MOWS: Multi-objective workflow scheduling in cloud computing based on heuristic algorithm

Cloud computing is emerging with growing popularity in workflow scheduling, especially for scientific workflow. Deploying data-intensive workflows in the cloud brings new factors to be considered during specification and scheduling. Failure to establish intermediate data security may cause informati...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Simulation modelling practice and theory Ročník 93; s. 119 - 132
Hlavní autori: Abazari, Farzaneh, Analoui, Morteza, Takabi, Hassan, Fu, Song
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Elsevier B.V 01.05.2019
Predmet:
ISSN:1569-190X, 1878-1462
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Cloud computing is emerging with growing popularity in workflow scheduling, especially for scientific workflow. Deploying data-intensive workflows in the cloud brings new factors to be considered during specification and scheduling. Failure to establish intermediate data security may cause information leakage or data alteration in the cloud environment. Existing scheduling algorithms for the cloud disregard the interaction among tasks and its effects on application security requirements. To address this issue, we design a new systematic method that considers both tasks security demands and interactions in secure tasks placement in the cloud. In order to respect security and performance, we formulate a model for task scheduling and propose a heuristic algorithm which is based on task’s completion time and security requirements. In addition, we present a new attack response approach to reduce certain security threats in the cloud. To do so, we introduce task security sensitivity measurement to quantify tasks security requirements. We conduct extensive experiments to quantitatively evaluate the performance of our approach, using WorkflowSim, a well-known cloud simulation tool. Experimental results based on real-world workflows show that compared with existing algorithms, our proposed solution can improved the overall system security in terms of quality of security and security risk under a wide range of workload characteristics. Additionally, our results demonstrate that the proposed attack response algorithm can effectively reduce cloud environment threats.
AbstractList Cloud computing is emerging with growing popularity in workflow scheduling, especially for scientific workflow. Deploying data-intensive workflows in the cloud brings new factors to be considered during specification and scheduling. Failure to establish intermediate data security may cause information leakage or data alteration in the cloud environment. Existing scheduling algorithms for the cloud disregard the interaction among tasks and its effects on application security requirements. To address this issue, we design a new systematic method that considers both tasks security demands and interactions in secure tasks placement in the cloud. In order to respect security and performance, we formulate a model for task scheduling and propose a heuristic algorithm which is based on task’s completion time and security requirements. In addition, we present a new attack response approach to reduce certain security threats in the cloud. To do so, we introduce task security sensitivity measurement to quantify tasks security requirements. We conduct extensive experiments to quantitatively evaluate the performance of our approach, using WorkflowSim, a well-known cloud simulation tool. Experimental results based on real-world workflows show that compared with existing algorithms, our proposed solution can improved the overall system security in terms of quality of security and security risk under a wide range of workload characteristics. Additionally, our results demonstrate that the proposed attack response algorithm can effectively reduce cloud environment threats.
Author Abazari, Farzaneh
Fu, Song
Takabi, Hassan
Analoui, Morteza
Author_xml – sequence: 1
  givenname: Farzaneh
  orcidid: 0000-0002-2139-5684
  surname: Abazari
  fullname: Abazari, Farzaneh
  email: f_abazari@iust.ac.ir
  organization: School of Computer Engineering, Iran University of Science and Technology, Tehran, Iran
– sequence: 2
  givenname: Morteza
  surname: Analoui
  fullname: Analoui, Morteza
  email: analoui@iust.ac.ir
  organization: School of Computer Engineering, Iran University of Science and Technology, Tehran, Iran
– sequence: 3
  givenname: Hassan
  surname: Takabi
  fullname: Takabi, Hassan
  email: hassan.takabi@unt.edu
  organization: Department of Computer Science and Engineering, University of North Texas, Denton, Texas, US
– sequence: 4
  givenname: Song
  surname: Fu
  fullname: Fu, Song
  email: song.fu@unt.edu
  organization: Department of Computer Science and Engineering, University of North Texas, Denton, Texas, US
