Modelling and analyzing the authorization and execution of video workflows

L He, C Huang, K Li, H Chen, J Sun, B Gao, Kewei Duan, S A Jarvis

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

It is becoming common practice to migrate signal-based video workflows to IT-based Video workflows. Video workflows have some inherent features, including: 1) necessary human involvements in video workflows introduce security and authorization concerns; 2) the frequent change of video workflow contexts requires a flexible approach to acquiring performance data; 3) the content-centric nature of video workflows, which is in contrast to the business-centric of business workflows, requires the support of scheduled activities. This paper takes the above issues into account, proposing a novel mechanism for modeling video workflow executions in cluster-based resource pools under Role-Based Authorization Control (RBAC) schemes. The Color Timed Petri-Net (CTPN) formalism is applied to construct the models. Various types of authorization constraint are modeled in this paper, and scheduled activities are also supported in the model. There is a clear interface between workflow execution and workflow authorization modules. The constructed models are then simulated and analyzed to obtain performance data, including authorization overhead, system- and application-oriented performance. Based on the model analysis, this paper further proposes the methods to improve performance in the presence of authorization policies. This work can be used to plan system capacity subject to the authorization control, and can also be used to tune performance by changing the scheduling strategy and resource capacity when it is not possible to adjust the authorization policies.
Original languageEnglish
Title of host publication18th International Conference on High Performance Computing (HiPC), 2011
Place of PublicationPiscataway, NJ
PublisherIEEE
ISBN (Print)9781457719516 (ISBN)
DOIs
Publication statusPublished - 2011

Fingerprint

Petri nets
Industry
Scheduling
Color

Cite this

He, L., Huang, C., Li, K., Chen, H., Sun, J., Gao, B., ... Jarvis, S. A. (2011). Modelling and analyzing the authorization and execution of video workflows. In 18th International Conference on High Performance Computing (HiPC), 2011 Piscataway, NJ: IEEE. https://doi.org/10.1109/HiPC.2011.6152727

Modelling and analyzing the authorization and execution of video workflows. / He, L; Huang, C; Li, K; Chen, H; Sun, J; Gao, B; Duan, Kewei; Jarvis, S A.

18th International Conference on High Performance Computing (HiPC), 2011. Piscataway, NJ : IEEE, 2011.

Research output: Chapter in Book/Report/Conference proceedingChapter

He, L, Huang, C, Li, K, Chen, H, Sun, J, Gao, B, Duan, K & Jarvis, SA 2011, Modelling and analyzing the authorization and execution of video workflows. in 18th International Conference on High Performance Computing (HiPC), 2011. IEEE, Piscataway, NJ. https://doi.org/10.1109/HiPC.2011.6152727
He L, Huang C, Li K, Chen H, Sun J, Gao B et al. Modelling and analyzing the authorization and execution of video workflows. In 18th International Conference on High Performance Computing (HiPC), 2011. Piscataway, NJ: IEEE. 2011 https://doi.org/10.1109/HiPC.2011.6152727
He, L ; Huang, C ; Li, K ; Chen, H ; Sun, J ; Gao, B ; Duan, Kewei ; Jarvis, S A. / Modelling and analyzing the authorization and execution of video workflows. 18th International Conference on High Performance Computing (HiPC), 2011. Piscataway, NJ : IEEE, 2011.
@inbook{215cd6bbc19d4c3da4d7d92d8ac9c228,
title = "Modelling and analyzing the authorization and execution of video workflows",
abstract = "It is becoming common practice to migrate signal-based video workflows to IT-based Video workflows. Video workflows have some inherent features, including: 1) necessary human involvements in video workflows introduce security and authorization concerns; 2) the frequent change of video workflow contexts requires a flexible approach to acquiring performance data; 3) the content-centric nature of video workflows, which is in contrast to the business-centric of business workflows, requires the support of scheduled activities. This paper takes the above issues into account, proposing a novel mechanism for modeling video workflow executions in cluster-based resource pools under Role-Based Authorization Control (RBAC) schemes. The Color Timed Petri-Net (CTPN) formalism is applied to construct the models. Various types of authorization constraint are modeled in this paper, and scheduled activities are also supported in the model. There is a clear interface between workflow execution and workflow authorization modules. The constructed models are then simulated and analyzed to obtain performance data, including authorization overhead, system- and application-oriented performance. Based on the model analysis, this paper further proposes the methods to improve performance in the presence of authorization policies. This work can be used to plan system capacity subject to the authorization control, and can also be used to tune performance by changing the scheduling strategy and resource capacity when it is not possible to adjust the authorization policies.",
author = "L He and C Huang and K Li and H Chen and J Sun and B Gao and Kewei Duan and Jarvis, {S A}",
year = "2011",
doi = "10.1109/HiPC.2011.6152727",
language = "English",
isbn = "9781457719516 (ISBN)",
booktitle = "18th International Conference on High Performance Computing (HiPC), 2011",
publisher = "IEEE",
address = "USA United States",

