Developing security-aware resource management strategies for workflows.
Ligang HeNadeem ChaudharyStephen A. JarvisPublished in: Future Gener. Comput. Syst. (2014)
Keyphrases
- resource management
- resource allocation
- management system
- qos requirements
- computing resources
- intrusion detection
- resource utilization
- grid computing
- resource usage
- quality of service
- business processes
- intelligent agents
- information security
- power control
- security issues
- web services
- admission control
- database systems
- security policies
- access control
- database security
- artificial intelligence
- real time