BookMark eNqFkMtOwzAQRS1UJNrCH7DwDyTYebsLJFTxkoq6AASsIscZtw5JXNlOK_4eR2XFAlYzczV3dOfM0KTXPSB0SUlICc2umtCqbsddGBFaeCkkJDlBU1rkRUCTLJr4Ps1YQBl5P0MzaxviF4ssn6KPp_Xb8wI_Da1Tga4aEE7tAR-0-ZStPmArtlAPreo3WPVYtHqosdDdbnCjVHELNdY93sJglHVKYN5utFFu252jU8lbCxc_dY5e725flg_Ban3_uLxZBSImmQsqKmVECgYsgbxgPnOc1BnIOIKKZ0WeRjFPUwG1pIznKaVJLgkwUpDUz4LFc5Qc7wqjrTUgy51RHTdfJSXliKdsyiOecsQzqh6Pty1-2YRy3CndO8NV-5_5-mgG_9hegSmtUND7lMp4gmWt1d8HvgFp9Yb6
CitedBy_id crossref_primary_10_1016_j_asoc_2020_106411
crossref_primary_10_3233_MGS_220218
crossref_primary_10_1002_cpe_7228
crossref_primary_10_1016_j_comnet_2020_107340
crossref_primary_10_1007_s11277_021_08263_z
crossref_primary_10_1016_j_future_2023_05_015
crossref_primary_10_1007_s10586_024_04953_y
crossref_primary_10_1080_02286203_2024_2437828
crossref_primary_10_1109_TGCN_2023_3283509
crossref_primary_10_1155_2021_5570192
crossref_primary_10_1016_j_eswa_2023_121038
crossref_primary_10_1007_s00607_023_01175_9
crossref_primary_10_1016_j_simpat_2021_102328
crossref_primary_10_1007_s10723_022_09625_y
crossref_primary_10_1016_j_simpat_2021_102323
crossref_primary_10_1016_j_eswa_2024_123494
crossref_primary_10_1002_dac_5022
crossref_primary_10_1007_s10586_020_03208_w
crossref_primary_10_1002_nem_2318
crossref_primary_10_1109_ACCESS_2023_3266294
crossref_primary_10_1016_j_eswa_2021_114886
crossref_primary_10_1093_comjnl_bxaa202
crossref_primary_10_1007_s10586_025_05369_y
crossref_primary_10_1007_s10586_024_04945_y
crossref_primary_10_1109_TPDS_2020_3011979
crossref_primary_10_1109_TPDS_2023_3238751
crossref_primary_10_1007_s00500_020_04931_7
crossref_primary_10_1016_j_jnca_2022_103385
crossref_primary_10_1002_spe_3376
crossref_primary_10_1016_j_eswa_2021_114915
crossref_primary_10_1007_s12065_020_00479_5
crossref_primary_10_1007_s11227_023_05873_1
crossref_primary_10_1007_s11227_022_04551_y
crossref_primary_10_1016_j_procs_2023_01_170
crossref_primary_10_1016_j_simpat_2023_102864
crossref_primary_10_1155_2021_5205530
crossref_primary_10_1016_j_simpat_2020_102107
crossref_primary_10_4018_IJCAC_297100
crossref_primary_10_1007_s10586_020_03205_z
crossref_primary_10_1002_cpe_7236
crossref_primary_10_1007_s10586_021_03314_3
crossref_primary_10_1080_01969722_2022_2145656
crossref_primary_10_1109_ACCESS_2020_3003304
crossref_primary_10_1007_s11227_021_03648_0
crossref_primary_10_1007_s11227_022_04690_2
crossref_primary_10_1016_j_simpat_2021_102353
crossref_primary_10_1007_s41870_024_01881_3
crossref_primary_10_1109_TNET_2022_3190730
crossref_primary_10_1016_j_simpat_2020_102217
crossref_primary_10_1145_3609108
crossref_primary_10_1109_TASE_2022_3170549
crossref_primary_10_1142_S0218126625503633
crossref_primary_10_1007_s10115_025_02416_3
Cites_doi 10.1371/journal.pone.0003197
10.1016/j.jpdc.2007.06.004
10.1186/2192-113X-1-15
10.1007/s10723-013-9282-3
10.1016/j.ins.2015.01.025
10.1016/j.future.2018.03.028
10.1016/j.future.2013.09.006
10.1785/0120000510
10.1016/j.jnca.2016.11.027
10.1093/comnet/cnt009
10.1016/j.jpdc.2014.09.002
10.1016/j.future.2012.01.006
10.1016/j.jnca.2012.07.007
10.1155/2013/350934
10.1016/j.jnca.2010.06.008
10.1016/j.jcss.2012.11.002
10.1142/S1793962317500647
10.1007/s10115-014-0755-x
10.1109/TNSM.2014.041614.120394
10.1002/cpe.4295
10.1109/71.993206
10.1016/j.future.2011.05.001
10.1109/TPDS.2017.2678507
10.1016/j.ins.2011.12.032
10.1016/j.jnca.2016.01.018
ContentType Journal Article
Copyright 2018
Copyright_xml – notice: 2018
DBID AAYXX
CITATION
DOI 10.1016/j.simpat.2018.10.004
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1878-1462
EndPage 132
ExternalDocumentID 10_1016_j_simpat_2018_10_004
S1569190X18301515
GroupedDBID --K
--M
.DC
.~1
0R~
123
1B1
1~.
1~5
4.4
457
4G.
5VS
7-5
71M
8P~
AAAKF
AAAKG
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AARIN
AAXUO
AAYFN
ABAOU
ABBOA
ABFNM
ABJNI
ABMAC
ABUCO
ABXDB
ABYKQ
ACAZW
ACDAQ
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADGUI
ADJOM
ADMUD
ADTZH
AEBSH
AECPX
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHJVU
AHZHX
AIALX
AIEXJ
AIGVJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
APLSM
ARUGR
AXJTR
BJAXD
BKOJK
BLXMC
CS3
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
HAMUX
HVGLF
HZ~
IHE
J1W
JJJVA
KOM
M41
MHUIS
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
PC.
Q38
RIG
ROL
RPZ
SDF
SDG
SES
SEW
SPC
SPCBC
SSB
SSD
SST
SSV
SSW
SSZ
T5K
UHS
ZMT
~G-
9DU
AATTM
AAXKI
AAYWO
AAYXX
ABWVN
ACLOT
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
~HD
ID FETCH-LOGICAL-c306t-b1ff2089e94e78918734d6ef32eba687523a55cedf19a751147f0e908059a7c93
ISICitedReferencesCount 63
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000462032200007&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1569-190X
IngestDate Sat Nov 29 03:40:10 EST 2025
Tue Nov 18 22:03:07 EST 2025
Fri Feb 23 02:22:18 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Secure task scheduling
Scientific workflows
