{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:18:33Z","timestamp":1730301513817,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/ucc.2015.113","type":"proceedings-article","created":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T21:45:43Z","timestamp":1643751943000},"page":"583-588","source":"Crossref","is-referenced-by-count":0,"title":["Scheduling Workflows under Authorization Control"],"prefix":"10.1109","author":[{"given":"Nadeem","family":"Chaudhary","sequence":"first","affiliation":[]},{"given":"Mohammed A.","family":"AlGhamdi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/71.481597"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/71.80160"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/66451.66454"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/71.503776"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/71.80160"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2005.15"},{"journal-title":"On the Modeling and Verification of Security-Aware and Process-Aware Information Systems","year":"2011","author":"crampton","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.113"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.03.003"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2008.02.015"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.10.015"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2006.18"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1006\/jpdc.1999.1578"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/71.722221"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/0743-7315(90)90042-N"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1145\/344588.344618","article-title":"Static scheduling algorithms for allocating directed task graphs to multiprocessors","volume":"31","author":"kwokk","year":"1999","journal-title":"ACM Comput Surv"},{"key":"ref2","first-page":"48","article-title":"Economical task scheduling algorithm for grid computing systems","volume":"10","author":"agarwal","year":"2010","journal-title":"Global Journal of Computer Science and Technology"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/Grid.2012.22"},{"key":"ref9","first-page":"217","article-title":"The LAST algorithm: A heuristic-based static task allocation algorithm","volume":"2","author":"baxter","year":"1989","journal-title":"Proceedings of the International Conference on Parallel Processing ICPP '89"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.05.015"}],"event":{"name":"2015 IEEE\/ACM 8th International Conference on Utility and Cloud Computing (UCC)","start":{"date-parts":[[2015,12,7]]},"location":"Limassol, Cyprus","end":{"date-parts":[[2015,12,10]]}},"container-title":["2015 IEEE\/ACM 8th International Conference on Utility and Cloud Computing (UCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7430473\/7431374\/07431478.pdf?arnumber=7431478","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,2]],"date-time":"2022-02-02T20:40:01Z","timestamp":1643834401000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7431478\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/ucc.2015.113","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}