A multi-level security model for partitioning workflows over federated clouds

被引:0
|
作者
Paul Watson
机构
[1] Newcastle University,School of Computing Science
关键词
Cloud Computing; Cost Model; Security Requirement; Security Level; Cloud Provider;
D O I
10.1186/2192-113X-1-15
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] Research on A Multi-Level Security Assessment Model for Mobile Internet
    Tao, Liu
    AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (03): : 3207 - 3211
  • [22] Federated edge learning model based on multi-level proxy permissioned blockchain
    Ge L.
    Li H.
    Wang J.
    Tongxin Xuebao/Journal on Communications, 2024, 45 (04): : 201 - 215
  • [23] Multithreaded Clustering for Multi-level Hypergraph Partitioning
    Catalyuerek, Uemit V.
    Deveci, Mehmet
    Kaya, Kamer
    Ucar, Bora
    2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM (IPDPS), 2012, : 848 - 859
  • [24] Evolutionary Multi-Level Acyclic Graph Partitioning
    Moreira, Orlando
    Popp, Merten
    Schulz, Christian
    GECCO'18: PROCEEDINGS OF THE 2018 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, 2018, : 332 - 339
  • [25] Evolving Multi-level Graph Partitioning Algorithms
    Pope, Aaron S.
    Tauritz, Daniel R.
    Kent, Alexander D.
    PROCEEDINGS OF 2016 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2016,
  • [26] Evolutionary multi-level acyclic graph partitioning
    Orlando Moreira
    Merten Popp
    Christian Schulz
    Journal of Heuristics, 2020, 26 : 771 - 799
  • [27] Multi-level spectral graph partitioning method
    Talu, Muhammed Fatih
    JOURNAL OF STATISTICAL MECHANICS-THEORY AND EXPERIMENT, 2017,
  • [28] Evolutionary multi-level acyclic graph partitioning
    Moreira, Orlando
    Popp, Merten
    Schulz, Christian
    JOURNAL OF HEURISTICS, 2020, 26 (05) : 771 - 799
  • [29] Extending linux for multi-level security
    Wilson, George
    Weidner, Klaus
    Salem, Loulwa
    PROCEEDINGS OF THE THIRD ANNUAL SECURITY ENHANCED LINUX SYMPOSIUM, 2007, : 101 - 109
  • [30] Multi-level security requirements for hypervisors
    Karger, PA
    21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2005, : 240 - 248