Cloud computing security
Attack response
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c306t-b1ff2089e94e78918734d6ef32eba687523a55cedf19a751147f0e908059a7c93
ORCID 0000-0002-2139-5684
PageCount 14
ParticipantIDs crossref_primary_10_1016_j_simpat_2018_10_004
crossref_citationtrail_10_1016_j_simpat_2018_10_004
elsevier_sciencedirect_doi_10_1016_j_simpat_2018_10_004
PublicationCentury 2000
PublicationDate May 2019
2019-05-00
PublicationDateYYYYMMDD 2019-05-01
PublicationDate_xml – month: 05
  year: 2019
  text: May 2019
PublicationDecade 2010
PublicationTitle Simulation modelling practice and theory
PublicationYear 2019
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Brown, Brady, Dietz, Cao, Johnson, McNabb (bib0057) 2007
Xiaoyong, Li, Zeng, Veeravalli (bib0029) 2011; 60
Arunarani, Manjula, Sugumaran (bib0033) 2017; 29
Calheiros, Ranjan, Beloglazov, De Rose, Buyya (bib0054) 2011; 41
Varadharajan, Tupakula (bib0019) 2014; 11
Zheng, CAO, YAO (bib0024) 2013; 8
Jacob, Katz, Prince, Berriman, Good, Laity, Deelman, Singh, Su (bib0046) 2004
Masdari, ValiKardan, Shahi, Azar (bib0005) 2016; 66
Naidu, Bhagat (bib0039) 2018; 9
Shishido, Estrella, Toledo, Arantes (bib0038) 2017
Zeng, Veeravalli, Li (bib0010) 2015; 75
Livny, Teonadi, Livny, Waldor (bib0058) 2008; 3
Leyffer, Safro (bib0042) 2013; 1
Zhao, Fei, Raicu, Lu (bib0002) 2011
Khorshed, Ali, Wasimi (bib0050) 2012; 28
Magistrale, Day, Clayton, Graves (bib0055) 2000; 90
Szabo, Sheng, Kroeger, Zhang, Yu (bib0007) 2014; 12
Olivier, van de Riet, Gudes (bib0027) 1998
(bib0056) 2018
Fard, Prodan, Barrionuevo, Fahringer (bib0026) 2012
Chen, Liu, Wen, Chen (bib0001) 2015
Lin, Wu (bib0023) 2013
Wen, Liu, Dou, Xu, Cao, Chen (bib0040) 2018
Caron, Cornabas (bib0003) 2014
Liu, Abraham, Snášel, McLoone (bib0030) 2012; 192
Wueest (bib0017) 2014
Ali, Khan, Vasilakos (bib0043) 2015; 305
Liu, Peng, Du, Wang, Zeng (bib0015) 2014; 41
Ferdaus, Murshed (bib0048) 2014
Chen, Liu, Wen, Chen, Zhou (bib0031) 2015
Sood (bib0009) 2012; 35
Watson (bib0016) 2012; 1
Singh, Chatterjee (bib0004) 2017; 79
Byun, Kee, Kim, Maeng (bib0025) 2011; 27
Yassa, Chelouah, Kadima, Granado (bib0012) 2013
Zhu, Xin, Ray (bib0020) 2005
Liu, Luo, Zhang, Zhang, Li (bib0014) 2013; 10
Zeng, Veeravalli, Li (bib0021) 2012
Lombardi, Pietro (bib0044) 2011; 34
Chen, Zhu, Qiu, Liu, Du (bib0032) 2017; 28
Zhang, Cao, Li, Khan, Hwang (bib0011) 2014; 37
Qiu, Zhang, Ming, Chen, Qin, Yang (bib0047) 2013; 79
Jianfang, Junjie, Qingshan (bib0037) 2014; 14
Xie, Sung, Qin (bib0034) 2005
Popa, Lorch, Molnar, Wang, Zhuang (bib0045) 2011
Guo, Zhao, Shen, Jiang (bib0013) 2012; 7
Sharif, Taheri, Zomaya, Nepal (bib0036) 2013
Sendi, Cheriet (bib0051) 2014
Topcuoglu, Hariri, Wu (bib0052) 2002; 13
Jiang, Lee, Arenaz, Leslie, Zomaya (bib0006) 2014
Marcon, Bittencourt, Dantas, Neves, Madeira, Fernandes, Kamienski, Barcelos, Gaspary, Fonseca (bib0035) 2013
Wang, Shi (bib0022) 2013
Mohamed, Abdelkader, El-Etriby (bib0008) 2012
Xie, Qin (bib0028) 2007; 67
Goldberg, Leyffer, Safro (bib0041) 2012
Bazm, Khatoun, Begriche, Khoukhi, Chen, Serhrouchni (bib0049) 2015
Chen, Deelman (bib0053) 2012
Abazari, Analoui, Takabi (bib0018) 2016
Sood (10.1016/j.simpat.2018.10.004_bib0009) 2012; 35
Masdari (10.1016/j.simpat.2018.10.004_bib0005) 2016; 66
Wang (10.1016/j.simpat.2018.10.004_bib0022) 2013
Xie (10.1016/j.simpat.2018.10.004_bib0028) 2007; 67
Goldberg (10.1016/j.simpat.2018.10.004_bib0041) 2012
Fard (10.1016/j.simpat.2018.10.004_bib0026) 2012
Xiaoyong (10.1016/j.simpat.2018.10.004_bib0029) 2011; 60
Liu (10.1016/j.simpat.2018.10.004_bib0015) 2014; 41
Byun (10.1016/j.simpat.2018.10.004_bib0025) 2011; 27
Magistrale (10.1016/j.simpat.2018.10.004_bib0055) 2000; 90
Brown (10.1016/j.simpat.2018.10.004_bib0057) 2007
Zeng (10.1016/j.simpat.2018.10.004_bib0021) 2012
Bazm (10.1016/j.simpat.2018.10.004_bib0049) 2015
Abazari (10.1016/j.simpat.2018.10.004_bib0018) 2016
Zhu (10.1016/j.simpat.2018.10.004_bib0020) 2005
Jiang (10.1016/j.simpat.2018.10.004_bib0006) 2014
Mohamed (10.1016/j.simpat.2018.10.004_sbref0008) 2012
Wueest (10.1016/j.simpat.2018.10.004_sbref0017) 2014
Chen (10.1016/j.simpat.2018.10.004_bib0032) 2017; 28
Watson (10.1016/j.simpat.2018.10.004_bib0016) 2012; 1
Chen (10.1016/j.simpat.2018.10.004_sbref0053) 2012
Guo (10.1016/j.simpat.2018.10.004_bib0013) 2012; 7
Jacob (10.1016/j.simpat.2018.10.004_bib0046) 2004
Szabo (10.1016/j.simpat.2018.10.004_bib0007) 2014; 12
Olivier (10.1016/j.simpat.2018.10.004_bib0027) 1998
Lin (10.1016/j.simpat.2018.10.004_bib0023) 2013
Liu (10.1016/j.simpat.2018.10.004_bib0030) 2012; 192
Leyffer (10.1016/j.simpat.2018.10.004_bib0042) 2013; 1
Chen (10.1016/j.simpat.2018.10.004_bib0001) 2015
Singh (10.1016/j.simpat.2018.10.004_bib0004) 2017; 79
Zeng (10.1016/j.simpat.2018.10.004_bib0010) 2015; 75
Chen (10.1016/j.simpat.2018.10.004_bib0031) 2015
Sharif (10.1016/j.simpat.2018.10.004_bib0036) 2013
Topcuoglu (10.1016/j.simpat.2018.10.004_bib0052) 2002; 13
