Resource allocation through optimized three-phase scheduled VMs by grey wolf optimization and introspection security analysis.
D. ArivudainambiD. DhanyaPublished in: J. Intell. Fuzzy Syst. (2019)
Keyphrases
- resource allocation
- security analysis
- optimal resource allocation
- public key
- resource allocation problems
- smart card
- security requirements
- scarce resources
- allocation problems
- resource allocation decisions
- authentication protocol
- resource allocation and scheduling
- virtual machine
- combinatorial auctions
- access control policies
- decision making
- access control