2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/ 12th IEEE International 2018
DOI: 10.1109/trustcom/bigdatase.2018.00063
|View full text |Cite
|
Sign up to set email alerts
|

Online Allocation of Cloud Resources Based on Security Satisfaction

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…e purpose is to avoid the text similarity due to the complexity of the time-type data mining objects, including sequence rules, periodic patterns, and sequences mode [12]. erefore, to reduce the calculation time, we try to find out the frequent item sets in the index data for the optimal allocation of the intelligent construction resources of the track and field team training venues and generate strong association rules based on the frequent item sets in these data.…”
Section: Mining Indexes For Optimal Allocation Of Resourcesmentioning
confidence: 99%
See 1 more Smart Citation
“…e purpose is to avoid the text similarity due to the complexity of the time-type data mining objects, including sequence rules, periodic patterns, and sequences mode [12]. erefore, to reduce the calculation time, we try to find out the frequent item sets in the index data for the optimal allocation of the intelligent construction resources of the track and field team training venues and generate strong association rules based on the frequent item sets in these data.…”
Section: Mining Indexes For Optimal Allocation Of Resourcesmentioning
confidence: 99%
“…e single objective is expressed as follows by equation (12) and the constraints of the problem are given by equation ( 13):…”
Section: Construction Of Resource Optimization Allocation Modelmentioning
confidence: 99%
“…A particle swarm optimization method is used to solve the problem. A cloud resource allocation model to improve security is proposed by Halabi et al [19]. The authors designed the allocation problem as an optimization problem and propose a heuristic for the solution.…”
Section: Related Workmentioning
confidence: 99%
“…At first, a random chromosome population of size C is generated and the algorithm calculates the fitness of each of them. After the fitness being evaluated, based on the fitness value selection, crossover, and mutation are applied and a new set of chromosomes are generated [40] (lines [12][13][14][15][16][17][18][19][20].…”
Section: Inputmentioning
confidence: 99%
“…They developed a CIA-based optimization function to identify CSPs with minimal user frustration for CIA. Halabi et al 64 addressed online Cloud services allocations in view of global safety satisfaction. A linear optimization technique is used to formalize the resource allocation problem in relation to global security requirements.…”
Section: Related Literaturementioning
confidence: 99%