{"id":"https://openalex.org/W2135639567","doi":"https://doi.org/10.1109/dsnw.2011.5958795","title":"The case for dynamic security solutions in public cloud workflow deployments","display_name":"The case for dynamic security solutions in public cloud workflow deployments","publication_year":2011,"publication_date":"2011-06-01","ids":{"openalex":"https://openalex.org/W2135639567","doi":"https://doi.org/10.1109/dsnw.2011.5958795","mag":"2135639567"},"language":"en","primary_location":{"id":"doi:10.1109/dsnw.2011.5958795","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsnw.2011.5958795","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085609527","display_name":"John C. Mace","orcid":null},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"John C. Mace","raw_affiliation_strings":["School of Computing Science & Centre of Cybercrime and Computer Security (CCCS), University of Newcastle, Newcastle-upon-Tyne, UK","School of Computing Science & Centre for Cybercrime and Computer Security (CCCS), Newcastle University, Newcastle upon Tyne, NE1 7RU, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing Science & Centre of Cybercrime and Computer Security (CCCS), University of Newcastle, Newcastle-upon-Tyne, UK","institution_ids":["https://openalex.org/I84884186"]},{"raw_affiliation_string":"School of Computing Science & Centre for Cybercrime and Computer Security (CCCS), Newcastle University, Newcastle upon Tyne, NE1 7RU, UK","institution_ids":["https://openalex.org/I84884186"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072969450","display_name":"Aad van Moorsel","orcid":"https://orcid.org/0000-0001-7233-6943"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Aad van Moorsel","raw_affiliation_strings":["School of Computing Science & Centre of Cybercrime and Computer Security (CCCS), University of Newcastle, Newcastle-upon-Tyne, UK","School of Computing Science & Centre for Cybercrime and Computer Security (CCCS), Newcastle University, Newcastle upon Tyne, NE1 7RU, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing Science & Centre of Cybercrime and Computer Security (CCCS), University of Newcastle, Newcastle-upon-Tyne, UK","institution_ids":["https://openalex.org/I84884186"]},{"raw_affiliation_string":"School of Computing Science & Centre for Cybercrime and Computer Security (CCCS), Newcastle University, Newcastle upon Tyne, NE1 7RU, UK","institution_ids":["https://openalex.org/I84884186"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101398191","display_name":"Paul Watson","orcid":"https://orcid.org/0000-0002-6660-649X"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Paul Watson","raw_affiliation_strings":["School of Computing Science & Centre of Cybercrime and Computer Security (CCCS), University of Newcastle, Newcastle-upon-Tyne, UK","School of Computing Science & Centre for Cybercrime and Computer Security (CCCS), Newcastle University, Newcastle upon Tyne, NE1 7RU, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing Science & Centre of Cybercrime and Computer Security (CCCS), University of Newcastle, Newcastle-upon-Tyne, UK","institution_ids":["https://openalex.org/I84884186"]},{"raw_affiliation_string":"School of Computing Science & Centre for Cybercrime and Computer Security (CCCS), Newcastle University, Newcastle upon Tyne, NE1 7RU, UK","institution_ids":["https://openalex.org/I84884186"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5085609527"],"corresponding_institution_ids":["https://openalex.org/I84884186"],"apc_list":null,"apc_paid":null,"fwci":9.6064,"has_fulltext":false,"cited_by_count":30,"citation_normalized_percentile":{"value":0.97662177,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"111","last_page":"116"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.8893780708312988},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8147445917129517},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7463524341583252},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6569082736968994},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5660335421562195},{"id":"https://openalex.org/keywords/workflow-management-system","display_name":"Workflow management system","score":0.5658749341964722},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.5657392740249634},{"id":"https://openalex.org/keywords/workflow-engine","display_name":"Workflow engine","score":0.5377395749092102},{"id":"https://openalex.org/keywords/workflow-technology","display_name":"Workflow technology","score":0.44602668285369873},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.3797842264175415},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.26129597425460815},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.20298480987548828},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.16871455311775208}],"concepts":[{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.8893780708312988},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8147445917129517},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7463524341583252},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6569082736968994},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5660335421562195},{"id":"https://openalex.org/C140824633","wikidata":"https://www.wikidata.org/wiki/Q2808660","display_name":"Workflow