A multi-level security model for partitioning workflows over federated clouds

被引:0
|
作者
Paul Watson
机构
[1] Newcastle University,School of Computing Science
关键词
Cloud Computing; Cost Model; Security Requirement; Security Level; Cloud Provider;
D O I
10.1186/2192-113X-1-15
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] A multi-level security model for partitioning workflows over federated clouds
    Watson, Paul
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2012, 1
  • [2] Formalizing workflows partitioning over federated clouds: multi-level security and costs
    Freitas, Leo
    Watson, Paul
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2014, 91 (05) : 881 - 906
  • [3] A Scalable Method for Partitioning Workflows with Security Requirements over Federated Clouds
    Wen, Zhenyu
    Cala, Jacek
    Watson, Paul
    2014 IEEE 6TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2014, : 122 - 129
  • [4] Multi-Level Proactive Security Auditing for Clouds
    Majumdar, Suryadipta
    Tabiban, Azadeh
    Mohammady, Meisam
    Oqaily, Alaa
    Jarraya, Yosr
    Pourzandi, Makan
    Wang, Lingyu
    Debbabi, Mourad
    2019 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2019, : 219 - 226
  • [5] CloudS: A Multi-Cloud Storage System with Multi-Level Security
    Shen, Lu
    Feng, Shifang
    Sun, Jinjin
    Li, Zhongwei
    Su, Ming
    Wang, Gang
    Liu, Xiaoguang
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (08): : 2036 - 2043
  • [6] MCEM: Multi-Level Cooperative Exception Model for HPC Workflows
    Herbein, Stephen
    Domyancic, David
    Minner, Paul
    Laguna, Ignacio
    da Silva, Rafael Ferreira
    Ahn, Dong H.
    PROCEEDINGS OF THE 9TH INTERNATIONAL WORKSHOP ON RUNTIME AND OPERATING SYSTEMS FOR SUPERCOMPUTERS (ROSS'19), 2019, : 27 - 32
  • [7] Cost Optimization of Execution of Multi-level Deadline-Constrained Scientific Workflows on Clouds
    Malawski, Maciej
    Figiela, Kamil
    Bubak, Marian
    Deelman, Ewa
    Nabrzyski, Jarek
    PARALLEL PROCESSING AND APPLIED MATHEMATICS (PPAM 2013), PT I, 2014, 8384 : 251 - 260
  • [8] Design and Verification of Loosely Coupled Inter-Organizational Workflows with Multi-Level Security
    Mikolajczak, Boleslaw
    Gami, Nirmal
    JOURNAL OF COMPUTERS, 2008, 3 (01) : 63 - 78
  • [9] A Reliable Ring Analysis Engine for Establishment of Multi-Level Security Management in Clouds
    Moghaddam, Faraz Fatemi
    Wieder, Philipp
    Yahyapour, Ramin
    Khodadadix, Touraj
    2018 41ST INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2018, : 505 - 510
  • [10] Network security audit multi-level model BrosaAudit
    School of Computer, Beijing University of Aeronautics and Astronautics, Beijing 100083, China
    Jisuanji Gongcheng, 2006, 10 (159-160+163):