A novel authorization delegation scheme for multimedia social networks by using proxy re-encryption

W Feng, Z Zhang, J Wang, L Han - Multimedia Tools and Applications, 2016 - Springer
To solve the existing problem of the multimedia social networks platforms, for instance, the
copyrighted or private multimedia content can not be safely shared among users, we …

[PDF][PDF] Grid and cloud computing security: A comparative survey

S Namane, N Goualmi - Int. J. Comput. Netw. Appl, 2019 - mail.ijcna.org
The major purpose of this article is to know the security requirements and their solutions in
grid and cloud computing environments. We first focused generally on the security issue in …

A high performance UCON and semantic-based authorization framework for grid computing

M Ibrahim, H Ibrahim, A Abdullah… - Journal of Information …, 2016 - e-journal.uum.edu.my
Authorization infrastructures are an important and integral part of grid computing which
facilitate access control functions to protect resources. This paper presents an authorization …

Parallel access control model in cross-domain grid computing environment

S Namane, N Ghoualmi - … Journal of Embedded and Real-Time …, 2018 - igi-global.com
Despite the various attractive features that grid computing has to offer, it has many great
security challenges, such as access control. With the expansion of the network scale, a large …

Weighted grid authorization graph (WGAG)

S Namane, M Kaiiali, N Ghoualmi… - 2017 Sixth …, 2017 - ieeexplore.ieee.org
Grid is a collection of distributed computing resources. These resources are available over a
local or wide area network that appears to an end user or application as one large virtual …

[PDF][PDF] Cross-Domain, Single Resource Authorization using HCM

M Kaiiali, CR Rao, R Wankar… - The International …, 2015 - researchgate.net
Grid is a heterogeneous and very dynamic environment where a scalable authorization
system is needed. Existing grid authorization systems adopt mechanisms for storing …

Improved Access Control Mechanisms Using Action Weighted Grid Authorization Graph for Faster Decision Making

S Namane, N Ghoualmi, M Kaiiali - International Journal of …, 2021 - igi-global.com
Access control mechanisms are the way to guarantee secure access to grid resources.
Recent research works were focused on how to improve the representation of the resources' …

[PDF][PDF] Two-Level Grid Access Control Model Based on Resource Performance and Request Priority

S Namane, N Ghoualmi - ijcna.org
This paper summarizes all the mechanisms presented previously to efficiently represent grid
computing security policies. The prime advantage of this work is to reduce the complexity by …

[引用][C] Enhancing the performance of advanced fine-grained grid authorization system

M Ibrahim, H Ibrahim, A Abdullah… - Journal of Computer …, 2014 - Science Publications