MOWS: Multi-objective workflow scheduling in cloud computing based on heuristic algorithm
Cloud computing is emerging with growing popularity in workflow scheduling, especially for scientific workflow. Deploying data-intensive workflows in the cloud brings new factors to be considered during specification and scheduling. Failure to establish intermediate data security may cause informati...
Uložené v:
| Vydané v: | Simulation modelling practice and theory Ročník 93; s. 119 - 132 |
|---|---|
| Hlavní autori: | , , , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Elsevier B.V
01.05.2019
|
| Predmet: | |
| ISSN: | 1569-190X, 1878-1462 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | Cloud computing is emerging with growing popularity in workflow scheduling, especially for scientific workflow. Deploying data-intensive workflows in the cloud brings new factors to be considered during specification and scheduling. Failure to establish intermediate data security may cause information leakage or data alteration in the cloud environment. Existing scheduling algorithms for the cloud disregard the interaction among tasks and its effects on application security requirements. To address this issue, we design a new systematic method that considers both tasks security demands and interactions in secure tasks placement in the cloud. In order to respect security and performance, we formulate a model for task scheduling and propose a heuristic algorithm which is based on task’s completion time and security requirements. In addition, we present a new attack response approach to reduce certain security threats in the cloud. To do so, we introduce task security sensitivity measurement to quantify tasks security requirements. We conduct extensive experiments to quantitatively evaluate the performance of our approach, using WorkflowSim, a well-known cloud simulation tool. Experimental results based on real-world workflows show that compared with existing algorithms, our proposed solution can improved the overall system security in terms of quality of security and security risk under a wide range of workload characteristics. Additionally, our results demonstrate that the proposed attack response algorithm can effectively reduce cloud environment threats. |
|---|---|
| AbstractList | Cloud computing is emerging with growing popularity in workflow scheduling, especially for scientific workflow. Deploying data-intensive workflows in the cloud brings new factors to be considered during specification and scheduling. Failure to establish intermediate data security may cause information leakage or data alteration in the cloud environment. Existing scheduling algorithms for the cloud disregard the interaction among tasks and its effects on application security requirements. To address this issue, we design a new systematic method that considers both tasks security demands and interactions in secure tasks placement in the cloud. In order to respect security and performance, we formulate a model for task scheduling and propose a heuristic algorithm which is based on task’s completion time and security requirements. In addition, we present a new attack response approach to reduce certain security threats in the cloud. To do so, we introduce task security sensitivity measurement to quantify tasks security requirements. We conduct extensive experiments to quantitatively evaluate the performance of our approach, using WorkflowSim, a well-known cloud simulation tool. Experimental results based on real-world workflows show that compared with existing algorithms, our proposed solution can improved the overall system security in terms of quality of security and security risk under a wide range of workload characteristics. Additionally, our results demonstrate that the proposed attack response algorithm can effectively reduce cloud environment threats. |
| Author | Abazari, Farzaneh Fu, Song Takabi, Hassan Analoui, Morteza |
| Author_xml | – sequence: 1 givenname: Farzaneh orcidid: 0000-0002-2139-5684 surname: Abazari fullname: Abazari, Farzaneh email: f_abazari@iust.ac.ir organization: School of Computer Engineering, Iran University of Science and Technology, Tehran, Iran – sequence: 2 givenname: Morteza surname: Analoui fullname: Analoui, Morteza email: analoui@iust.ac.ir organization: School of Computer Engineering, Iran University of Science and Technology, Tehran, Iran – sequence: 3 givenname: Hassan surname: Takabi fullname: Takabi, Hassan email: hassan.takabi@unt.edu organization: Department of Computer Science and Engineering, University of North Texas, Denton, Texas, US – sequence: 4 givenname: Song surname: Fu fullname: Fu, Song email: song.fu@unt.edu organization: Department of Computer Science and Engineering, University of North Texas, Denton, Texas, US |
| BookMark | eNqFkMtOwzAQRS1UJNrCH7DwDyTYebsLJFTxkoq6AASsIscZtw5JXNlOK_4eR2XFAlYzczV3dOfM0KTXPSB0SUlICc2umtCqbsddGBFaeCkkJDlBU1rkRUCTLJr4Ps1YQBl5P0MzaxviF4ssn6KPp_Xb8wI_Da1Tga4aEE7tAR-0-ZStPmArtlAPreo3WPVYtHqosdDdbnCjVHELNdY93sJglHVKYN5utFFu252jU8lbCxc_dY5e725flg_Ban3_uLxZBSImmQsqKmVECgYsgbxgPnOc1BnIOIKKZ0WeRjFPUwG1pIznKaVJLgkwUpDUz4LFc5Qc7wqjrTUgy51RHTdfJSXliKdsyiOecsQzqh6Pty1-2YRy3CndO8NV-5_5-mgG_9hegSmtUND7lMp4gmWt1d8HvgFp9Yb6 |
