The Library
Allocating resources for workflows running under authorization control
Tools
He, Ligang, Chaudhary, Nadeem, Jarvis, Stephen A. and Li, Kenli (2012) Allocating resources for workflows running under authorization control. In: 13th International Conference on Grid Computing (GRID), 2012 ACM/IEEE , Beijing, 20-23 Sep 2012. Published in: IEEE Digital Library pp. 58-65. ISBN 9781467329019. doi:10.1109/Grid.2012.22
Research output not available from this repository.
Request-a-Copy directly from author or use local Library Get it For Me service.
Official URL: http://dx.doi.org/10.1109/Grid.2012.22
Abstract
Automating the execution of workflows (or business processes) on computer resources has been the subject of much research. However, many workflow scenarios still require human involvement, which introduces additional authorization concerns. Role-Based Authorization Control (RBAC), under which the users are assigned to certain roles while the roles are associated with prescribed permissions, is a popular authorisation control scheme. When we allocate resources for workloads and plan system capacities, it is often assumed that when a task is allocated to a resource, the resource will accept the task and start the execution once the processor becomes available. However, the authorization policies impose further constraints on task executions, and therefore may incur performance penalty and affect both application- and system-oriented performance. This paper investigates the issue of allocating resources for running workflows under the role-based authorization control. The resource allocation strategies are developed in this paper for both human resources and computing resources. The allocation strategy for human resources takes into account the authorization constraints and establishes the optimization equation subject to the constraint of the budget available to hire human resources. Then the optimization equation is solved to obtain the number of human resources allocated to each authorization role. The allocation strategy for computing resources also takes into account authorization constraints, calculating not only the number of computing resources, but also the proportion of processing capacity in each resource allocated to serve the tasks assuming each role. The simulation experiments have been conducted to verify the effectiveness of the developed allocation strategies. The experimental results show that the allocation strategy developed in this paper outperforms the traditional allocation strategies, which do not consider authorization constraints, in terms of- both average response time and resource utilization.
Item Type: | Conference Item (Paper) | ||||
---|---|---|---|---|---|
Divisions: | Faculty of Science, Engineering and Medicine > Science > Computer Science | ||||
Journal or Publication Title: | IEEE Digital Library | ||||
Publisher: | IEEE Press | ||||
ISBN: | 9781467329019 | ||||
Book Title: | 2012 ACM/IEEE 13th International Conference on Grid Computing | ||||
Official Date: | 2012 | ||||
Dates: |
|
||||
Page Range: | pp. 58-65 | ||||
DOI: | 10.1109/Grid.2012.22 | ||||
Status: | Peer Reviewed | ||||
Publication Status: | Published | ||||
Conference Paper Type: | Paper | ||||
Title of Event: | 13th International Conference on Grid Computing (GRID), 2012 ACM/IEEE | ||||
Type of Event: | Conference | ||||
Location of Event: | Beijing | ||||
Date(s) of Event: | 20-23 Sep 2012 |
Request changes or add full text files to a record
Repository staff actions (login required)
View Item |