}

TY - CHAP

T1 - Modelling and analyzing the authorization and execution of video workflows

AU - He, L

AU - Huang, C

AU - Li, K

AU - Chen, H

AU - Sun, J

AU - Gao, B

AU - Duan, Kewei

AU - Jarvis, S A

PY - 2011

Y1 - 2011

N2 - It is becoming common practice to migrate signal-based video workflows to IT-based Video workflows. Video workflows have some inherent features, including: 1) necessary human involvements in video workflows introduce security and authorization concerns; 2) the frequent change of video workflow contexts requires a flexible approach to acquiring performance data; 3) the content-centric nature of video workflows, which is in contrast to the business-centric of business workflows, requires the support of scheduled activities. This paper takes the above issues into account, proposing a novel mechanism for modeling video workflow executions in cluster-based resource pools under Role-Based Authorization Control (RBAC) schemes. The Color Timed Petri-Net (CTPN) formalism is applied to construct the models. Various types of authorization constraint are modeled in this paper, and scheduled activities are also supported in the model. There is a clear interface between workflow execution and workflow authorization modules. The constructed models are then simulated and analyzed to obtain performance data, including authorization overhead, system- and application-oriented performance. Based on the model analysis, this paper further proposes the methods to improve performance in the presence of authorization policies. This work can be used to plan system capacity subject to the authorization control, and can also be used to tune performance by changing the scheduling strategy and resource capacity when it is not possible to adjust the authorization policies.

AB - It is becoming common practice to migrate signal-based video workflows to IT-based Video workflows. Video workflows have some inherent features, including: 1) necessary human involvements in video workflows introduce security and authorization concerns; 2) the frequent change of video workflow contexts requires a flexible approach to acquiring performance data; 3) the content-centric nature of video workflows, which is in contrast to the business-centric of business workflows, requires the support of scheduled activities. This paper takes the above issues into account, proposing a novel mechanism for modeling video workflow executions in cluster-based resource pools under Role-Based Authorization Control (RBAC) schemes. The Color Timed Petri-Net (CTPN) formalism is applied to construct the models. Various types of authorization constraint are modeled in this paper, and scheduled activities are also supported in the model. There is a clear interface between workflow execution and workflow authorization modules. The constructed models are then simulated and analyzed to obtain performance data, including authorization overhead, system- and application-oriented performance. Based on the model analysis, this paper further proposes the methods to improve performance in the presence of authorization policies. This work can be used to plan system capacity subject to the authorization control, and can also be used to tune performance by changing the scheduling strategy and resource capacity when it is not possible to adjust the authorization policies.

UR - http://dx.doi.org/10.1109/HiPC.2011.6152727

U2 - 10.1109/HiPC.2011.6152727

DO - 10.1109/HiPC.2011.6152727

M3 - Chapter

SN - 9781457719516 (ISBN)

BT - 18th International Conference on High Performance Computing (HiPC), 2011

PB - IEEE

CY - Piscataway, NJ

ER -