| CitedBy_id | crossref_primary_10_1016_j_asoc_2020_106411 crossref_primary_10_3233_MGS_220218 crossref_primary_10_1002_cpe_7228 crossref_primary_10_1016_j_comnet_2020_107340 crossref_primary_10_1007_s11277_021_08263_z crossref_primary_10_1016_j_future_2023_05_015 crossref_primary_10_1007_s10586_024_04953_y crossref_primary_10_1080_02286203_2024_2437828 crossref_primary_10_1109_TGCN_2023_3283509 crossref_primary_10_1155_2021_5570192 crossref_primary_10_1016_j_eswa_2023_121038 crossref_primary_10_1007_s00607_023_01175_9 crossref_primary_10_1016_j_simpat_2021_102328 crossref_primary_10_1007_s10723_022_09625_y crossref_primary_10_1016_j_simpat_2021_102323 crossref_primary_10_1016_j_eswa_2024_123494 crossref_primary_10_1002_dac_5022 crossref_primary_10_1007_s10586_020_03208_w crossref_primary_10_1002_nem_2318 crossref_primary_10_1109_ACCESS_2023_3266294 crossref_primary_10_1016_j_eswa_2021_114886 crossref_primary_10_1093_comjnl_bxaa202 crossref_primary_10_1007_s10586_025_05369_y crossref_primary_10_1007_s10586_024_04945_y crossref_primary_10_1109_TPDS_2020_3011979 crossref_primary_10_1109_TPDS_2023_3238751 crossref_primary_10_1007_s00500_020_04931_7 crossref_primary_10_1016_j_jnca_2022_103385 crossref_primary_10_1002_spe_3376 crossref_primary_10_1016_j_eswa_2021_114915 crossref_primary_10_1007_s12065_020_00479_5 crossref_primary_10_1007_s11227_023_05873_1 crossref_primary_10_1007_s11227_022_04551_y crossref_primary_10_1016_j_procs_2023_01_170 crossref_primary_10_1016_j_simpat_2023_102864 crossref_primary_10_1155_2021_5205530 crossref_primary_10_1016_j_simpat_2020_102107 crossref_primary_10_4018_IJCAC_297100 crossref_primary_10_1007_s10586_020_03205_z crossref_primary_10_1002_cpe_7236 crossref_primary_10_1007_s10586_021_03314_3 crossref_primary_10_1080_01969722_2022_2145656 crossref_primary_10_1109_ACCESS_2020_3003304 crossref_primary_10_1007_s11227_021_03648_0 crossref_primary_10_1007_s11227_022_04690_2 crossref_primary_10_1016_j_simpat_2021_102353 crossref_primary_10_1007_s41870_024_01881_3 crossref_primary_10_1109_TNET_2022_3190730 crossref_primary_10_1016_j_simpat_2020_102217 crossref_primary_10_1145_3609108 crossref_primary_10_1109_TASE_2022_3170549 crossref_primary_10_1142_S0218126625503633 crossref_primary_10_1007_s10115_025_02416_3 |
| Cites_doi | 10.1371/journal.pone.0003197 10.1016/j.jpdc.2007.06.004 10.1186/2192-113X-1-15 10.1007/s10723-013-9282-3 10.1016/j.ins.2015.01.025 10.1016/j.future.2018.03.028 10.1016/j.future.2013.09.006 10.1785/0120000510 10.1016/j.jnca.2016.11.027 10.1093/comnet/cnt009 10.1016/j.jpdc.2014.09.002 10.1016/j.future.2012.01.006 10.1016/j.jnca.2012.07.007 10.1155/2013/350934 10.1016/j.jnca.2010.06.008 10.1016/j.jcss.2012.11.002 10.1142/S1793962317500647 10.1007/s10115-014-0755-x 10.1109/TNSM.2014.041614.120394 10.1002/cpe.4295 10.1109/71.993206 10.1016/j.future.2011.05.001 10.1109/TPDS.2017.2678507 10.1016/j.ins.2011.12.032 10.1016/j.jnca.2016.01.018 |
| ContentType | Journal Article |
| Copyright | 2018 |
| Copyright_xml | – notice: 2018 |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.simpat.2018.10.004 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1878-1462 |
| EndPage | 132 |
| ExternalDocumentID | 10_1016_j_simpat_2018_10_004 S1569190X18301515 |
| GroupedDBID | --K --M .DC .~1 0R~ 123 1B1 1~. 1~5 4.4 457 4G. 5VS 7-5 71M 8P~ AAAKF AAAKG AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AARIN AAXUO AAYFN ABAOU ABBOA ABFNM ABJNI ABMAC ABUCO ABXDB ABYKQ ACAZW ACDAQ ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADGUI ADJOM ADMUD ADTZH AEBSH AECPX AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHJVU AHZHX AIALX AIEXJ AIGVJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD APLSM ARUGR AXJTR BJAXD BKOJK BLXMC CS3 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HAMUX HVGLF HZ~ IHE J1W JJJVA KOM M41 MHUIS MO0 N9A O-L O9- OAUVE OZT P-8 P-9 PC. Q38 RIG ROL RPZ SDF SDG SES SEW SPC SPCBC SSB SSD SST SSV SSW SSZ T5K UHS ZMT ~G- 9DU AATTM AAXKI AAYWO AAYXX ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD |
| ID | FETCH-LOGICAL-c306t-b1ff2089e94e78918734d6ef32eba687523a55cedf19a751147f0e908059a7c93 |
| ISICitedReferencesCount | 63 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000462032200007&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1569-190X |
| IngestDate | Sat Nov 29 03:40:10 EST 2025 Tue Nov 18 22:03:07 EST 2025 Fri Feb 23 02:22:18 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Secure task scheduling Scientific workflows Cloud computing security Attack response |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c306t-b1ff2089e94e78918734d6ef32eba687523a55cedf19a751147f0e908059a7c93 |
| ORCID | 0000-0002-2139-5684 |
| PageCount | 14 |
| ParticipantIDs | crossref_primary_10_1016_j_simpat_2018_10_004 crossref_citationtrail_10_1016_j_simpat_2018_10_004 elsevier_sciencedirect_doi_10_1016_j_simpat_2018_10_004 |
| PublicationCentury | 2000 |
| PublicationDate | May 2019 2019-05-00 |
| PublicationDateYYYYMMDD | 2019-05-01 |
