Please use this identifier to cite or link to this item: https://idr.l3.nitk.ac.in/jspui/handle/123456789/7971
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAnupa, J.
dc.contributor.authorSekaran, K.C.
dc.date.accessioned2020-03-30T10:03:13Z-
dc.date.available2020-03-30T10:03:13Z-
dc.date.issued2014
dc.identifier.citationProceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014, 2014, Vol., , pp.1598-1607en_US
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/7971-
dc.description.abstractThe cloud revolution has helped enterprises to improve their business and performance by providing them computing power, storage capabilities and a variety of services for very less or no infrastructure and reasonable cost. It also provisioned the scientific and academic communities to run complex applications involving large data sets, high performance or distributed resources. The Workflow Management Systems (WfMSs) help the enterprises in automation of their business processes and thus help the management to take critical decisions fast. Cloud Workflows club the advantages of both Cloud Computing and WfMSs. In spite of the advantages of the cloud, security is a major area of concern. The use of WfMSs for critical and strategic applications, which is common in case of Business and Scientific community, gives rise to major concerns regarding the threats against integrity, authorization, availability etc. The concept of running secure workflow instances on public cloud processing platforms is still in its infancy. This paper gives an overview of workflow management systems, cloud computing, cloud workflows and security in these areas. This paper also provides a survey on security mechanisms for WfMSs and Cloud Workflows. � 2014 IEEE.en_US
dc.titleCloud workflow and security: A surveyen_US
dc.typeBook chapteren_US
Appears in Collections:2. Conference Papers

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.