management system","level":3,"score":0.5658749341964722},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.5657392740249634},{"id":"https://openalex.org/C188220564","wikidata":"https://www.wikidata.org/wiki/Q3325097","display_name":"Workflow engine","level":3,"score":0.5377395749092102},{"id":"https://openalex.org/C19612761","wikidata":"https://www.wikidata.org/wiki/Q8034836","display_name":"Workflow technology","level":3,"score":0.44602668285369873},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.3797842264175415},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.26129597425460815},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.20298480987548828},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.16871455311775208},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dsnw.2011.5958795","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsnw.2011.5958795","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2023789805","display_name":null,"funder_award_id":"EP/G011389/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G318029066","display_name":null,"funder_award_id":"EP/F066937/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1485830999","https://openalex.org/W1502462097","https://openalex.org/W1505781329","https://openalex.org/W1530148683","https://openalex.org/W1557968181","https://openalex.org/W1983347733","https://openalex.org/W2009653416","https://openalex.org/W2032511669","https://openalex.org/W2039295000","https://openalex.org/W2056140754","https://openalex.org/W2068162067","https://openalex.org/W2079240350","https://openalex.org/W2094789212","https://openalex.org/W2114296561","https://openalex.org/W2124264388","https://openalex.org/W2128849179","https://openalex.org/W2132356618","https://openalex.org/W2134894205","https://openalex.org/W2149894469","https://openalex.org/W2569378140","https://openalex.org/W3146323290","https://openalex.org/W6667505691","https://openalex.org/W6760139935"],"related_works":["https://openalex.org/W2358008699","https://openalex.org/W2746179582","https://openalex.org/W3097869156","https://openalex.org/W1987942303","https://openalex.org/W2050637807","https://openalex.org/W2143887500","https://openalex.org/W2404607953","https://openalex.org/W2359571229","https://openalex.org/W2184994130","https://openalex.org/W3084809735"],"abstract_inverted_index":{"Many":[0],"enterprises":[1,149],"are":[2,57,193],"currently":[3],"exploring":[4,118],"the":[5,91,100,119],"potential":[6],"cost":[7],"benefits":[8],"of":[9,36,49,63,71,102,124,138,175],"running":[10,72],"applications":[11,56],"in":[12,81,94,180],"public":[13,76,95,125,182],"clouds.":[14],"Enterprises":[15],"often":[16,58],"have":[17],"global":[18],"security":[19,92,122,189],"policies":[20],"to":[21,28,89,114,141,161],"ensure":[22],"that":[23,55,105,148,187],"its":[24,82],"information":[25,121],"management":[26],"conforms":[27],"business":[29],"rules":[30],"and":[31,39,99,133,155,164,190],"legal":[32],"mandates.":[33],"The":[34,47,69,84],"location":[35],"data":[37],"storage":[38],"application":[40],"execution":[41],"therefore":[42],"becomes":[43],"a":[44,61,67,181],"critical":[45],"issue.":[46],"prevalence":[48],"Service":[50],"Oriented":[51],"Architectures":[52],"(SOA)":[53],"means":[54],"composed":[59],"from":[60,152],"set":[62],"services":[64],"which":[65],"form":[66],"workflow.":[68],"concept":[70],"workflow":[73,97,127],"instances":[74],"on":[75],"cloud":[77,96,126,183],"processing":[78],"platforms":[79],"is":[80],"infancy.":[83],"scientific":[85],"community":[86],"still":[87],"needs":[88,192],"define":[90],"issues":[93,123],"deployment":[98,128],"requirements":[101,137],"possible":[103],"solutions":[104,139],"will":[106],"deal":[107,142],"with":[108,143],"those":[109],"concerns.":[110],"This":[111,167],"paper":[112],"aims":[113],"address":[115],"this":[116],"by":[117,134],"current":[120],"within":[129],"an":[130,153],"enterprise":[131,188],"setting":[132],"identifying":[135],"core":[136],"needed":[140],"these":[144],"challenges.":[145],"We":[146],"argue":[147],"would":[150,169],"benefit":[151],"automated":[154],"dynamic":[156],"approach":[157,168],"when":[158],"selecting":[159],"where":[160],"execute":[162],"workflows":[163],"store":[165],"data.":[166],"choose":[170],"what":[171],"workflows,":[172,176],"or":[173],"subsets":[174],"can":[177],"be":[178],"executed":[179],"environment":[184],"while":[185],"ensuring":[186],"compliance":[191],"met.":[194]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":6},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":6},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
