{"id":"https://openalex.org/W2972104461","doi":"https://doi.org/10.1109/codit.2019.8820685","title":"FSM Modeling of Testing Security Policies for MapReduce Frameworks","display_name":"FSM Modeling of Testing Security Policies for MapReduce Frameworks","publication_year":2019,"publication_date":"2019-04-01","ids":{"openalex":"https://openalex.org/W2972104461","doi":"https://doi.org/10.1109/codit.2019.8820685","mag":"2972104461"},"language":"en","primary_location":{"id":"doi:10.1109/codit.2019.8820685","is_oa":false,"landing_page_url":"https://doi.org/10.1109/codit.2019.8820685","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 6th International Conference on Control, Decision and Information Technologies (CoDIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072252492","display_name":"Sara Hsaini","orcid":"https://orcid.org/0000-0001-6551-7607"},"institutions":[{"id":"https://openalex.org/I3121676899","display_name":"Universit\u00e9 Ibn-Tofail","ror":"https://ror.org/02wj89n04","country_code":"MA","type":"education","lineage":["https://openalex.org/I3121676899"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Sara Hsaini","raw_affiliation_strings":["Faculty of sciences, Ibn Tofail University, Kenitra, Morocco"],"affiliations":[{"raw_affiliation_string":"Faculty of sciences, Ibn Tofail University, Kenitra, Morocco","institution_ids":["https://openalex.org/I3121676899"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080106317","display_name":"Salma Azzouzi","orcid":"https://orcid.org/0000-0001-8122-4185"},"institutions":[{"id":"https://openalex.org/I3121676899","display_name":"Universit\u00e9 Ibn-Tofail","ror":"https://ror.org/02wj89n04","country_code":"MA","type":"education","lineage":["https://openalex.org/I3121676899"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Salma Azzouzi","raw_affiliation_strings":["Faculty of sciences, Ibn Tofail University, Kenitra, Morocco"],"affiliations":[{"raw_affiliation_string":"Faculty of sciences, Ibn Tofail University, Kenitra, Morocco","institution_ids":["https://openalex.org/I3121676899"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023376672","display_name":"My El Hassan Charaf","orcid":"https://orcid.org/0000-0002-0388-461X"},"institutions":[{"id":"https://openalex.org/I3121676899","display_name":"Universit\u00e9 Ibn-Tofail","ror":"https://ror.org/02wj89n04","country_code":"MA","type":"education","lineage":["https://openalex.org/I3121676899"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"My El Hassan Charaf","raw_affiliation_strings":["Faculty of sciences, Ibn Tofail University, Kenitra, Morocco"],"affiliations":[{"raw_affiliation_string":"Faculty of sciences, Ibn Tofail University, Kenitra, Morocco","institution_ids":["https://openalex.org/I3121676899"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5072252492"],"corresponding_institution_ids":["https://openalex.org/I3121676899"],"apc_list":null,"apc_paid":null,"fwci":4.0803,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.94271332,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"11","issue":null,"first_page":"1480","last_page":"1485"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8751771450042725},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6424372792243958},{"id":"https://openalex.org/keywords/xacml","display_name":"XACML","score":0.6128231883049011},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5463814735412598},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5131924748420715},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.49906277656555176},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.47129857540130615},{"id":"https://openalex.org/keywords/formalism","display_name":"Formalism (music)","score":0.4706372916698456},{"id":"https://openalex.org/keywords/queue","display_name":"Queue","score":0.4689815640449524},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.4434128403663635},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42631155252456665},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.41569364070892334},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.4025340676307678},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.22296422719955444},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2136537730693817}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8751771450042725},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6424372792243958},{"id":"https://openalex.org/C2779886121","wikidata":"https://www.wikidata.org/wiki/Q288682","display_name":"XACML","level":3,"score":0.6128231883049011},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5463814735412598},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5131924748420715},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.49906277656555176},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.47129857540130615},{"id":"https://openalex.org/C73301696","wikidata":"https://www.wikidata.org/wiki/Q5469984","display_name":"Formalism (music)","level":3,"score":0.4706372916698456},{"id":"https://openalex.org/C160403385","wikidata":"https://www.wikidata.org/wiki/Q220543","display_name":"Queue","level":2,"score":0.4689815640449524},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.4434128403663635},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42631155252456665},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.41569364070892334},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4025340676307678},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.22296422719955444},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2136537730693817},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C558565934","wikidata":"https://www.wikidata.org/wiki/Q2743","display_name":"Musical","level":2,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/codit.2019.8820685","is_oa":false,"landing_page_url":"https://doi.org/10.1109/codit.2019.8820685","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 6th International Conference on Control, Decision and Information Technologies (CoDIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6399999856948853,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W77725733","https://openalex.org/W119564539","https://openalex.org/W192814132","https://openalex.org/W1583428044","https://openalex.org/W2025618033","https://openalex.org/W2086530596","https://openalex.org/W2087822702","https://openalex.org/W2125129370","https://openalex.org/W2129083927","https://openalex.org/W2139055385","https://openalex.org/W2198282235","https://openalex.org/W2280393123","https://openalex.org/W2484284042","https://openalex.org/W2492668260","https://openalex.org/W2616622579","https://openalex.org/W2793931479","https://openalex.org/W2907827804","https://openalex.org/W2963535602","https://openalex.org/W4254309703","https://openalex.org/W6607754154","https://openalex.org/W6634968737","https://openalex.org/W6695471592","https://openalex.org/W6721860471"],"related_works":["https://openalex.org/W2351416088","https://openalex.org/W2349247816","https://openalex.org/W2198182223","https://openalex.org/W2114574764","https://openalex.org/W1552878720","https://openalex.org/W130718849","https://openalex.org/W2348423860","https://openalex.org/W2544881096","https://openalex.org/W2400010433","https://openalex.org/W2186398450"],"abstract_inverted_index":{"Nowadays,":[0],"MapReduce":[1,42,74],"becomes":[2],"one":[3],"of":[4,16,41],"the":[5,39,107],"most":[6],"common":[7],"computational":[8],"paradigms":[9],"that":[10,115],"provide":[11],"an":[12],"efficient":[13],"parallel":[14],"processing":[15],"large-scale":[17],"data":[18,30],"especially":[19],"in":[20,23,43,73,122],"public":[21,45],"clouds":[22],"order":[24],"to":[25,28,48,66,82,88,110],"enable":[26],"users":[27,85,95],"process":[29],"without":[31],"considering":[32],"physical":[33],"infrastructures":[34],"and":[35],"software":[36],"installations.":[37],"However,":[38],"deployment":[40],"such":[44],"environment":[46],"needs":[47],"deal":[49],"with":[50],"many":[51],"security":[52],"threats":[53],"attacks":[54],"during":[55],"networks":[56],"communication.":[57],"In":[58],"this":[59,103],"paper,":[60],"we":[61,105],"present":[62],"a":[63,98],"novel":[64],"approach":[65],"test":[67],"Access":[68],"Control":[69],"List":[70],"(ACL)":[71],"policies":[72,120],"framework.":[75],"The":[76],"proposed":[77],"system":[78,113],"uses":[79],"these":[80,119],"ACLs":[81],"control":[83],"which":[84,94],"can":[86,96],"submit":[87],"certain":[89],"queues":[90],"as":[91,93],"well":[92],"administer":[97],"queue":[99],"for":[100],"example.":[101],"To":[102],"end,":[104],"used":[106],"FSM":[108],"formalism":[109],"write":[111],"our":[112],"specification":[114],"takes":[116],"into":[117],"account":[118],"expressed":[121],"XACML":[123],"language.":[124]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