Sendi (10.1016/j.simpat.2018.10.004_bib0051) 2014
Jianfang (10.1016/j.simpat.2018.10.004_bib0037) 2014; 14
Khorshed (10.1016/j.simpat.2018.10.004_bib0050) 2012; 28
Naidu (10.1016/j.simpat.2018.10.004_bib0039) 2018; 9
Zhao (10.1016/j.simpat.2018.10.004_bib0002) 2011
Lombardi (10.1016/j.simpat.2018.10.004_bib0044) 2011; 34
Qiu (10.1016/j.simpat.2018.10.004_bib0047) 2013; 79
Livny (10.1016/j.simpat.2018.10.004_bib0058) 2008; 3
Arunarani (10.1016/j.simpat.2018.10.004_bib0033) 2017; 29
Shishido (10.1016/j.simpat.2018.10.004_bib0038) 2017
Calheiros (10.1016/j.simpat.2018.10.004_bib0054) 2011; 41
Xie (10.1016/j.simpat.2018.10.004_bib0034) 2005
Caron (10.1016/j.simpat.2018.10.004_bib0003) 2014
Popa (10.1016/j.simpat.2018.10.004_bib0045) 2011
Ali (10.1016/j.simpat.2018.10.004_bib0043) 2015; 305
Varadharajan (10.1016/j.simpat.2018.10.004_bib0019) 2014; 11
Liu (10.1016/j.simpat.2018.10.004_bib0014) 2013; 10
Marcon (10.1016/j.simpat.2018.10.004_bib0035) 2013
Ferdaus (10.1016/j.simpat.2018.10.004_bib0048) 2014
Yassa (10.1016/j.simpat.2018.10.004_bib0012) 2013
Zhang (10.1016/j.simpat.2018.10.004_bib0011) 2014; 37
Zheng (10.1016/j.simpat.2018.10.004_bib0024) 2013; 8
Wen (10.1016/j.simpat.2018.10.004_bib0040) 2018
References_xml – volume: 3
  start-page: E3197
  year: 2008
  ident: bib0058
  article-title: High-throughput, kingdom-wide prediction and annotation of bacterial non-coding rnas
  publication-title: PLoS ONE
– year: 2013
  ident: bib0012
  article-title: Multi-objective approach for energy-aware workflow scheduling in cloud computing environments
  publication-title: Sci. World J.
– year: 2014
  ident: bib0017
  article-title: Threats to Virtual Environments
– start-page: 14
  year: 2005
  end-page: 23
  ident: bib0020
  article-title: Recovering from malicious attacks in workflow systems
  publication-title: Database and Expert Systems Applications
– year: 2018
  ident: bib0056
– year: 2018
  ident: bib0040
  article-title: Scheduling workflows with privacy protection constraints for big data applications on cloud
  publication-title: Future Gener. Comput. Syst.
– start-page: 179
  year: 2014
  end-page: 208
  ident: bib0048
  article-title: Energy-aware virtual machine consolidation in IAAS cloud computing
  publication-title: Cloud Computing
– start-page: 578
  year: 2015
  end-page: 591
  ident: bib0031
  article-title: A hybrid genetic algorithm for privacy and cost aware scheduling of data intensive workflow in cloud
  publication-title: International Conference on Algorithms and Architectures for Parallel Processing
– start-page: 534
  year: 2012
  end-page: 541
  ident: bib0021
  article-title: Scalestar: budget conscious scheduling precedence-constrained many-task workflow applications in cloud
  publication-title: Advanced Information Networking and Applications (AINA)
– volume: 41
  start-page: 23
  year: 2011
  end-page: 50
  ident: bib0054
  article-title: Cloudsim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms
  publication-title: Software
– start-page: 517
  year: 2014
  end-page: 522
  ident: bib0006
  article-title: Optimizing scientific workflows in the cloud: a montage example
  publication-title: Utility and Cloud Computing (UCC)
– volume: 29
  start-page: E4295
  year: 2017
  ident: bib0033
  article-title: Ffbat: a security and cost-aware workflow scheduling approach combining firefly and bat algorithms
  publication-title: Concurr. Comput.
– start-page: 251
  year: 2013
  end-page: 265
  ident: bib0022
  article-title: On scheduling algorithms for mapreduce jobs in heterogeneous clouds with budget constraints
  publication-title: Principles of Distributed Systems
– start-page: 39
  year: 2007
  end-page: 59
  ident: bib0057
  article-title: A case study on the use of workflow technologies for scientific analysis: gravitational wave data analysis
  publication-title: Workflows for e-Science
– volume: 75
  start-page: 141
  year: 2015
  end-page: 151
  ident: bib0010
  article-title: Saba: a security-aware and budget-aware workflow scheduling strategy in clouds
  publication-title: J. Parallel Distrib. Comput.
– volume: 28
  start-page: 2674
  year: 2017
  end-page: 2688
  ident: bib0032
  article-title: Scheduling for workflows with security-sensitive intermediate data by selective tasks duplication in clouds
  publication-title: IEEE Trans. Parallel Distrib. Syst.
– volume: 192
  start-page: 228
  year: 2012
  end-page: 243
  ident: bib0030
  article-title: Swarm scheduling approaches for work-flow applications with security constraints in distributed data-intensive computing environments
  publication-title: Inf. Sci.
– volume: 90
  start-page: S65
  year: 2000
  end-page: S76
  ident: bib0055
  article-title: The scec southern california reference three-dimensional seismic velocity model version 2
  publication-title: Bull. Seismol. Soc. Am.