| PublicationDate_xml | – month: 05 year: 2019 text: May 2019 |
| PublicationDecade | 2010 |
| PublicationTitle | Simulation modelling practice and theory |
| PublicationYear | 2019 |
| Publisher | Elsevier B.V |
| Publisher_xml | – name: Elsevier B.V |
| References | Brown, Brady, Dietz, Cao, Johnson, McNabb (bib0057) 2007 Xiaoyong, Li, Zeng, Veeravalli (bib0029) 2011; 60 Arunarani, Manjula, Sugumaran (bib0033) 2017; 29 Calheiros, Ranjan, Beloglazov, De Rose, Buyya (bib0054) 2011; 41 Varadharajan, Tupakula (bib0019) 2014; 11 Zheng, CAO, YAO (bib0024) 2013; 8 Jacob, Katz, Prince, Berriman, Good, Laity, Deelman, Singh, Su (bib0046) 2004 Masdari, ValiKardan, Shahi, Azar (bib0005) 2016; 66 Naidu, Bhagat (bib0039) 2018; 9 Shishido, Estrella, Toledo, Arantes (bib0038) 2017 Zeng, Veeravalli, Li (bib0010) 2015; 75 Livny, Teonadi, Livny, Waldor (bib0058) 2008; 3 Leyffer, Safro (bib0042) 2013; 1 Zhao, Fei, Raicu, Lu (bib0002) 2011 Khorshed, Ali, Wasimi (bib0050) 2012; 28 Magistrale, Day, Clayton, Graves (bib0055) 2000; 90 Szabo, Sheng, Kroeger, Zhang, Yu (bib0007) 2014; 12 Olivier, van de Riet, Gudes (bib0027) 1998 (bib0056) 2018 Fard, Prodan, Barrionuevo, Fahringer (bib0026) 2012 Chen, Liu, Wen, Chen (bib0001) 2015 Lin, Wu (bib0023) 2013 Wen, Liu, Dou, Xu, Cao, Chen (bib0040) 2018 Caron, Cornabas (bib0003) 2014 Liu, Abraham, Snášel, McLoone (bib0030) 2012; 192 Wueest (bib0017) 2014 Ali, Khan, Vasilakos (bib0043) 2015; 305 Liu, Peng, Du, Wang, Zeng (bib0015) 2014; 41 Ferdaus, Murshed (bib0048) 2014 Chen, Liu, Wen, Chen, Zhou (bib0031) 2015 Sood (bib0009) 2012; 35 Watson (bib0016) 2012; 1 Singh, Chatterjee (bib0004) 2017; 79 Byun, Kee, Kim, Maeng (bib0025) 2011; 27 Yassa, Chelouah, Kadima, Granado (bib0012) 2013 Zhu, Xin, Ray (bib0020) 2005 Liu, Luo, Zhang, Zhang, Li (bib0014) 2013; 10 Zeng, Veeravalli, Li (bib0021) 2012 Lombardi, Pietro (bib0044) 2011; 34 Chen, Zhu, Qiu, Liu, Du (bib0032) 2017; 28 Zhang, Cao, Li, Khan, Hwang (bib0011) 2014; 37 Qiu, Zhang, Ming, Chen, Qin, Yang (bib0047) 2013; 79 Jianfang, Junjie, Qingshan (bib0037) 2014; 14 Xie, Sung, Qin (bib0034) 2005 Popa, Lorch, Molnar, Wang, Zhuang (bib0045) 2011 Guo, Zhao, Shen, Jiang (bib0013) 2012; 7 Sharif, Taheri, Zomaya, Nepal (bib0036) 2013 Sendi, Cheriet (bib0051) 2014 Topcuoglu, Hariri, Wu (bib0052) 2002; 13 Jiang, Lee, Arenaz, Leslie, Zomaya (bib0006) 2014 Marcon, Bittencourt, Dantas, Neves, Madeira, Fernandes, Kamienski, Barcelos, Gaspary, Fonseca (bib0035) 2013 Wang, Shi (bib0022) 2013 Mohamed, Abdelkader, El-Etriby (bib0008) 2012 Xie, Qin (bib0028) 2007; 67 Goldberg, Leyffer, Safro (bib0041) 2012 Bazm, Khatoun, Begriche, Khoukhi, Chen, Serhrouchni (bib0049) 2015 Chen, Deelman (bib0053) 2012 Abazari, Analoui, Takabi (bib0018) 2016 Sood (10.1016/j.simpat.2018.10.004_bib0009) 2012; 35 Masdari (10.1016/j.simpat.2018.10.004_bib0005) 2016; 66 Wang (10.1016/j.simpat.2018.10.004_bib0022) 2013 Xie (10.1016/j.simpat.2018.10.004_bib0028) 2007; 67 Goldberg (10.1016/j.simpat.2018.10.004_bib0041) 2012 Fard (10.1016/j.simpat.2018.10.004_bib0026) 2012 Xiaoyong (10.1016/j.simpat.2018.10.004_bib0029) 2011; 60 Liu (10.1016/j.simpat.2018.10.004_bib0015) 2014; 41 Byun (10.1016/j.simpat.2018.10.004_bib0025) 2011; 27 Magistrale (10.1016/j.simpat.2018.10.004_bib0055) 2000; 90 Brown (10.1016/j.simpat.2018.10.004_bib0057) 2007 Zeng (10.1016/j.simpat.2018.10.004_bib0021) 2012 Bazm (10.1016/j.simpat.2018.10.004_bib0049) 2015 Abazari (10.1016/j.simpat.2018.10.004_bib0018) 2016 Zhu (10.1016/j.simpat.2018.10.004_bib0020) 2005 Jiang (10.1016/j.simpat.2018.10.004_bib0006) 2014 Mohamed (10.1016/j.simpat.2018.10.004_sbref0008) 2012 Wueest (10.1016/j.simpat.2018.10.004_sbref0017) 2014 Chen (10.1016/j.simpat.2018.10.004_bib0032) 2017; 28 Watson (10.1016/j.simpat.2018.10.004_bib0016) 2012; 1 Chen (10.1016/j.simpat.2018.10.004_sbref0053) 2012 Guo (10.1016/j.simpat.2018.10.004_bib0013) 2012; 7 Jacob (10.1016/j.simpat.2018.10.004_bib0046) 2004 Szabo (10.1016/j.simpat.2018.10.004_bib0007) 2014; 12 Olivier (10.1016/j.simpat.2018.10.004_bib0027) 1998 Lin (10.1016/j.simpat.2018.10.004_bib0023) 2013 Liu (10.1016/j.simpat.2018.10.004_bib0030) 2012; 192 Leyffer (10.1016/j.simpat.2018.10.004_bib0042) 2013; 1 Chen (10.1016/j.simpat.2018.10.004_bib0001) 2015 Singh (10.1016/j.simpat.2018.10.004_bib0004) 2017; 79 Zeng (10.1016/j.simpat.2018.10.004_bib0010) 2015; 75 Chen (10.1016/j.simpat.2018.10.004_bib0031) 2015 Sharif (10.1016/j.simpat.2018.10.004_bib0036) 2013 Topcuoglu (10.1016/j.simpat.2018.10.004_bib0052) 2002; 13 Sendi (10.1016/j.simpat.2018.10.004_bib0051) 2014 Jianfang (10.1016/j.simpat.2018.10.004_bib0037) 2014; 14 Khorshed (10.1016/j.simpat.2018.10.004_bib0050) 2012; 28 Naidu (10.1016/j.simpat.2018.10.004_bib0039) 2018; 9 Zhao (10.1016/j.simpat.2018.10.004_bib0002) 2011 Lombardi (10.1016/j.simpat.2018.10.004_bib0044) 2011; 34 Qiu (10.1016/j.simpat.2018.10.004_bib0047) 2013; 79 Livny (10.1016/j.simpat.2018.10.004_bib0058) 2008; 3 Arunarani (10.1016/j.simpat.2018.10.004_bib0033) 2017; 29 Shishido (10.1016/j.simpat.2018.10.004_bib0038) 2017 Calheiros (10.1016/j.simpat.2018.10.004_bib0054) 2011; 41 Xie (10.1016/j.simpat.2018.10.004_bib0034) 2005 Caron (10.1016/j.simpat.2018.10.004_bib0003) 2014 Popa (10.1016/j.simpat.2018.10.004_bib0045) 2011 Ali (10.1016/j.simpat.2018.10.004_bib0043) 2015; 305 Varadharajan (10.1016/j.simpat.2018.10.004_bib0019) 2014; 11 Liu (10.1016/j.simpat.2018.10.004_bib0014) 2013; 10 Marcon (10.1016/j.simpat.2018.10.004_bib0035) 2013 Ferdaus (10.1016/j.simpat.2018.10.004_bib0048) 2014 Yassa (10.1016/j.simpat.2018.10.004_bib0012) 2013 Zhang (10.1016/j.simpat.2018.10.004_bib0011) 2014; 37 Zheng (10.1016/j.simpat.2018.10.004_bib0024) 2013; 8 Wen (10.1016/j.simpat.2018.10.004_bib0040) 2018 |
