Modelling and analyzing the authorization and execution of video workflows

L He, C Huang, K Li, H Chen, J Sun, B Gao, Kewei Duan, S A Jarvis

Research output: Chapter or section in a book/report/conference proceedingChapter or section


It is becoming common practice to migrate signal-based video workflows to IT-based Video workflows. Video workflows have some inherent features, including: 1) necessary human involvements in video workflows introduce security and authorization concerns; 2) the frequent change of video workflow contexts requires a flexible approach to acquiring performance data; 3) the content-centric nature of video workflows, which is in contrast to the business-centric of business workflows, requires the support of scheduled activities. This paper takes the above issues into account, proposing a novel mechanism for modeling video workflow executions in cluster-based resource pools under Role-Based Authorization Control (RBAC) schemes. The Color Timed Petri-Net (CTPN) formalism is applied to construct the models. Various types of authorization constraint are modeled in this paper, and scheduled activities are also supported in the model. There is a clear interface between workflow execution and workflow authorization modules. The constructed models are then simulated and analyzed to obtain performance data, including authorization overhead, system- and application-oriented performance. Based on the model analysis, this paper further proposes the methods to improve performance in the presence of authorization policies. This work can be used to plan system capacity subject to the authorization control, and can also be used to tune performance by changing the scheduling strategy and resource capacity when it is not possible to adjust the authorization policies.
Original languageEnglish
Title of host publication18th International Conference on High Performance Computing (HiPC), 2011
Place of PublicationPiscataway, NJ
ISBN (Print)9781457719516 (ISBN)
Publication statusPublished - 2011


Dive into the research topics of 'Modelling and analyzing the authorization and execution of video workflows'. Together they form a unique fingerprint.

Cite this