– start-page: 35
  year: 2015
  end-page: 48
  ident: bib0001
  article-title: Research on workflow scheduling algorithms in the cloud
  publication-title: Process-Aware Systems
– year: 2012
  ident: bib0041
  article-title: Optimal Response to Epidemics and Cyber Attacks in Networks, preprint ANL/MCS-1992-0112
– start-page: 147
  year: 2014
  end-page: 152
  ident: bib0051
  article-title: Cloud computing: a risk assessment model
  publication-title: Cloud Engineering (IC2E)
– volume: 7
  start-page: 547
  year: 2012
  end-page: 553
  ident: bib0013
  article-title: Task scheduling optimization in cloud computing based on heuristic algorithm
  publication-title: J. Netw.
– start-page: 355
  year: 2011
  end-page: 368
  ident: bib0045
  article-title: Enabling security in cloud storage slas with cloudproof.
  publication-title: USENIX Annual Technical Conference, Vol. 242
– start-page: 455
  year: 2011
  end-page: 462
  ident: bib0002
  article-title: Opportunities and challenges in running scientific workflows on the cloud
  publication-title: Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
– start-page: 300
  year: 2012
  end-page: 309
  ident: bib0026
  article-title: A multi-objective approach for workflow scheduling in heterogeneous environments
  publication-title: Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster
– volume: 12
  start-page: 245
  year: 2014
  end-page: 264
  ident: bib0007
  article-title: Science in the cloud: allocation and execution of data-intensive scientific workflows
  publication-title: J. Grid Comput.
– start-page: 64
  year: 2014
  end-page: 71
  ident: bib0003
  article-title: Improving users’ isolation in IAAS: virtual machine placement with security constraints
  publication-title: Cloud Computing (CLOUD)
– start-page: 1
  year: 2012
  end-page: 8
  ident: bib0053
  article-title: Workflowsim: a toolkit for simulating scientific workflows in distributed environments
  publication-title: E-Science (e-Science), 2012 IEEE 8th International Conference on, IEEE
– volume: 11
  start-page: 60
  year: 2014
  end-page: 75
  ident: bib0019
  article-title: Security as a service model for cloud environment
  publication-title: IEEE Trans. Netw. Serv. Manage.
– volume: 8
  start-page: 015
  year: 2013
  ident: bib0024
  article-title: Cloud workflow scheduling algorithm oriented to dynamic price changes
  publication-title: Comput. Integr. Manuf. Syst.
– start-page: 8
  year: 2005
  ident: bib0034
  article-title: Dynamic task scheduling with security awareness in real-time systems
  publication-title: Parallel and Distributed Processing Symposium
– volume: 60
  start-page: 1017
  year: 2011
  end-page: 1029
  ident: bib0029
  article-title: A novel security-driven scheduling algorithm for precedence-constrained tasks in heterogeneous distributed systems, computers
  publication-title: IEEE Trans.
– volume: 37
  start-page: 309
  year: 2014
  end-page: 320
  ident: bib0011
  article-title: Multi-objective scheduling of many tasks in cloud platforms
  publication-title: Future Gener. Comput. Syst.
– year: 2017
  ident: bib0038
  article-title: Genetic-based algorithms applied to a workflow scheduling algorithm with security and deadline constraints in clouds
  publication-title: Comput. Electr. Eng.
– start-page: 90
  year: 2013
  end-page: 99
  ident: bib0023
  article-title: On scientific workflow scheduling in clouds under budget constraint
  publication-title: Parallel Processing (ICPP)
– volume: 13
  start-page: 260
  year: 2002
  end-page: 274
  ident: bib0052
  article-title: Performance-effective and low-complexity task scheduling for heterogeneous computing
  publication-title: Parallel Distrib. Syst. IEEE Trans.
– volume: 1
  start-page: 183
  year: 2013
  end-page: 199
  ident: bib0042
  article-title: Fast response to infection spread and cyber attacks on large-scale networks
  publication-title: J. Complex Netw.
– volume: 66
  start-page: 64
  year: 2016
  end-page: 82
  ident: bib0005
  article-title: Towards workflow scheduling in cloud computing: a comprehensive analysis
  publication-title: J. Netw. Comput. Appl.
– volume: 35
  start-page: 1831
  year: 2012
  end-page: 1838
  ident: bib0009
  article-title: A combined approach to ensure data security in cloud computing
  publication-title: J. Netw. Comput. Appl.
– start-page: 346
  year: 1998
  end-page: 351
  ident: bib0027
  article-title: Specifying application-level security in workflow systems
  publication-title: Database and Expert Systems Applications
– volume: 14
  start-page: 25
  year: 2014
  end-page: 39
  ident: bib0037
  article-title: An optimized scheduling algorithm on a cloud workflow using a discrete particle swarm
  publication-title: Cybern. Inf. Technol.
– start-page: 29
  year: 2013
  end-page: 34
  ident: bib0035
  article-title: Workflow specification and scheduling with security constraints in hybrid clouds
  publication-title: Cloud Computing and Communications (LatinCloud)
– volume: 28
  start-page: 833
  year: 2012
  end-page: 851
  ident: bib0050
  article-title: A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing
  publication-title: Future Gener. Comput. Syst.
– year: 2004
  ident: bib0046
  article-title: The Montage Architecture for Grid-Enabled Science Processing of Large, Distributed Datasets, Pasadena
– volume: 305
  start-page: 357
  year: 2015
  end-page: 383
  ident: bib0043
  article-title: Security in cloud computing: opportunities and challenges
  publication-title: Inf. Sci.
– volume: 1
  start-page: 1
  year: 2012
  end-page: 15
  ident: bib0016
  article-title: A multi-level security model for partitioning workflows over federated clouds
  publication-title: J. Cloud Comput.
– volume: 67
  start-page: 1067
  year: 2007
  end-page: 1081
  ident: bib0028
  article-title: Performance evaluation of a new scheduling algorithm for distributed systems with security heterogeneity
  publication-title: J. Parallel Distrib. Comput.
– volume: 41
  start-page: 423
  year: 2014
  end-page: 447
  ident: bib0015
  article-title: Security-aware intermediate data placement strategy in scientific cloud workflows
  publication-title: Knowl. Inf. Syst.