| References_xml | – volume: 3 start-page: E3197 year: 2008 ident: bib0058 article-title: High-throughput, kingdom-wide prediction and annotation of bacterial non-coding rnas publication-title: PLoS ONE – year: 2013 ident: bib0012 article-title: Multi-objective approach for energy-aware workflow scheduling in cloud computing environments publication-title: Sci. World J. – year: 2014 ident: bib0017 article-title: Threats to Virtual Environments – start-page: 14 year: 2005 end-page: 23 ident: bib0020 article-title: Recovering from malicious attacks in workflow systems publication-title: Database and Expert Systems Applications – year: 2018 ident: bib0056 – year: 2018 ident: bib0040 article-title: Scheduling workflows with privacy protection constraints for big data applications on cloud publication-title: Future Gener. Comput. Syst. – start-page: 179 year: 2014 end-page: 208 ident: bib0048 article-title: Energy-aware virtual machine consolidation in IAAS cloud computing publication-title: Cloud Computing – start-page: 578 year: 2015 end-page: 591 ident: bib0031 article-title: A hybrid genetic algorithm for privacy and cost aware scheduling of data intensive workflow in cloud publication-title: International Conference on Algorithms and Architectures for Parallel Processing – start-page: 534 year: 2012 end-page: 541 ident: bib0021 article-title: Scalestar: budget conscious scheduling precedence-constrained many-task workflow applications in cloud publication-title: Advanced Information Networking and Applications (AINA) – volume: 41 start-page: 23 year: 2011 end-page: 50 ident: bib0054 article-title: Cloudsim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms publication-title: Software – start-page: 517 year: 2014 end-page: 522 ident: bib0006 article-title: Optimizing scientific workflows in the cloud: a montage example publication-title: Utility and Cloud Computing (UCC) – volume: 29 start-page: E4295 year: 2017 ident: bib0033 article-title: Ffbat: a security and cost-aware workflow scheduling approach combining firefly and bat algorithms publication-title: Concurr. Comput. – start-page: 251 year: 2013 end-page: 265 ident: bib0022 article-title: On scheduling algorithms for mapreduce jobs in heterogeneous clouds with budget constraints publication-title: Principles of Distributed Systems – start-page: 39 year: 2007 end-page: 59 ident: bib0057 article-title: A case study on the use of workflow technologies for scientific analysis: gravitational wave data analysis publication-title: Workflows for e-Science – volume: 75 start-page: 141 year: 2015 end-page: 151 ident: bib0010 article-title: Saba: a security-aware and budget-aware workflow scheduling strategy in clouds publication-title: J. Parallel Distrib. Comput. – volume: 28 start-page: 2674 year: 2017 end-page: 2688 ident: bib0032 article-title: Scheduling for workflows with security-sensitive intermediate data by selective tasks duplication in clouds publication-title: IEEE Trans. Parallel Distrib. Syst. – volume: 192 start-page: 228 year: 2012 end-page: 243 ident: bib0030 article-title: Swarm scheduling approaches for work-flow applications with security constraints in distributed data-intensive computing environments publication-title: Inf. Sci. – volume: 90 start-page: S65 year: 2000 end-page: S76 ident: bib0055 article-title: The scec southern california reference three-dimensional seismic velocity model version 2 publication-title: Bull. Seismol. Soc. Am. – start-page: 35 year: 2015 end-page: 48 ident: bib0001 article-title: Research on workflow scheduling algorithms in the cloud publication-title: Process-Aware Systems – year: 2012 ident: bib0041 article-title: Optimal Response to Epidemics and Cyber Attacks in Networks, preprint ANL/MCS-1992-0112 – start-page: 147 year: 2014 end-page: 152 ident: bib0051 article-title: Cloud computing: a risk assessment model publication-title: Cloud Engineering (IC2E) – volume: 7 start-page: 547 year: 2012 end-page: 553 ident: bib0013 article-title: Task scheduling optimization in cloud computing based on heuristic algorithm publication-title: J. Netw. – start-page: 355 year: 2011 end-page: 368 ident: bib0045 article-title: Enabling security in cloud storage slas with cloudproof. publication-title: USENIX Annual Technical Conference, Vol. 242 – start-page: 455 year: 2011 end-page: 462 ident: bib0002 article-title: Opportunities and challenges in running scientific workflows on the cloud publication-title: Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC) – start-page: 