455,345 Hits in 6.4 sec

Review of Security Models Applied to Distributed Data Access [chapter]

Antonia Ghiselli, Federico Stagni, Riccardo Zappi
Euro-Par 2006: Parallel Processing  
In this paper, we explore the technologies behind the security models applied to distributed data access in a Grid environment.  ...  Our goal is to study a security model allowing data integrity, confidentiality, authentication and authorization for VO users.  ...  Introduction In this report, we will explore the technologies behind the security models applied to distributed data access in a Grid environment.  ... 
doi:10.1007/978-3-540-72337-0_5 dblp:conf/europar/GhiselliSZ06 fatcat:xhrzqr65gbelfidlbfsdtpwxuu

Literature review of security issues in saas for public cloud computing: a meta-analysis

Mohanaad Shakir, Maytham Hammood, Ahmed Kh. Muttar
2018 International Journal of Engineering & Technology  
This paper aims to prepare an ample debate of a literature review-based studies that provided important insights to researchers in the scope of security cloud computing.  ...  Moreover, cloud computing layers are likely to be jeopardized by many security risks such as privileged user access, data location, data segregation, and data recovery.  ...  Acknowledgements We thank the colleagues who provided significant input to the research presented in this paper, in particular Mohamad Yahya Abdullah, Instructor at Alburaimi University College, as well  ... 
doi:10.14419/ijet.v7i3.13075 fatcat:i3nl5ux4hnczbp3kxifhemlyve

Analysis of Suitable Security Protocols for Apply a Model of Identity in the Civil Registry of Ecuador

Moises Toapanta, Enrique Mafla, Jose Orizaga
2016 Review of Computer Engineering Research  
It turned out that security protocols should be adopted on a model of identity for a centralized data base.  ...  The goal is identify adequate security protocols to mitigate the security of information through identity of a model without relying on technological infrastructures.  ...  Prior to the creation of the conceptual model is reviewed.  ... 
doi:10.18488/journal.76/2016.3.4/ fatcat:znbpr644hjcpjifeehi6q552ly

A Context-aware Access Control Model for Pervasive Environments

Sumayah Al-Rwais, Jalal Al-Muhtadi
2010 IETE Technical Review  
The management of access decisions is distributed among the different contexts.  ...  This paper presents a framework for context-aware access control using threshold cryptography (CAAC-TC) where the administration of access control is distributed between different context services.  ...  Data Encryption: A user requests to encrypt a data object by selecting a security policy to apply it to.  ... 
doi:10.4103/0256-4602.63847 fatcat:yelasakhyjby3nzsslarmzxhn4

A Review of Network Security

El-Sayed M. El-Alfy
2007 IEEE Distributed Systems Online  
El-Alfy, "A Review of Network Security," review of Introduction to Network Security by Neal Krawetz, IEEE Distributed Systems Related Links •  ...  Cryptography is at the heart of many of the security techniques applied at different network model layers to avoid such attacks and mitigate their effects if they do occur.  ... 
doi:10.1109/mdso.2007.40 fatcat:f427zedhtnfd5a2sv4l2pbjdr4


2014 American Journal of Applied Sciences  
Rapid growth in the field of "cloud computing" also increases severe security concerns, because security has a constant issue. This study reviews security models of cloud computing.  ...  Hence, cloud computing has become the most important computing paradigm of recent world. The cloud computing is an open source and using Internet as network model.  ...  Distributed computing is a paradigm which focuses on wide range of users with a distributed access to scalable, virtualized hardware and software infrastructure.  ... 
doi:10.3844/ajassp.2014.1224.1228 fatcat:a735kermjrbspd4hupkx3zpebu

A Flexible and Reliable Architecture for Mobile Agent Security

2009 Journal of Computer Science  
Since the distributed security agent models system was built using mobile agent and net, this will develop small applications for data stores, like sequential query language server.  ...  Interaction with security agent is multi-mode providing hassle-free access to the user.  ...  in a simulation model of E-Government heterogeneous Data Bases (DB) network The Security Agent Distributed System (SADS) uses statistical models to correlate and analysis data and take the decisions to  ... 
doi:10.3844/jcssp.2009.270.274 fatcat:4aozu4jp65eg5efugjntcqwp4a

Security Aspects in Web of Data Based on Trust Principles. A brief of Literature Review

