{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T17:02:31Z","timestamp":1758992551583,"version":"3.37.3"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2021,3,30]],"date-time":"2021-03-30T00:00:00Z","timestamp":1617062400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,30]],"date-time":"2021-03-30T00:00:00Z","timestamp":1617062400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"CEPID-CeMEAI","award":["2013\/07375-0"],"award-info":[{"award-number":["2013\/07375-0"]}]},{"DOI":"10.13039\/501100001807","name":"FAPESP","doi-asserted-by":"crossref","award":["2011\/09524-7","2013\/01818-7"],"award-info":[{"award-number":["2011\/09524-7","2013\/01818-7"]}],"id":[{"id":"10.13039\/501100001807","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s00607-021-00943-9","type":"journal-article","created":{"date-parts":[[2021,3,30]],"date-time":"2021-03-30T19:02:43Z","timestamp":1617130963000},"page":"1281-1303","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Optimizing security and cost of workflow execution using task annotation and genetic-based algorithm"],"prefix":"10.1007","volume":"103","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1137-1678","authenticated-orcid":false,"given":"Henrique Y.","family":"Shishido","sequence":"first","affiliation":[]},{"given":"J\u00falio C.","family":"Estrella","sequence":"additional","affiliation":[]},{"given":"Claudio F. M.","family":"Toledo","sequence":"additional","affiliation":[]},{"given":"Stephan","family":"Reiff-Marganiec","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,30]]},"reference":[{"key":"943_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jss.2015.11.023","volume":"113","author":"EN Alkhanak","year":"2016","unstructured":"Alkhanak EN, Lee SP, Rezaei R, Parizi RM (2016) Cost optimization approaches for scientific workflow scheduling in cloud and grid computing: a review, classifications, and open issues. J Syst Softw 113:1\u201326","journal-title":"J Syst Softw"},{"key":"943_CR2","unstructured":"Amazon (2018) Ec2 pricing. https:\/\/aws.amazon.com\/ec2\/pricing. Accessed 15 Aug 2018"},{"issue":"24","key":"943_CR3","doi-asserted-by":"publisher","first-page":"e4295","DOI":"10.1002\/cpe.4295","volume":"29","author":"AR Arunarani","year":"2017","unstructured":"Arunarani AR, Manjula D, Sugumaran V (2017) Ffbat: a security and cost-aware workflow scheduling approach combining firefly and bat algorithms. Concurr Comput 29(24):e4295","journal-title":"Concurr Comput"},{"issue":"24","key":"943_CR4","doi-asserted-by":"publisher","first-page":"e4295","DOI":"10.1002\/cpe.4295","volume":"29","author":"AR Arunarani","year":"2018","unstructured":"Arunarani AR, Manjula D, Sugumaran V (2018) Ffbat: a security and cost-aware workflow scheduling approach combining firefly and bat algorithms. Concurr Comput Pract Exp 29(24):e4295","journal-title":"Concurr Comput Pract Exp"},{"key":"943_CR5","doi-asserted-by":"crossref","unstructured":"Balasko A, Farkas Z, Kacsuk P (2013) Building science gateways by utilizing the generic ws-pgrade\/guse workflow system. Comput Sci 14(2):307\u2013325","DOI":"10.7494\/csci.2012.14.2.307"},{"key":"943_CR6","first-page":"9","volume-title":"Scientific versus business workflows","author":"R Barga","year":"2007","unstructured":"Barga R, Gannon D, Deelman E, Gannon DB, Shields M (2007) Scientific versus business workflows, vol 1. Springer, Berlin, pp 9\u201316"},{"key":"943_CR7","doi-asserted-by":"crossref","unstructured":"Chen W, Deelman E (2012) Workflowsim: a toolkit for simulating scientific workflows in distributed environments. In: Proceedings of the IEEE international conference on eScience, IEEE, pp 1\u20138","DOI":"10.1109\/eScience.2012.6404430"},{"issue":"5","key":"943_CR8","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1016\/j.future.2008.06.012","volume":"25","author":"E Deelman","year":"2009","unstructured":"Deelman E, Gannon D, Shields M, Taylor I (2009) Workflows and e-science: an overview of workflow system features and capabilities. Future Gener Comput Syst 25(5):528\u2013540","journal-title":"Future Gener Comput Syst"},{"key":"943_CR9","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.future.2014.10.008","volume":"46","author":"E Deelman","year":"2015","unstructured":"Deelman E, Vahi K, Juve G, Rynge M, Callaghan S, Maechling