300 year: 2012 end-page: 309 ident: bib0026 article-title: A multi-objective approach for workflow scheduling in heterogeneous environments publication-title: Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster – volume: 12 start-page: 245 year: 2014 end-page: 264 ident: bib0007 article-title: Science in the cloud: allocation and execution of data-intensive scientific workflows publication-title: J. Grid Comput. – start-page: 64 year: 2014 end-page: 71 ident: bib0003 article-title: Improving users’ isolation in IAAS: virtual machine placement with security constraints publication-title: Cloud Computing (CLOUD) – start-page: 1 year: 2012 end-page: 8 ident: bib0053 article-title: Workflowsim: a toolkit for simulating scientific workflows in distributed environments publication-title: E-Science (e-Science), 2012 IEEE 8th International Conference on, IEEE – volume: 11 start-page: 60 year: 2014 end-page: 75 ident: bib0019 article-title: Security as a service model for cloud environment publication-title: IEEE Trans. Netw. Serv. Manage. – volume: 8 start-page: 015 year: 2013 ident: bib0024 article-title: Cloud workflow scheduling algorithm oriented to dynamic price changes publication-title: Comput. Integr. Manuf. Syst. – start-page: 8 year: 2005 ident: bib0034 article-title: Dynamic task scheduling with security awareness in real-time systems publication-title: Parallel and Distributed Processing Symposium – volume: 60 start-page: 1017 year: 2011 end-page: 1029 ident: bib0029 article-title: A novel security-driven scheduling algorithm for precedence-constrained tasks in heterogeneous distributed systems, computers publication-title: IEEE Trans. – volume: 37 start-page: 309 year: 2014 end-page: 320 ident: bib0011 article-title: Multi-objective scheduling of many tasks in cloud platforms publication-title: Future Gener. Comput. Syst. – year: 2017 ident: bib0038 article-title: Genetic-based algorithms applied to a workflow scheduling algorithm with security and deadline constraints in clouds publication-title: Comput. Electr. Eng. – start-page: 90 year: 2013 end-page: 99 ident: bib0023 article-title: On scientific workflow scheduling in clouds under budget constraint publication-title: Parallel Processing (ICPP) – volume: 13 start-page: 260 year: 2002 end-page: 274 ident: bib0052 article-title: Performance-effective and low-complexity task scheduling for heterogeneous computing publication-title: Parallel Distrib. Syst. IEEE Trans. – volume: 1 start-page: 183 year: 2013 end-page: 199 ident: bib0042 article-title: Fast response to infection spread and cyber attacks on large-scale networks publication-title: J. Complex Netw. – volume: 66 start-page: 64 year: 2016 end-page: 82 ident: bib0005 article-title: Towards workflow scheduling in cloud computing: a comprehensive analysis publication-title: J. Netw. Comput. Appl. – volume: 35 start-page: 1831 year: 2012 end-page: 1838 ident: bib0009 article-title: A combined approach to ensure data security in cloud computing publication-title: J. Netw. Comput. Appl. – start-page: 346 year: 1998 end-page: 351 ident: bib0027 article-title: Specifying application-level security in workflow systems publication-title: Database and Expert Systems Applications – volume: 14 start-page: 25 year: 2014 end-page: 39 ident: bib0037 article-title: An optimized scheduling algorithm on a cloud workflow using a discrete particle swarm publication-title: Cybern. Inf. Technol. – start-page: 29 year: 2013 end-page: 34 ident: bib0035 article-title: Workflow specification and scheduling with security constraints in hybrid clouds publication-title: Cloud Computing and Communications (LatinCloud) – volume: 28 start-page: 833 year: 2012 end-page: 851 ident: bib0050 article-title: A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing publication-title: Future Gener. Comput. Syst. – year: 2004 ident: bib0046 article-title: The Montage Architecture for Grid-Enabled Science Processing of Large, Distributed Datasets, Pasadena – volume: 305 start-page: 357 year: 2015 end-page: 383 ident: bib0043 article-title: Security in cloud computing: opportunities and challenges publication-title: Inf. Sci. – volume: 1 start-page: 1 year: 2012 end-page: 15 ident: bib0016 article-title: A multi-level security model for partitioning workflows over federated clouds publication-title: J. Cloud Comput. – volume: 67 start-page: 1067 year: 2007 end-page: 1081 ident: bib0028 article-title: Performance evaluation of a new scheduling algorithm for distributed systems with security heterogeneity publication-title: J. Parallel Distrib. Comput. – volume: 41 start-page: 423 year: 2014 end-page: 447 ident: bib0015 article-title: Security-aware intermediate data placement strategy in scientific cloud workflows publication-title: Knowl. Inf. Syst. – year: 2016 ident: bib0018 article-title: Effect of anti-malware software on infectious nodes in cloud environment – year: 2012 ident: bib0008 article-title: Enhanced data security model for cloud computing publication-title: Informatics and Systems (INFOS) – volume: 79 start-page: 88 year: 