Automatically finding execution scenarios to deploy security-sensitive workflows.
Daniel Ricardo dos SantosSilvio RaniseLuca CompagnaSerena Elisa PontaPublished in: J. Comput. Secur. (2017)
Keyphrases
- intrusion detection
- scientific workflows
- data processing
- network security
- automatically generated
- real world
- control flow
- security requirements
- information security
- workflow execution
- security threats
- security mechanisms
- web services
- network management
- security issues
- security management
- computer security
- key management
- neural network
- workflow engine
- data rich
- data mining
- security systems
- access control
- intrusion detection system
- cloud computing
- business processes
- workflow management systems
- data flow
- business process
- learning scenarios