123
Views
7
CrossRef citations to date
0
Altmetric
Section A

Formalizing workflows partitioning over federated clouds: multi-level security and costs

&
Pages 881-906 | Received 22 Aug 2012, Accepted 24 Jun 2013, Published online: 20 Aug 2013

References

  • D.E. Bell and L.J. LaPadula, Secure computer systems: Mathematical foundations, Tech. Rep. 2547, Vol. I, MITRE Corporation, Bedford, MA, USA, 1973.
  • K. Claessen, M. Johansson, D. Rosen, and N. Smallbone, HipSpec: Automating inductive proofs of program properties, in Workshop on Automated Theory Exploration at 6th International Conference on Automated Reasoning (IJCAR), Lecture Notes in Computer Science/Lecture Notes in Artificial Intelligence, Vol. LNAI 7364B, Gramlich, D. Miller, U. Sattler, eds., Springer, Edinburgh, 2012, pp. 16–25. Available at http://web.student.chalmers.se/danr/hipspec-atx.pdf.
  • V. D'Silva, D. Kroening, and G. Weissenbacher, A survey of automated techniques for formal software verification, IEEE Trans. CAD Integr. Circuits Syst. 27(7) (2008), pp. 1165–1178. doi: 10.1109/TCAD.2008.923410
  • L. Freitas, Formalising workflows partitioning over federated clouds, Tech. Rep., Newcastle University, Newcastle Upon Tyne, 2011.
  • L. Freitas and C.B. Jones, Learning from an expert's proof: AI4FM, in UV10 (Usable Verification), Redmond, WA, T. Ball, L. Zuck, and N. Shankar, eds., November 2010. Available at http://fm.csl.sri.com/UV10/submissions/uv2010_submission_18.pdf.
  • L. Freitas and J. Woodcock, Proving Theorems about jml Classes, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 4700, Springer, Berlin, 2007, pp. 255–279 (cited by (since 1996) 3; Conference of Festschrift Symposium – Formal Methods and Hybrid Real-Time Systems. In Honour of Dines Bjorner and Zhou Chaochen on the Occasion of their 70th Birthdays; Conference Date: 24–27 September 2007; Conference Code: 71178).
  • E.K. Jackson and W. Shulte, Synthesis of cloud applications using logic programming: BAM!, Tech. Rep., Microsoft Research, Redmond, WA, 2008. Available at http://research.microsoft.com/apps/pubs/default.aspx?id=77370
  • M. Leuschel and M. Butler, ProB: An automated analysis toolset for the B method, J. Softw. Tools Technol. Transf. 10(2) (2008), pp. 185–203. doi: 10.1007/s10009-007-0063-9
  • P. Missier, S. Soiland-Reyes, S. Owen, W. Tan, A. Nenadic, I. Dunlop, A. Williams, T. Oinn, C. Goble, M. Gertz, T. Hey, and B. Ludaescher, Taverna, reloaded, in SSDBM 2010, Heidelberg, Germany, M. Gertz, T. Hey, and B. Ludaescher, eds., 2010. Available at http://www.taverna.org.uk/pages/wp-content/uploads/2010/04/T2Architecture.pdf.
  • L.C. Paulson, Isabelle: A Generic Theorem Prover, Lecture Notes in Computer Science, Vol. 828, Springer, Berlin, 1994.
  • M. Saaltink, The Z/EVES system, in ZUM ’97: The Z Formal Specification Notation, Lecture Notes in Computer Science, Vol. 1212, J. Bowen, M. Hinchey, and D. Till, eds., Springer, Berlin, 1997, pp. 72–85.
  • P. Watson, A multi-level security model for partitioning workflows over federated clouds, 3rd IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Greece, 2011.
  • P. Watson, A multi-level security model for partitioning workflows over federated clouds, J. Cloud Comput. Adv. Syst. Appl. 1(15) (2012), pp. 1–15.
  • P. Watson, H.G. Hiden, and S. Woodman, e-Science Central for CARMEN: Science as a service, Concurrency Comput. Pract. Exp. 22(17) (2010), pp. 2369–2380. doi: 10.1002/cpe.1611
  • J. Woodcock and J. Davies, Using Z, Prentice Hall, London, 1996.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.