2017 end-page: 115 ident: bib0004 article-title: Cloud security issues and challenges: a survey publication-title: J. Netw. Comput. Appl. – start-page: 272 year: 2013 end-page: 280 ident: bib0036 article-title: Mphc: preserving privacy for workflow execution in hybrid clouds publication-title: Parallel and Distributed Computing, Applications and Technologies (PDCAT) – volume: 9 start-page: 1750064 year: 2018 ident: bib0039 article-title: Secure workflow scheduling in cloud environment using modified particle swarm optimization with scout adaptation publication-title: Int. J. Model. Simul. Sci. Comput. – volume: 34 start-page: 1113 year: 2011 end-page: 1122 ident: bib0044 article-title: Secure virtualization for cloud computing publication-title: J. Netw. Comput. Appl. – volume: 27 start-page: 1011 year: 2011 end-page: 1026 ident: bib0025 article-title: Cost optimized provisioning of elastic resources for application workflows publication-title: Future Gener. Comput. Syst. – volume: 79 start-page: 518 year: 2013 end-page: 529 ident: bib0047 article-title: Security-aware optimization for ubiquitous computing systems with seat graph approach publication-title: J. Comput. Syst. Sci. – volume: 10 start-page: 134 year: 2013 end-page: 139 ident: bib0014 article-title: Job scheduling model for cloud computing based on multi-objective genetic algorithm publication-title: IJCSI – start-page: 1 year: 2015 end-page: 8 ident: bib0049 article-title: Malicious virtual machines detection through a clustering approach publication-title: Cloud Technologies and Applications (CloudTech) – volume: 3 start-page: E3197 issue: 9 year: 2008 ident: 10.1016/j.simpat.2018.10.004_bib0058 article-title: High-throughput, kingdom-wide prediction and annotation of bacterial non-coding rnas publication-title: PLoS ONE doi: 10.1371/journal.pone.0003197 – volume: 67 start-page: 1067 issue: 10 year: 2007 ident: 10.1016/j.simpat.2018.10.004_bib0028 article-title: Performance evaluation of a new scheduling algorithm for distributed systems with security heterogeneity publication-title: J. Parallel Distrib. Comput. doi: 10.1016/j.jpdc.2007.06.004 – year: 2017 ident: 10.1016/j.simpat.2018.10.004_bib0038 article-title: Genetic-based algorithms applied to a workflow scheduling algorithm with security and deadline constraints in clouds publication-title: Comput. Electr. Eng. – volume: 8 start-page: 015 year: 2013 ident: 10.1016/j.simpat.2018.10.004_bib0024 article-title: Cloud workflow scheduling algorithm oriented to dynamic price changes publication-title: Comput. Integr. Manuf. Syst. – volume: 1 start-page: 1 issue: 1 year: 2012 ident: 10.1016/j.simpat.2018.10.004_bib0016 article-title: A multi-level security model for partitioning workflows over federated clouds publication-title: J. Cloud Comput. doi: 10.1186/2192-113X-1-15 – start-page: 251 year: 2013 ident: 10.1016/j.simpat.2018.10.004_bib0022 article-title: On scheduling algorithms for mapreduce jobs in heterogeneous clouds with budget constraints – start-page: 517 year: 2014 ident: 10.1016/j.simpat.2018.10.004_bib0006 article-title: Optimizing scientific workflows in the cloud: a montage example – volume: 12 start-page: 245 issue: 2 year: 2014 ident: 10.1016/j.simpat.2018.10.004_bib0007 article-title: Science in the cloud: allocation and execution of data-intensive scientific workflows publication-title: J. Grid Comput. doi: 10.1007/s10723-013-9282-3 – start-page: 300 year: 2012 ident: 10.1016/j.simpat.2018.10.004_bib0026 article-title: A multi-objective approach for workflow scheduling in heterogeneous environments – volume: 60 start-page: 1017 issue: 7 year: 2011 ident: 10.1016/j.simpat.2018.10.004_bib0029 article-title: A novel security-driven scheduling algorithm for precedence-constrained tasks in heterogeneous distributed systems, computers publication-title: IEEE Trans. – volume: 305 start-page: 357 year: 2015 ident: 10.1016/j.simpat.2018.10.004_bib0043 article-title: Security in cloud computing: opportunities and challenges publication-title: Inf. Sci. doi: 10.1016/j.ins.2015.01.025 – volume: 41 start-page: 23 issue: 1 year: 2011 ident: 10.1016/j.simpat.2018.10.004_bib0054 article-title: Cloudsim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms publication-title: Software – year: 2018 ident: 10.1016/j.simpat.2018.10.004_bib0040 article-title: Scheduling workflows with privacy protection constraints for big data applications on cloud publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2018.03.028 – start-page: 1 year: 2015 ident: 10.1016/j.simpat.2018.10.004_bib0049 article-title: Malicious virtual machines detection through a clustering approach – start-page: 147 year: 2014 ident: 10.1016/j.simpat.2018.10.004_bib0051 article-title: Cloud computing: a risk assessment model – start-page: 14 year: 2005 ident: 10.1016/j.simpat.2018.10.004_bib0020 article-title: Recovering from malicious attacks in workflow systems – year: 2014 ident: 10.1016/j.simpat.2018.10.004_sbref0017 – volume: 14 start-page: 25 issue: 1 year: 2014 ident: 10.1016/j.simpat.2018.10.004_bib0037 article-title: An optimized scheduling algorithm