-In to the ACM Digital Library
- Find your Author Profile Page by searching the ACM Digital Library for your name
- Find the result you authored (where your author name is a clickable link)
- Click on your name to go to the Author Profile Page
- Click the "Add Personal Information" link on the Author Profile Page
- Wait for ACM review and approval; generally less than 24 hours
- Q. Why does my photo not appear?
- A. Make sure that the image you submit is in .jpg or .gif format and that the file name does not contain special characters
- Q. What if I cannot find the Add Personal Information function on my author page?
- A. The ACM account linked to your profile page is different than the one you are logged into. Please logout and login to the account associated with your Author Profile Page.
- Q. What happens if an author changes the location of his bibliography or moves to a new institution?
- A. Should authors change institutions or sites, they can utilize ACM Author-Izer to disable old links and re-authorize new links for free downloads from a new location.
- Q. What happens if an author provides a URL that redirects to the author’s personal bibliography page?
- A. The service will not provide a free download from the ACM Digital Library. Instead the person who uses that link will simply go to the Citation Page for that article in the ACM Digital Library where the article may be accessed under the usual subscription rules.
However, if the author provides the target page URL, any link that redirects to that target page will enable a free download from the Service.
- Q. What happens if the author’s bibliography lives on a page with several aliases?
- A. Only one alias will work, whichever one is registered as the page containing the author’s bibliography. ACM has no technical solution to this problem at this time.
- Q. Why should authors use ACM Author-Izer?
- A. ACM Author-Izer lets visitors to authors’ personal home pages download articles for no charge from the ACM Digital Library. It allows authors to dynamically display real-time download and citation statistics for each “authorized” article on their personal site.
- Q. Does ACM Author-Izer provide benefits for authors?
- A. Downloads of definitive articles via Author-Izer links on the authors’ personal web page are captured in official ACM statistics to more accurately reflect usage and impact measurements.
Authors who do not use ACM Author-Izer links will not have downloads from their local, personal bibliographies counted. They do, however, retain the existing right to post author-prepared preprint versions on their home pages or institutional repositories with DOI pointers to the definitive version permanently maintained in the ACM Digital Library.
- Q. How does ACM Author-Izer benefit the computing community?
- A. ACM Author-Izer expands the visibility and dissemination of the definitive version of ACM articles. It is based on ACM’s strong belief that the computing community should have the widest possible access to the definitive versions of scholarly literature. By linking authors’ personal bibliography with the ACM Digital Library, user confusion over article versioning should be reduced over time.
In making ACM Author-Izer a free service to both authors and visitors to their websites, ACM is emphasizing its continuing commitment to the interests of its authors and to the computing community in ways that are consistent with its existing subscription-based access model.
- Q. Why can’t I find my most recent publication in my ACM Author Profile Page?
- A. There is a time delay between publication and the process which associates that publication with an Author Profile Page. Right now, that process usually takes 4-8 weeks.
- Q. How does ACM Author-Izer expand ACM’s “Green Path” Access Policies?
- A. ACM Author-Izer extends the rights and permissions that authors retain even after copyright transfer to ACM, which has been among the “greenest” publishers. ACM enables its author community to retain a wide range of rights related to copyright and reuse of materials. They include:
- Posting rights that ensure free access to their work outside the ACM Digital Library and print publications
- Rights to reuse any portion of their work in new works that they may create
- Copyright to artistic images in ACM’s graphics-oriented publications that authors may want to exploit in commercial contexts
- All patent rights, which remain with the original owner