The Library
Modelling and analyzing the authorization and execution of video workflows
Tools
He, Ligang, Huang, Chenlin, Li, Kenli, Chen, Hao, Sun, Jianhua, Gao, Bo, Duan, Kewei and Jarvis, Stephen A. (2011) Modelling and analyzing the authorization and execution of video workflows. In: 18th International Conference on High Performance Computing, HiPC 2011, Bangalore, India, 18-21 Dec 2011. Published in: 18th International Conference on High Performance Computing, HiPC 2011 pp. 1-10. doi:10.1109/HiPC.2011.6152727 ISSN 9781457719516.
Research output not available from this repository.
Request-a-Copy directly from author or use local Library Get it For Me service.
Official URL: http://dx.doi.org/10.1109/HiPC.2011.6152727
Abstract
It is becoming common practice to migrate signal-based video workflows to IT-based Video workflows. Video workflows have some inherent features, including: 1) necessary human involvements in video workflows introduce security and authorization concerns; 2) the frequent change of video workflow contexts requires a flexible approach to acquiring performance data; 3) the content-centric nature of video workflows, which is in contrast to the business-centric of business workflows, requires the support of scheduled activities. This paper takes the above issues into account, proposing a novel mechanism for modeling video workflow executions in cluster-based resource pools under Role-Based Authorization Control (RBAC) schemes. The Color Timed Petri-Net (CTPN) formalism is applied to construct the models. Various types of authorization constraint are modeled in this paper, and scheduled activities are also supported in the model. There is a clear interface between workflow execution and workflow authorization modules. The constructed models are then simulated and analyzed to obtain performance data, including authorization overhead, system- and application-oriented performance. Based on the model analysis, this paper further proposes the methods to improve performance in the presence of authorization policies. This work can be used to plan system capacity subject to the authorization control, and can also be used to tune performance by changing the scheduling strategy and resource capacity when it is not possible to adjust the authorization policies. © 2011 IEEE.
Item Type: | Conference Item (Paper) | ||||
---|---|---|---|---|---|
Subjects: | Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software | ||||
Divisions: | Faculty of Science, Engineering and Medicine > Science > Computer Science | ||||
Journal or Publication Title: | 18th International Conference on High Performance Computing, HiPC 2011 | ||||
Publisher: | IEEE | ||||
ISSN: | 9781457719516 | ||||
Book Title: | 2011 18th International Conference on High Performance Computing | ||||
Official Date: | 2011 | ||||
Dates: |
|
||||
Page Range: | pp. 1-10 | ||||
DOI: | 10.1109/HiPC.2011.6152727 | ||||
Status: | Peer Reviewed | ||||
Publication Status: | Published | ||||
Access rights to Published version: | Restricted or Subscription Access | ||||
Conference Paper Type: | Paper | ||||
Title of Event: | 18th International Conference on High Performance Computing, HiPC 2011 | ||||
Type of Event: | Conference | ||||
Location of Event: | Bangalore, India | ||||
Date(s) of Event: | 18-21 Dec 2011 |
Request changes or add full text files to a record
Repository staff actions (login required)
View Item |