{"title":"Scheduling Workflows under Authorization Control","authors":"Nadeem Chaudhary, Mohammad A. Alghamdi","doi":"10.1109/UCC.2015.113","DOIUrl":null,"url":null,"abstract":"The management of the workflows on computer resources and their scheduling is the main topic of much of the research. In many cases the security involvement is equally important with the performance of the system. In normal scheduling techniques the jobs are presented in the form of DAGs and then scheduled on to the resources. In this work we pass-through the tasks from the authorization policies constraints [12], which are implemented through role-based authorization policy. This process affects the performance for application and system. This work schedules the tasks passed through authorization constraints and compares it with the normal scheduling in order to determine the effect of the authorization constraints. Further this work uses duplication technique to improve the performance by using selective resources for duplication. Experiments are conducted to verify the effectiveness of the technique.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UCC.2015.113","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The management of the workflows on computer resources and their scheduling is the main topic of much of the research. In many cases the security involvement is equally important with the performance of the system. In normal scheduling techniques the jobs are presented in the form of DAGs and then scheduled on to the resources. In this work we pass-through the tasks from the authorization policies constraints [12], which are implemented through role-based authorization policy. This process affects the performance for application and system. This work schedules the tasks passed through authorization constraints and compares it with the normal scheduling in order to determine the effect of the authorization constraints. Further this work uses duplication technique to improve the performance by using selective resources for duplication. Experiments are conducted to verify the effectiveness of the technique.