A novel authorization delegation scheme for multimedia social networks by using proxy re-encryption
W Feng, Z Zhang, J Wang, L Han - Multimedia Tools and Applications, 2016 - Springer
To solve the existing problem of the multimedia social networks platforms, for instance, the
copyrighted or private multimedia content can not be safely shared among users, we …
copyrighted or private multimedia content can not be safely shared among users, we …
[PDF][PDF] Grid and cloud computing security: A comparative survey
The major purpose of this article is to know the security requirements and their solutions in
grid and cloud computing environments. We first focused generally on the security issue in …
grid and cloud computing environments. We first focused generally on the security issue in …
A high performance UCON and semantic-based authorization framework for grid computing
Authorization infrastructures are an important and integral part of grid computing which
facilitate access control functions to protect resources. This paper presents an authorization …
facilitate access control functions to protect resources. This paper presents an authorization …
Parallel access control model in cross-domain grid computing environment
S Namane, N Ghoualmi - … Journal of Embedded and Real-Time …, 2018 - igi-global.com
Despite the various attractive features that grid computing has to offer, it has many great
security challenges, such as access control. With the expansion of the network scale, a large …
security challenges, such as access control. With the expansion of the network scale, a large …
Weighted grid authorization graph (WGAG)
S Namane, M Kaiiali, N Ghoualmi… - 2017 Sixth …, 2017 - ieeexplore.ieee.org
Grid is a collection of distributed computing resources. These resources are available over a
local or wide area network that appears to an end user or application as one large virtual …
local or wide area network that appears to an end user or application as one large virtual …
[PDF][PDF] Cross-Domain, Single Resource Authorization using HCM
Grid is a heterogeneous and very dynamic environment where a scalable authorization
system is needed. Existing grid authorization systems adopt mechanisms for storing …
system is needed. Existing grid authorization systems adopt mechanisms for storing …
Improved Access Control Mechanisms Using Action Weighted Grid Authorization Graph for Faster Decision Making
Access control mechanisms are the way to guarantee secure access to grid resources.
Recent research works were focused on how to improve the representation of the resources' …
Recent research works were focused on how to improve the representation of the resources' …
[PDF][PDF] Two-Level Grid Access Control Model Based on Resource Performance and Request Priority
S Namane, N Ghoualmi - ijcna.org
This paper summarizes all the mechanisms presented previously to efficiently represent grid
computing security policies. The prime advantage of this work is to reduce the complexity by …
computing security policies. The prime advantage of this work is to reduce the complexity by …