Articles with "security sensitive" as a keyword



Photo by jontyson from unsplash

Scheduling for Workflows with Security-Sensitive Intermediate Data by Selective Tasks Duplication in Clouds

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Parallel and Distributed Systems"

DOI: 10.1109/tpds.2017.2678507

Abstract: With the wide deployment of cloud computing in many business enterprises as well as science and engineering domains, high quality security services are increasingly critical for processing workflow applications with sensitive intermediate data. Unfortunately, most… read more here.

Keywords: selective tasks; intermediate data; time; security sensitive ... See more keywords