2013 IEEE International Conference on Cloud Engineering (IC2E) 2013
DOI: 10.1109/ic2e.2013.22
|View full text |Cite
|
Sign up to set email alerts
|

Partitioning and Cloud Deployment of Composite Web Services under Security Constraints

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(21 citation statements)
references
References 17 publications
0
21
0
Order By: Relevance
“…This will mainly consist in experimenting our approach on real use cases. Another point is the lack of automation of our methodology, which is currently addressed by extending the prototype developed in [11]: in addition to fragmenting processes and deploying them on clouds, it will conduct automated risk assessments and transform the structure to enhance security.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…This will mainly consist in experimenting our approach on real use cases. Another point is the lack of automation of our methodology, which is currently addressed by extending the prototype developed in [11]: in addition to fragmenting processes and deploying them on clouds, it will conduct automated risk assessments and transform the structure to enhance security.…”
Section: Discussionmentioning
confidence: 99%
“…As each activity of the process may not have the same security or functional requirements, it can be interesting to have a more heterogeneous deployment configuration in order to decrease costs or increase the Quality of Service. A contribution to such problems can be found in our previous work [11]. d) Security control implementation: (Fig.5.6).…”
Section: B Methodologymentioning
confidence: 97%
See 1 more Smart Citation
“…[10] describes a method of partitioning workflow over clouds. It incorporates the security constraints of [1], and adds others (e.g.…”
Section: Related Workmentioning
confidence: 99%
“…Answering this question depends on how to manage issues related to confidentiality and trust relationships [30]. Software designers can deploy software components on different clouds by: (1) partitioning software activities over different clouds according to the required level of security for each activity [12], (2) applying software product lines technology [11] or feature modeling [10], (3) considering constraints related to data placement [17,28], or (4) considering cost and performance issues [4,13]. However, it is a challenging task to manage the tradeoff between conflicting operational characteristics -such as performance and security -while assigning part of the software to a private cloud and another part to a public cloud.…”
Section: Introductionmentioning
confidence: 99%