Jhon Francined Herrera-Cubides, Paulo Alonso Gaona-García, Carlos Enrique Montenegro-Marín, Diego Mauricio Cataño, Rubén González-Crespo
2022 International Journal of Communication Networks and Information Security  
However, given the data availability and its possible opening: What problems do the data opening face? This paper shows a literature review about these security aspects.  ...  Within scientific community, there is a certain consensus to define "Big Data" as a global set, through a complex integration that embraces several dimensions from using of research data, Open Data, Linked  ...  Acknowledgment This research has been development within the framework of the doctoral research project on Linked Data, at Universidad Distrital Francisco José de Caldas.  ... 
doi:10.17762/ijcnis.v11i3.4334 fatcat:cdsmfaqr6nca3njkvxawclsdua

A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography

Rose Adee, Haralambos Mouratidis
2022 Sensors  
This paper aims to create a data security model based on cryptography and steganography for data in cloud computing that seeks to reduce existing security and privacy concerns, such as data loss, data  ...  It allows users to access computer system resources as needed, particularly data storage and computational power, without managing them directly.  ...  Special thanks to Andreas Constantinou for contributing to the early parts of the research. Finally, thanks to all our peers for providing additional constructive feedback with insightful comments.  ... 
doi:10.3390/s22031109 pmid:35161853 pmcid:PMC8839104 fatcat:kie3bre67fce3cvjv5gac4jdoq

A Systematic Literature Review of Cloud Computing in Ehealth

Yan Hu, Guohua Bai
2014 Health Informatics - An International Journal  
or privacy control mechanisms of healthcare data in the cloud (n=14).  ...  However, our presented review could pinpoint that a hybrid cloud platform with mixed access control and security protection mechanisms will be a main research area for developing citizen centred home-based  ...  Based on the review, we could find that a hybrid cloud model which contains access controls and security protection techniques would be a reliable solution.  ... 
doi:10.5121/hiij.2014.3402 fatcat:2772p3xyybehzhznqmirpd37ri

Special Issue on Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing

James Park, Wanlei Zhou
2016 Entropy  
and modeling of cyber attacks with Petri Nets, and quantum flows for secret key distribution, etc.  ...  In this special issue, we mainly selected and discussed papers related with ore theories based on the graph theory to solve computational problems on cryptography and security, practical technologies;  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/e18090334 fatcat:vxubyrnfrrhdzgedsufoews4gq

A Foundation for Defining Security Requirements in Grid Computing

Antonios Gouglidis, Ioannis Mavridis
2009 2009 13th Panhellenic Conference on Informatics  
Additionally, a comparative review of current access control models is provided in the context of our proposed four-layer conceptual grid categorization.  ...  This is merely due to the lack of enough studying and defining security requirements of grid computing systems.  ...  Section IV reviews access and usage control models used in grid systems and records a number of access control requirements in regard to the conceptual four-layer categorization.  ... 
doi:10.1109/pci.2009.29 dblp:conf/pci/GouglidisM09 fatcat:43cdv3nvovhhhhq5wwklmimqi4

Evaluation Of The Data Security Methods In Cloud Computing Environments

Farhad Soleimanian Gharehchopogh, Meysam Bahari
2013 International Journal in Foundations of Computer Science & Technology  
All the models of the cloud computing depend on the resource sharing on the network due to regarding access integrity economic scale.  ...  The main goal of this research is to provide strategies for solving related issues and problem of data security which is one of the main goal of sub-structures of data security in cloud computing.  ...  Using applied security methods in Client/Server model of database server As noted before, the cloud computing model is a combination of old computing models.  ... 
doi:10.5121/ijfcst.2013.3205 fatcat:x4afdr3jbrbcrc446nmrwnfolq

Software as a service and security

Hosniara Pervin
2021 World Journal of Advanced Research and Reviews  
SaaS is superior to different applications and SaaS is savvy. This Research paper investigates the significance of SaaS for productive distributed computing for associations and its suggestions.  ...  The overview was completed in the type of an online survey. This examination paper exhibits that SaaS is safer than other web applications.  ...  Acknowledgments This Research paper investigates the significance of SaaS for productive distributed computing for associations and its suggestions.  ... 
doi:10.30574/wjarr.2021.11.3.0459 fatcat:wow5ht53k5aljnvlnbtkroov4u

Software-Enabled Distributed Network Governance: The PopMedNet Experience

Melanie Davies, Kyle Erickson, Zachary Wyner, Jessica M. Malenfant, Rob Rosen, Jeff Brown
2016 eGEMs  
Distributed Research Network Model: The distributed research network model leaves data with and under the control of the data holder.  ...  The expanded availability of electronic health information has led to increased interest in distributed health data research networks.  ...  As evidenced by the multiple distributed research networks using PopMedNet, the system can support a variety of network structures, governance models, and activities.  ... 
doi:10.13063/2327-9214.1213 pmid:27141522 pmcid:PMC4827783 fatcat:jb6iwjudonakdmjzaey2yfwqyq
« Previous Showing results 1 — 15 out of 455,345 results