PJ, Mayani R, Chen W, da Silva RF, Livny M, Wenger K (2015) Pegasus, a workflow management system for science automation. Future Gener Comput Syst 46:17\u201335","journal-title":"Future Gener Comput Syst"},{"key":"943_CR10","first-page":"187","volume-title":"Foundations of genetic algorithms, foundations of genetic algorithms","author":"LJ Eshelman","year":"1993","unstructured":"Eshelman LJ, Schaffer JD (1993) Real-coded genetic algorithms and interval-schemata. In: Whitley LD (ed) Foundations of genetic algorithms, foundations of genetic algorithms, vol 2. Elsevier, London, pp 187\u2013202"},{"key":"943_CR11","doi-asserted-by":"crossref","unstructured":"Fakhfakh F, Kacem HH, Kacem AH (2014) Workflow scheduling in cloud computing: a survey. In: 2014 IEEE 18th international enterprise distributed object computing conference workshops and demonstrations, pp 372\u2013378","DOI":"10.1109\/EDOCW.2014.61"},{"key":"943_CR12","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1016\/S0377-2217(00)00140-5","volume":"132","author":"PM Franca","year":"2001","unstructured":"Franca PM, Mendes A, Moscato P (2001) A memetic algorithm for the total tardiness single machine scheduling problem. Eur J Oper Res 132:224\u2013242","journal-title":"Eur J Oper Res"},{"issue":"1","key":"943_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1869-0238-4-5","volume":"4","author":"K Hashizume","year":"2013","unstructured":"Hashizume K, Rosado DG, Fern\u00e1ndez-Medina E, Fernandez EB (2013) An analysis of security issues for cloud computing. J Internet Serv Appl 4(1):1\u201313","journal-title":"J Internet Serv Appl"},{"issue":"1","key":"943_CR14","first-page":"25","volume":"14","author":"C Jianfang","year":"2014","unstructured":"Jianfang C, Junjie C, Qingshan Z (2014) An optimized scheduling algorithm on cloud workflow using discrete particle swarm. Cybern Inf Technol 14(1):25\u201339","journal-title":"Cybern Inf Technol"},{"issue":"3","key":"943_CR15","doi-asserted-by":"publisher","first-page":"682","DOI":"10.1016\/j.future.2012.08.015","volume":"29","author":"G Juve","year":"2013","unstructured":"Juve G, Chervenak A, Deelman E, Bharathi S, Mehta G, Vahi K (2013) Characterizing and profiling scientific workflows. Future Gener Comput Syst 29(3):682\u2013692","journal-title":"Future Gener Comput Syst"},{"issue":"4","key":"943_CR16","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1007\/s10723-012-9240-5","volume":"10","author":"P Kacsuk","year":"2012","unstructured":"Kacsuk P, Farkas Z, Kozlovszky M, Hermann G, Balasko A, Karoczkai K, Marton I (2012) Ws-pgrade\/guse generic dci gateway framework for a large variety of user communities. J Grid Comput 10(4):601\u2013630","journal-title":"J Grid Comput"},{"key":"943_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cosrev.2019.05.002","volume":"33","author":"R Kumar","year":"2019","unstructured":"Kumar R, Goyal R (2019) On cloud security requirements, threats, vulnerabilities and countermeasures: A survey. Comput Sci Rev 33:1\u201348. https:\/\/doi.org\/10.1016\/j.cosrev.2019.05.002","journal-title":"Comput Sci Rev"},{"key":"943_CR18","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.future.2015.12.014","volume":"65","author":"Z Li","year":"2016","unstructured":"Li Z, Ge J, Yang H, Huang L, Hu H, Hu H, Luo B (2016a) A security and cost aware scheduling algorithm for heterogeneous tasks of scientific workflow in clouds. Future Gener Comput Syst 65:140\u2013152","journal-title":"Future Gener Comput Syst"},{"key":"943_CR19","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.future.2015.12.014","volume":"65","author":"Z Li","year":"2016","unstructured":"Li Z, Ge J, Yang H, Huang L, Hu H, Hu H, Luo B (2016b) A security and cost aware scheduling algorithm for heterogeneous tasks of scientific workflow in clouds. Future Gener Comput Syst 65:140\u2013152","journal-title":"Future Gener Comput Syst"},{"key":"943_CR20","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1016\/j.ins.2011.12.032","volume":"192","author":"H Liu","year":"2012","unstructured":"Liu H, Abraham A, Sn\u00e1\u0161el V, McLoone S (2012) Swarm scheduling approaches for workflow applications with security constraints in distributed data-intensive computing environments. Inf Sci 192:228\u2013243","journal-title":"Inf