共 50 条
- [31] The Analysis of Security Workflow Model [J]. PROCEEDINGS OF 2017 IEEE 7TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC), 2017, : 211 - 214
- [32] Security aspects in teleradiology workflow [J]. MEDICAL IMAGING 2000: PACS DESIGN AND EVALUATION - ENGINEERING AND CLINICAL ISSUES, 2000, 3980 : 322 - 326
- [33] Cloud Workflow and Security: A Survey [J]. 2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 1598 - 1607
- [34] Security Constraints in Modeling of Access Control Rules for Dynamic Information Systems [J]. SOFSEM 2014: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2014, 8327 : 466 - 477
- [37] E-GRANT: Enforcing Encrypted Dynamic Security Constraints in the Cloud [J]. 2015 3RD INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD) AND INTERNATIONAL CONFERENCE ON OPEN AND BIG (OBD), 2015, : 135 - 144
- [39] Dynamic Workflow Scheduling in the Edge-Cloud Continuum: Optimizing Runtimes under Budget Constraints [J]. 2024 IEEE 17TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, CLOUD 2024, 2024, : 69 - 80