on a cloud workflow using a discrete particle swarm publication-title: Cybern. Inf. Technol. – start-page: 35 year: 2015 ident: 10.1016/j.simpat.2018.10.004_bib0001 article-title: Research on workflow scheduling algorithms in the cloud – start-page: 355 year: 2011 ident: 10.1016/j.simpat.2018.10.004_bib0045 article-title: Enabling security in cloud storage slas with cloudproof. – start-page: 1 year: 2012 ident: 10.1016/j.simpat.2018.10.004_sbref0053 article-title: Workflowsim: a toolkit for simulating scientific workflows in distributed environments – volume: 37 start-page: 309 year: 2014 ident: 10.1016/j.simpat.2018.10.004_bib0011 article-title: Multi-objective scheduling of many tasks in cloud platforms publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2013.09.006 – year: 2016 ident: 10.1016/j.simpat.2018.10.004_bib0018 – volume: 90 start-page: S65 issue: 6B year: 2000 ident: 10.1016/j.simpat.2018.10.004_bib0055 article-title: The scec southern california reference three-dimensional seismic velocity model version 2 publication-title: Bull. Seismol. Soc. Am. doi: 10.1785/0120000510 – start-page: 455 year: 2011 ident: 10.1016/j.simpat.2018.10.004_bib0002 article-title: Opportunities and challenges in running scientific workflows on the cloud – volume: 79 start-page: 88 year: 2017 ident: 10.1016/j.simpat.2018.10.004_bib0004 article-title: Cloud security issues and challenges: a survey publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2016.11.027 – volume: 10 start-page: 134 issue: 1 year: 2013 ident: 10.1016/j.simpat.2018.10.004_bib0014 article-title: Job scheduling model for cloud computing based on multi-objective genetic algorithm publication-title: IJCSI – start-page: 346 year: 1998 ident: 10.1016/j.simpat.2018.10.004_bib0027 article-title: Specifying application-level security in workflow systems – start-page: 179 year: 2014 ident: 10.1016/j.simpat.2018.10.004_bib0048 article-title: Energy-aware virtual machine consolidation in IAAS cloud computing – volume: 1 start-page: 183 issue: 2 year: 2013 ident: 10.1016/j.simpat.2018.10.004_bib0042 article-title: Fast response to infection spread and cyber attacks on large-scale networks publication-title: J. Complex Netw. doi: 10.1093/comnet/cnt009 – volume: 75 start-page: 141 year: 2015 ident: 10.1016/j.simpat.2018.10.004_bib0010 article-title: Saba: a security-aware and budget-aware workflow scheduling strategy in clouds publication-title: J. Parallel Distrib. Comput. doi: 10.1016/j.jpdc.2014.09.002 – start-page: 90 year: 2013 ident: 10.1016/j.simpat.2018.10.004_bib0023 article-title: On scientific workflow scheduling in clouds under budget constraint – start-page: 272 year: 2013 ident: 10.1016/j.simpat.2018.10.004_bib0036 article-title: Mphc: preserving privacy for workflow execution in hybrid clouds – volume: 28 start-page: 833 issue: 6 year: 2012 ident: 10.1016/j.simpat.2018.10.004_bib0050 article-title: A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2012.01.006 – volume: 35 start-page: 1831 issue: 6 year: 2012 ident: 10.1016/j.simpat.2018.10.004_bib0009 article-title: A combined approach to ensure data security in cloud computing publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2012.07.007 – start-page: 578 year: 2015 ident: 10.1016/j.simpat.2018.10.004_bib0031 article-title: A hybrid genetic algorithm for privacy and cost aware scheduling of data intensive workflow in cloud – start-page: 64 year: 2014 ident: 10.1016/j.simpat.2018.10.004_bib0003 article-title: Improving users’ isolation in IAAS: virtual machine placement with security constraints – year: 2013 ident: 10.1016/j.simpat.2018.10.004_bib0012 article-title: Multi-objective approach for energy-aware workflow scheduling in cloud computing environments publication-title: Sci. World J. doi: 10.1155/2013/350934 – year: 2004 ident: 10.1016/j.simpat.2018.10.004_bib0046 – year: 2012 ident: 10.1016/j.simpat.2018.10.004_sbref0008 article-title: Enhanced data security model for cloud computing – volume: 34 start-page: 1113 issue: 4 year: 2011 ident: 10.1016/j.simpat.2018.10.004_bib0044 article-title: Secure virtualization for cloud computing publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2010.06.008 – volume: 79 start-page: 518 issue: 5 year: 2013 ident: 10.1016/j.simpat.2018.10.004_bib0047 article-title: Security-aware optimization for ubiquitous computing systems with seat graph approach publication-title: J. Comput. Syst. Sci. doi: 10.1016/j.jcss.2012.11.002 – volume: 9 start-page: 1750064 issue: 01 year: 2018 ident: 10.1016/j.simpat.2018.10.004_bib0039 article-title: Secure workflow scheduling in cloud environment using modified particle swarm optimization with scout adaptation publication-title: Int. J. Model. Simul. Sci. Comput. doi: 10.1142/S1793962317500647 – start-page: 39 year: 2007 ident: 10.1016/j.simpat.2018.10.004_bib0057 article-title: A case study on the use of workflow technologies for scientific analysis: gravitational wave data analysis – volume: 41 start-page: 423 issue: 2 year: 2014 ident: 10.1016/j.simpat.2018.10.004_bib0015 article-title: Security-aware intermediate data