– year: 2016
  ident: bib0018
  article-title: Effect of anti-malware software on infectious nodes in cloud environment
– year: 2012
  ident: bib0008
  article-title: Enhanced data security model for cloud computing
  publication-title: Informatics and Systems (INFOS)
– volume: 79
  start-page: 88
  year: 2017
  end-page: 115
  ident: bib0004
  article-title: Cloud security issues and challenges: a survey
  publication-title: J. Netw. Comput. Appl.
– start-page: 272
  year: 2013
  end-page: 280
  ident: bib0036
  article-title: Mphc: preserving privacy for workflow execution in hybrid clouds
  publication-title: Parallel and Distributed Computing, Applications and Technologies (PDCAT)
– volume: 9
  start-page: 1750064
  year: 2018
  ident: bib0039
  article-title: Secure workflow scheduling in cloud environment using modified particle swarm optimization with scout adaptation
  publication-title: Int. J. Model. Simul. Sci. Comput.
– volume: 34
  start-page: 1113
  year: 2011
  end-page: 1122
  ident: bib0044
  article-title: Secure virtualization for cloud computing
  publication-title: J. Netw. Comput. Appl.
– volume: 27
  start-page: 1011
  year: 2011
  end-page: 1026
  ident: bib0025
  article-title: Cost optimized provisioning of elastic resources for application workflows
  publication-title: Future Gener. Comput. Syst.
– volume: 79
  start-page: 518
  year: 2013
  end-page: 529
  ident: bib0047
  article-title: Security-aware optimization for ubiquitous computing systems with seat graph approach
  publication-title: J. Comput. Syst. Sci.
– volume: 10
  start-page: 134
  year: 2013
  end-page: 139
  ident: bib0014
  article-title: Job scheduling model for cloud computing based on multi-objective genetic algorithm
  publication-title: IJCSI
– start-page: 1
  year: 2015
  end-page: 8
  ident: bib0049
  article-title: Malicious virtual machines detection through a clustering approach
  publication-title: Cloud Technologies and Applications (CloudTech)
– volume: 3
  start-page: E3197
  issue: 9
  year: 2008
  ident: 10.1016/j.simpat.2018.10.004_bib0058
  article-title: High-throughput, kingdom-wide prediction and annotation of bacterial non-coding rnas
  publication-title: PLoS ONE
  doi: 10.1371/journal.pone.0003197
– volume: 67
  start-page: 1067
  issue: 10
  year: 2007
  ident: 10.1016/j.simpat.2018.10.004_bib0028
  article-title: Performance evaluation of a new scheduling algorithm for distributed systems with security heterogeneity
  publication-title: J. Parallel Distrib. Comput.
  doi: 10.1016/j.jpdc.2007.06.004
– year: 2017
  ident: 10.1016/j.simpat.2018.10.004_bib0038
  article-title: Genetic-based algorithms applied to a workflow scheduling algorithm with security and deadline constraints in clouds
  publication-title: Comput. Electr. Eng.
– volume: 8
  start-page: 015
  year: 2013
  ident: 10.1016/j.simpat.2018.10.004_bib0024
  article-title: Cloud workflow scheduling algorithm oriented to dynamic price changes
  publication-title: Comput. Integr. Manuf. Syst.
– volume: 1
  start-page: 1
  issue: 1
  year: 2012
  ident: 10.1016/j.simpat.2018.10.004_bib0016
  article-title: A multi-level security model for partitioning workflows over federated clouds
  publication-title: J. Cloud Comput.
  doi: 10.1186/2192-113X-1-15
– start-page: 251
  year: 2013
  ident: 10.1016/j.simpat.2018.10.004_bib0022
  article-title: On scheduling algorithms for mapreduce jobs in heterogeneous clouds with budget constraints
– start-page: 517
  year: 2014
  ident: 10.1016/j.simpat.2018.10.004_bib0006
  article-title: Optimizing scientific workflows in the cloud: a montage example
– volume: 12
  start-page: 245
  issue: 2
  year: 2014
  ident: 10.1016/j.simpat.2018.10.004_bib0007
  article-title: Science in the cloud: allocation and execution of data-intensive scientific workflows
  publication-title: J. Grid Comput.
  doi: 10.1007/s10723-013-9282-3
– start-page: 300
  year: 2012
  ident: 10.1016/j.simpat.2018.10.004_bib0026
  article-title: A multi-objective approach for workflow scheduling in heterogeneous environments
– volume: 60
  start-page: 1017
  issue: 7
  year: 2011
  ident: 10.1016/j.simpat.2018.10.004_bib0029
  article-title: A novel security-driven scheduling algorithm for precedence-constrained tasks in heterogeneous distributed systems, computers
  publication-title: IEEE Trans.
– volume: 305
  start-page: 357
  year: 2015
  ident: 10.1016/j.simpat.2018.10.004_bib0043
  article-title: Security in cloud computing: opportunities and challenges
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2015.01.025
– volume: 41
  start-page: 23
  issue: 1
  year: 2011
  ident: 10.1016/j.simpat.2018.10.004_bib0054
  article-title: Cloudsim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms
  publication-title: Software
– year: 2018
  ident: 10.1016/j.simpat.2018.10.004_bib0040
  article-title: Scheduling workflows with privacy protection constraints for big data applications on cloud
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2018.03.028
– start-page: 1
  year: 2015
  ident: 10.1016/j.simpat.2018.10.004_bib0049
  article-title: Malicious virtual machines detection through a clustering approach
– start-page: 147
  year: 2014
  ident: 10.1016/j.simpat.2018.10.004_bib0051
  article-title: Cloud computing: a risk assessment model
– start-page: 14
  year: 2005
  ident: 10.1016/j.simpat.2018.10.004_bib0020
  article-title: Recovering from malicious attacks in workflow systems
– year: 2014
  ident: 10.1016/j.simpat.2018.10.004_sbref0017
– volume: 14
  start-page: 25
  issue: 1
  year: 2014
  ident: 10.1016/j.simpat.2018.10.004_bib0037
  article-title: An optimized scheduling algorithm on a cloud workflow using a discrete particle swarm
  publication-title: Cybern. Inf. Technol.