Sci"},{"key":"943_CR21","doi-asserted-by":"crossref","unstructured":"Mell PM, Grance T (2011) The nist definition of cloud computing\u2014sp 800-145. NIST, Gaithersburg, MD, United States, Tech rep","DOI":"10.6028\/NIST.SP.800-145"},{"issue":"3","key":"943_CR22","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/s10723-013-9261-8","volume":"11","author":"K Plankensteiner","year":"2013","unstructured":"Plankensteiner K, Prodan R, Janetschek M, Fahringer T, Montagnat J, Rogers D, Harvey I, Taylor I, Balask\u00f3 \u00c1, Kacsuk P (2013) Fine-grain interoperability of scientific workflows in distributed computing infrastructures. J Grid Comput 11(3):429\u2013455","journal-title":"J Grid Comput"},{"key":"943_CR23","doi-asserted-by":"crossref","unstructured":"Sharif S, Taheri J, Zomaya AY, Nepal S (2013) Mphc: preserving privacy for workflow execution in hybrid clouds. In: International conference on parallel, distributed computing technologies, pp 272\u2013280","DOI":"10.1109\/PDCAT.2013.49"},{"key":"943_CR24","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1016\/j.compeleceng.2017.12.004","volume":"69","author":"HY Shishido","year":"2017","unstructured":"Shishido HY, Estrella JC, Toledo CFM, Arantes MS (2017) Genetic-based algorithms applied to a workflow scheduling algorithm with security and deadline constraints in clouds. Comput Electr Eng 69:378\u2013394","journal-title":"Comput Electr Eng"},{"issue":"1","key":"943_CR25","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1186\/2192-113X-1-15","volume":"1","author":"P Watson","year":"2012","unstructured":"Watson P (2012) A multi-level security model for partitioning workflows over federated clouds. J Cloud Comput Adv Syst Appl 1(1):15","journal-title":"J Cloud Comput Adv Syst Appl"},{"issue":"9","key":"943_CR26","doi-asserted-by":"publisher","first-page":"3373","DOI":"10.1007\/s11227-015-1438-4","volume":"71","author":"F Wu","year":"2015","unstructured":"Wu F, Wu Q, Tan Y (2015) Workflow scheduling in cloud: a survey. J Supercomput 71(9):3373\u20133418","journal-title":"J Supercomput"},{"issue":"7","key":"943_CR27","doi-asserted-by":"publisher","first-page":"864","DOI":"10.1109\/TC.2006.110","volume":"55","author":"T Xie","year":"2006","unstructured":"Xie T, Qin X (2006) Scheduling security-critical real-time applications on clusters. IEEE Trans Comput 55(7):864\u2013879","journal-title":"IEEE Trans Comput"},{"key":"943_CR28","volume-title":"Nature-inspired metaheuristic algorithms","author":"XS Yang","year":"2008","unstructured":"Yang XS (2008) Nature-inspired metaheuristic algorithms. Luniver Press, Beckington"},{"key":"943_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12538-6_6","volume-title":"A new metaheuristic bat-inspired algorithm","author":"XS Yang","year":"2010","unstructured":"Yang XS (2010) A new metaheuristic bat-inspired algorithm. Springer, Berlin"},{"key":"943_CR30","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/j.jpdc.2014.09.002","volume":"75","author":"L Zeng","year":"2015","unstructured":"Zeng L, Veeravalli B, Li X (2015) Saba: a security-aware and budget-aware workflow scheduling strategy in clouds. J Parallel Distrib Comput 75:141\u2013151","journal-title":"J Parallel Distrib Comput"},{"key":"943_CR31","unstructured":"Zhu X, Zha Y, Jiao P, Chen H (2016) Security-aware workflow scheduling with selective task duplication in clouds. In: Proceedings of the high performance computing symposium, pp 1\u20138"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-021-00943-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00607-021-00943-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-021-00943-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T06:34:52Z","timestamp":1622183692000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00607-021-00943-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,30]]},"references-count":31,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["943"],"URL":"https:\/\/doi.org\/10.1007\/s00607-021-00943-9","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"type":"print","value":"0010-485X"},{"type":"electronic","value":"1436-5057"}],"subject":[],"published":{"date-parts":[[2021,3,30]]},"assertion":[{"value":"29 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 March 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}