Index
A
ABAC, see Attribute-based access control
ABE, see Attribute-based encryption
ABSs, see Attribute-based signatures
ACAI, see Access control and accounting infrastructure
Access control and accounting infrastructure (ACAI), 25
Access control list (ACL), 47
ACL, see Access control list
Adaptive execution of scientific workflow applications, 73–88
agent-based simulation, 82
computation requirements, 82
data analysis, 80
data requirements, 82
extract-transform-load, 80
scaling areas, 80
discussion and lessons learned, 84–85
event-based simulation, 85
“run simulation” phase, 84
ZeroMQ, 84
application layer, 86
disaster decision support system, 87
platform layer, 86
input and output files, 74
related work, ...
Get Cloud Computing with e-Science Applications now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.