– start-page: 35
  year: 2015
  ident: 10.1016/j.simpat.2018.10.004_bib0001
  article-title: Research on workflow scheduling algorithms in the cloud
– start-page: 355
  year: 2011
  ident: 10.1016/j.simpat.2018.10.004_bib0045
  article-title: Enabling security in cloud storage slas with cloudproof.
– start-page: 1
  year: 2012
  ident: 10.1016/j.simpat.2018.10.004_sbref0053
  article-title: Workflowsim: a toolkit for simulating scientific workflows in distributed environments
– volume: 37
  start-page: 309
  year: 2014
  ident: 10.1016/j.simpat.2018.10.004_bib0011
  article-title: Multi-objective scheduling of many tasks in cloud platforms
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2013.09.006
– year: 2016
  ident: 10.1016/j.simpat.2018.10.004_bib0018
– volume: 90
  start-page: S65
  issue: 6B
  year: 2000
  ident: 10.1016/j.simpat.2018.10.004_bib0055
  article-title: The scec southern california reference three-dimensional seismic velocity model version 2
  publication-title: Bull. Seismol. Soc. Am.
  doi: 10.1785/0120000510
– start-page: 455
  year: 2011
  ident: 10.1016/j.simpat.2018.10.004_bib0002
  article-title: Opportunities and challenges in running scientific workflows on the cloud
– volume: 79
  start-page: 88
  year: 2017
  ident: 10.1016/j.simpat.2018.10.004_bib0004
  article-title: Cloud security issues and challenges: a survey
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2016.11.027
– volume: 10
  start-page: 134
  issue: 1
  year: 2013
  ident: 10.1016/j.simpat.2018.10.004_bib0014
  article-title: Job scheduling model for cloud computing based on multi-objective genetic algorithm
  publication-title: IJCSI
– start-page: 346
  year: 1998
  ident: 10.1016/j.simpat.2018.10.004_bib0027
  article-title: Specifying application-level security in workflow systems
– start-page: 179
  year: 2014
  ident: 10.1016/j.simpat.2018.10.004_bib0048
  article-title: Energy-aware virtual machine consolidation in IAAS cloud computing
– volume: 1
  start-page: 183
  issue: 2
  year: 2013
  ident: 10.1016/j.simpat.2018.10.004_bib0042
  article-title: Fast response to infection spread and cyber attacks on large-scale networks
  publication-title: J. Complex Netw.
  doi: 10.1093/comnet/cnt009
– volume: 75
  start-page: 141
  year: 2015
  ident: 10.1016/j.simpat.2018.10.004_bib0010
  article-title: Saba: a security-aware and budget-aware workflow scheduling strategy in clouds
  publication-title: J. Parallel Distrib. Comput.
  doi: 10.1016/j.jpdc.2014.09.002
– start-page: 90
  year: 2013
  ident: 10.1016/j.simpat.2018.10.004_bib0023
  article-title: On scientific workflow scheduling in clouds under budget constraint
– start-page: 272
  year: 2013
  ident: 10.1016/j.simpat.2018.10.004_bib0036
  article-title: Mphc: preserving privacy for workflow execution in hybrid clouds
– volume: 28
  start-page: 833
  issue: 6
  year: 2012
  ident: 10.1016/j.simpat.2018.10.004_bib0050
  article-title: A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2012.01.006
– volume: 35
  start-page: 1831
  issue: 6
  year: 2012
  ident: 10.1016/j.simpat.2018.10.004_bib0009
  article-title: A combined approach to ensure data security in cloud computing
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2012.07.007
– start-page: 578
  year: 2015
  ident: 10.1016/j.simpat.2018.10.004_bib0031
  article-title: A hybrid genetic algorithm for privacy and cost aware scheduling of data intensive workflow in cloud
– start-page: 64
  year: 2014
  ident: 10.1016/j.simpat.2018.10.004_bib0003
  article-title: Improving users’ isolation in IAAS: virtual machine placement with security constraints
– year: 2013
  ident: 10.1016/j.simpat.2018.10.004_bib0012
  article-title: Multi-objective approach for energy-aware workflow scheduling in cloud computing environments
  publication-title: Sci. World J.
  doi: 10.1155/2013/350934
– year: 2004
  ident: 10.1016/j.simpat.2018.10.004_bib0046
– year: 2012
  ident: 10.1016/j.simpat.2018.10.004_sbref0008
  article-title: Enhanced data security model for cloud computing
– volume: 34
  start-page: 1113
  issue: 4
  year: 2011
  ident: 10.1016/j.simpat.2018.10.004_bib0044
  article-title: Secure virtualization for cloud computing
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2010.06.008
– volume: 79
  start-page: 518
  issue: 5
  year: 2013
  ident: 10.1016/j.simpat.2018.10.004_bib0047
  article-title: Security-aware optimization for ubiquitous computing systems with seat graph approach
  publication-title: J. Comput. Syst. Sci.
  doi: 10.1016/j.jcss.2012.11.002
– volume: 9
  start-page: 1750064
  issue: 01
  year: 2018
  ident: 10.1016/j.simpat.2018.10.004_bib0039
  article-title: Secure workflow scheduling in cloud environment using modified particle swarm optimization with scout adaptation
  publication-title: Int. J. Model. Simul. Sci. Comput.
  doi: 10.1142/S1793962317500647
– start-page: 39
  year: 2007
  ident: 10.1016/j.simpat.2018.10.004_bib0057
  article-title: A case study on the use of workflow technologies for scientific analysis: gravitational wave data analysis
– volume: 41
  start-page: 423
  issue: 2
  year: 2014
  ident: 10.1016/j.simpat.2018.10.004_bib0015
  article-title: Security-aware intermediate data placement strategy in scientific cloud workflows
  publication-title: Knowl. Inf. Syst.
