咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >A Cloud-Based BPM Architecture... 收藏

A Cloud-Based BPM Architecture with User-End Distribution of Non-Compute-Intensive Activities and Sensitive Data

A Cloud-Based BPM Architecture with User-End Distribution of Non-Compute-Intensive Activities and Sensitive Data

作     者:韩燕波 孙君意 王桂玲 李厚福 

作者机构:Institute of Computing TechnologyChinese Academy of Sciences Graduate University of Chinese Academy of Sciences 

出 版 物:《Journal of Computer Science & Technology》 (计算机科学技术学报(英文版))

年 卷 期:2010年第25卷第6期

页      面:1157-1167页

核心收录:

学科分类:08[工学] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:Supported by the National Basic Research 973 Program of China under Grant No.2007CB310805 the National Natural Science Foundation of China under Grant Nos. 90412010,60970131 and 60903048 the National High-Tech Research and Development 863 Program of China under Grant No.2006AA01A106 the Beijing Natural Science Foundation under Grant No.4092046 

主  题:cloud-based BPM user-end autonomy data privacy 

摘      要:While cloud-based BPM(Business Process Management) shows potentials of inherent scalability and expenditure reduction,such issues as user autonomy,privacy protection and efficiency have popped up as major *** may have their own rudimentary or even full-edged BPM systems,which may be embodied by local EAI systems,at their end,but still intend to make use of cloud-side infrastructure services and BPM capabilities,which may appear as PaaS(Platform-as-a-Service) services,at the same time.A whole business process may contain a number of non-compute-intensive activities,for which cloud computing is ***,some users fear data leakage and loss of privacy if their sensitive data is processed in the *** paper proposes and analyzes a novel architecture of cloud-based BPM,which supports user-end distribution of non-compute-intensive activities and sensitive *** approach to optimal distribution of activities and data for synthetically utilizing both user-end and cloud-side resources is *** results show that with the help of suitable distribution schemes,data privacy can be satisfactorily protected,and resources on both sides can be utilized at lower cost.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分