placement strategy in scientific cloud workflows publication-title: Knowl. Inf. Syst. doi: 10.1007/s10115-014-0755-x – start-page: 534 year: 2012 ident: 10.1016/j.simpat.2018.10.004_bib0021 article-title: Scalestar: budget conscious scheduling precedence-constrained many-task workflow applications in cloud – volume: 11 start-page: 60 issue: 1 year: 2014 ident: 10.1016/j.simpat.2018.10.004_bib0019 article-title: Security as a service model for cloud environment publication-title: IEEE Trans. Netw. Serv. Manage. doi: 10.1109/TNSM.2014.041614.120394 – year: 2012 ident: 10.1016/j.simpat.2018.10.004_bib0041 – volume: 29 start-page: E4295 issue: 24 year: 2017 ident: 10.1016/j.simpat.2018.10.004_bib0033 article-title: Ffbat: a security and cost-aware workflow scheduling approach combining firefly and bat algorithms publication-title: Concurr. Comput. doi: 10.1002/cpe.4295 – volume: 13 start-page: 260 issue: 3 year: 2002 ident: 10.1016/j.simpat.2018.10.004_bib0052 article-title: Performance-effective and low-complexity task scheduling for heterogeneous computing publication-title: Parallel Distrib. Syst. IEEE Trans. doi: 10.1109/71.993206 – volume: 7 start-page: 547 issue: 3 year: 2012 ident: 10.1016/j.simpat.2018.10.004_bib0013 article-title: Task scheduling optimization in cloud computing based on heuristic algorithm publication-title: J. Netw. – start-page: 8 year: 2005 ident: 10.1016/j.simpat.2018.10.004_bib0034 article-title: Dynamic task scheduling with security awareness in real-time systems – volume: 27 start-page: 1011 issue: 8 year: 2011 ident: 10.1016/j.simpat.2018.10.004_bib0025 article-title: Cost optimized provisioning of elastic resources for application workflows publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2011.05.001 – start-page: 29 year: 2013 ident: 10.1016/j.simpat.2018.10.004_bib0035 article-title: Workflow specification and scheduling with security constraints in hybrid clouds – volume: 28 start-page: 2674 issue: 9 year: 2017 ident: 10.1016/j.simpat.2018.10.004_bib0032 article-title: Scheduling for workflows with security-sensitive intermediate data by selective tasks duplication in clouds publication-title: IEEE Trans. Parallel Distrib. Syst. doi: 10.1109/TPDS.2017.2678507 – volume: 192 start-page: 228 year: 2012 ident: 10.1016/j.simpat.2018.10.004_bib0030 article-title: Swarm scheduling approaches for work-flow applications with security constraints in distributed data-intensive computing environments publication-title: Inf. Sci. doi: 10.1016/j.ins.2011.12.032 – volume: 66 start-page: 64 year: 2016 ident: 10.1016/j.simpat.2018.10.004_bib0005 article-title: Towards workflow scheduling in cloud computing: a comprehensive analysis publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2016.01.018 |
| SSID | ssj0018867 |
| Score | 2.4651601 |
| Snippet | Cloud computing is emerging with growing popularity in workflow scheduling, especially for scientific workflow. Deploying data-intensive workflows in the cloud... |
| SourceID | crossref elsevier |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 119 |
| SubjectTerms | Attack response Cloud computing security Scientific workflows Secure task scheduling |
| Title | MOWS: Multi-objective workflow scheduling in cloud computing based on heuristic algorithm |
| URI | https://dx.doi.org/10.1016/j.simpat.2018.10.004 |
| Volume | 93 |
| WOSCitedRecordID | wos000462032200007&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 1878-1462 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0018867 issn: 1569-190X databaseCode: AIEXJ dateStart: 20021015 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1bb9MwFLaqjQdeuCPGTX7gbcrUJE5s81ahVYDEQFoR5SlyHJu1y5Kqa8bUX8LP5fiWVhsa7IGXqHVrp-35em4-nw9CbzhLOOEVi7K8MqkbOoxYVopIJXqYaRILQUrbbIIeHbHplH8ZDH4FLsxFTZuGXV7yxX8VNYyBsA119hbi7heFAXgMQocriB2u_yT4T5-_HZs431Jro7acO5Vmm8Louv25D_Es2Jfak1lk3XaW2bbobAW0MWuV2UI4UZ07xXlf1D_a5Wx1crbtyR7PznznL9dNx9PaHecq1GW2myLjUSnWwtHax2K5Fo3qE9HmYJS2sy_Z2t91byom4lSUrq82OPkbII87m7Vtvdn1WQtDlAo1gkHR5jwCZ2S6rYl5uqVKY69KnVWOXRb0msJ3uYf5wbkhlZra2Jgd2Go9sjFwYVP_it3rqxFDodu8cKsUZhUYKuxBs7sJzTio_N3Rh8Ppx36HijHbnbj_HoGWaWsHr3-aP7s9W67M5AG652MQPHLYeYgGqnmE7of-Htir-8fou4HSW3wFSDgACW-AhGcNtkDCPZCwBRJuG9wDCfdAeoK-jg8n795HvhVHJCGmXEVlrHUyZFxxoijjMaMpqXKl00SVIoeYN0lFlklV6ZgLCk48oXqoOIQjGTyXPH2Kdpq2Uc8QVqTSnGmWMy0JUVJQLUspecWzMoPpeygNv1Qh_Tn1pl1KXdwkpz0U9bMW7pyWv7yfBiEU3td0PmQByLpx5vNb3ukFurv5A7xEO6tlp16hO_JiNTtfvvaw-g2hRKb7 |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=MOWS%3A+Multi-objective+workflow+scheduling+in+cloud+computing+based+on+heuristic+algorithm&rft.jtitle=Simulation+modelling+practice+and+theory&rft.au=Abazari%2C+Farzaneh&rft.au=Analoui%2C+Morteza&rft.au=Takabi%2C+Hassan&rft.au=Fu%2C+Song&rft.date=2019-05-01&rft.issn=1569-190X&rft.volume=93&rft.spage=119&rft.epage=132&rft_id=info:doi/10.1016%2Fj.simpat.2018.10.004&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_simpat_2018_10_004 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1569-190X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1569-190X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1569-190X&client=summon |