  doi: 10.1007/s10115-014-0755-x
– start-page: 534
  year: 2012
  ident: 10.1016/j.simpat.2018.10.004_bib0021
  article-title: Scalestar: budget conscious scheduling precedence-constrained many-task workflow applications in cloud
– volume: 11
  start-page: 60
  issue: 1
  year: 2014
  ident: 10.1016/j.simpat.2018.10.004_bib0019
  article-title: Security as a service model for cloud environment
  publication-title: IEEE Trans. Netw. Serv. Manage.
  doi: 10.1109/TNSM.2014.041614.120394
– year: 2012
  ident: 10.1016/j.simpat.2018.10.004_bib0041
– volume: 29
  start-page: E4295
  issue: 24
  year: 2017
  ident: 10.1016/j.simpat.2018.10.004_bib0033
  article-title: Ffbat: a security and cost-aware workflow scheduling approach combining firefly and bat algorithms
  publication-title: Concurr. Comput.
  doi: 10.1002/cpe.4295
– volume: 13
  start-page: 260
  issue: 3
  year: 2002
  ident: 10.1016/j.simpat.2018.10.004_bib0052
  article-title: Performance-effective and low-complexity task scheduling for heterogeneous computing
  publication-title: Parallel Distrib. Syst. IEEE Trans.
  doi: 10.1109/71.993206
– volume: 7
  start-page: 547
  issue: 3
  year: 2012
  ident: 10.1016/j.simpat.2018.10.004_bib0013
  article-title: Task scheduling optimization in cloud computing based on heuristic algorithm
  publication-title: J. Netw.
– start-page: 8
  year: 2005
  ident: 10.1016/j.simpat.2018.10.004_bib0034
  article-title: Dynamic task scheduling with security awareness in real-time systems
– volume: 27
  start-page: 1011
  issue: 8
  year: 2011
  ident: 10.1016/j.simpat.2018.10.004_bib0025
  article-title: Cost optimized provisioning of elastic resources for application workflows
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2011.05.001
– start-page: 29
  year: 2013
  ident: 10.1016/j.simpat.2018.10.004_bib0035
  article-title: Workflow specification and scheduling with security constraints in hybrid clouds
– volume: 28
  start-page: 2674
  issue: 9
  year: 2017
  ident: 10.1016/j.simpat.2018.10.004_bib0032
  article-title: Scheduling for workflows with security-sensitive intermediate data by selective tasks duplication in clouds
  publication-title: IEEE Trans. Parallel Distrib. Syst.
  doi: 10.1109/TPDS.2017.2678507
– volume: 192
  start-page: 228
  year: 2012
  ident: 10.1016/j.simpat.2018.10.004_bib0030
  article-title: Swarm scheduling approaches for work-flow applications with security constraints in distributed data-intensive computing environments
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2011.12.032
– volume: 66
  start-page: 64
  year: 2016
  ident: 10.1016/j.simpat.2018.10.004_bib0005
  article-title: Towards workflow scheduling in cloud computing: a comprehensive analysis
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2016.01.018
SSID ssj0018867
Score 2.4651601
Snippet Cloud computing is emerging with growing popularity in workflow scheduling, especially for scientific workflow. Deploying data-intensive workflows in the cloud...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 119
SubjectTerms Attack response
Cloud computing security
Scientific workflows
Secure task scheduling
Title MOWS: Multi-objective workflow scheduling in cloud computing based on heuristic algorithm
URI https://dx.doi.org/10.1016/j.simpat.2018.10.004
Volume 93
WOSCitedRecordID wos000462032200007&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  customDbUrl:
  eissn: 1878-1462
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0018867
  issn: 1569-190X
  databaseCode: AIEXJ
  dateStart: 20021015
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1bb9MwFLaqjQdeuCPGTX7gbcrUJE5s81ahVYDEQFoR5SlyHJu1y5Kqa8bUX8LP5fiWVhsa7IGXqHVrp-35em4-nw9CbzhLOOEVi7K8MqkbOoxYVopIJXqYaRILQUrbbIIeHbHplH8ZDH4FLsxFTZuGXV7yxX8VNYyBsA119hbi7heFAXgMQocriB2u_yT4T5-_HZs431Jro7acO5Vmm8Louv25D_Es2Jfak1lk3XaW2bbobAW0MWuV2UI4UZ07xXlf1D_a5Wx1crbtyR7PznznL9dNx9PaHecq1GW2myLjUSnWwtHax2K5Fo3qE9HmYJS2sy_Z2t91byom4lSUrq82OPkbII87m7Vtvdn1WQtDlAo1gkHR5jwCZ2S6rYl5uqVKY69KnVWOXRb0msJ3uYf5wbkhlZra2Jgd2Go9sjFwYVP_it3rqxFDodu8cKsUZhUYKuxBs7sJzTio_N3Rh8Ppx36HijHbnbj_HoGWaWsHr3-aP7s9W67M5AG652MQPHLYeYgGqnmE7of-Htir-8fou4HSW3wFSDgACW-AhGcNtkDCPZCwBRJuG9wDCfdAeoK-jg8n795HvhVHJCGmXEVlrHUyZFxxoijjMaMpqXKl00SVIoeYN0lFlklV6ZgLCk48oXqoOIQjGTyXPH2Kdpq2Uc8QVqTSnGmWMy0JUVJQLUspecWzMoPpeygNv1Qh_Tn1pl1KXdwkpz0U9bMW7pyWv7yfBiEU3td0PmQByLpx5vNb3ukFurv5A7xEO6tlp16hO_JiNTtfvvaw-g2hRKb7
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=MOWS%3A+Multi-objective+workflow+scheduling+in+cloud+computing+based+on+heuristic+algorithm&rft.jtitle=Simulation+modelling+practice+and+theory&rft.au=Abazari%2C+Farzaneh&rft.au=Analoui%2C+Morteza&rft.au=Takabi%2C+Hassan&rft.au=Fu%2C+Song&rft.date=2019-05-01&rft.issn=1569-190X&rft.volume=93&rft.spage=119&rft.epage=132&rft_id=info:doi/10.1016%2Fj.simpat.2018.10.004&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_simpat_2018_10_004
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1569-190X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1569-190X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1569-190X&client=summon