• Alam M, Shahid M and Mustajab S. (2024). Security challenges for workflow allocation model in cloud computing environment: a comprehensive survey, framework, taxonomy, open issues, and future directions. The Journal of Supercomputing. 80:8. (11491-11555). Online publication date: 1-May-2024.

    https://doi.org/10.1007/s11227-023-05873-1

  • Soveizi N, Turkmen F and Karastoyanova D. (2023). Security and privacy concerns in cloud-based scientific and business workflows. Future Generation Computer Systems. 148:C. (184-200). Online publication date: 1-Nov-2023.

    https://doi.org/10.1016/j.future.2023.05.015

  • Prity F, Gazi M and Uddin K. (2023). A review of task scheduling in cloud computing based on nature-inspired optimization algorithm. Cluster Computing. 26:5. (3037-3067). Online publication date: 1-Oct-2023.

    https://doi.org/10.1007/s10586-023-04090-y

  • Huang B, Li Z, Tang P, Wang S, Zhao J, Hu H, Li W and Chang V. (2019). Security modeling and efficient computation offloading for service workflow in mobile edge computing. Future Generation Computer Systems. 97:C. (755-774). Online publication date: 1-Aug-2019.

    https://doi.org/10.1016/j.future.2019.03.011

  • Kumar R and Goyal R. (2019). On cloud security requirements, threats, vulnerabilities and countermeasures. Computer Science Review. 33:C. (1-48). Online publication date: 1-Aug-2019.

    https://doi.org/10.1016/j.cosrev.2019.05.002

  • Huang B, Li Y, Li Z, Pan L, Wang S, Xu Y, Hu H and El-Hajjar M. (2019). Security and Cost-Aware Computation Offloading via Deep Reinforcement Learning in Mobile Edge Computing. Wireless Communications & Mobile Computing. 2019. Online publication date: 1-Jan-2019.

    https://doi.org/10.1155/2019/3816237

  • Chen H, Zhu X, Qiu D, Liu L and Du Z. (2017). Scheduling for Workflows with Security-Sensitive Intermediate Data by Selective Tasks Duplication in Clouds. IEEE Transactions on Parallel and Distributed Systems. 28:9. (2674-2688). Online publication date: 1-Sep-2017.

    https://doi.org/10.1109/TPDS.2017.2678507

  • Singh P, Dutta M and Aggarwal N. (2017). A review of task scheduling based on meta-heuristics approach in cloud computing. Knowledge and Information Systems. 52:1. (1-51). Online publication date: 1-Jul-2017.

    https://doi.org/10.1007/s10115-017-1044-2

  • Yousafzai A, Gani A, Noor R, Sookhak M, Talebian H, Shiraz M and Khan M. (2017). Cloud resource allocation schemes. Knowledge and Information Systems. 50:2. (347-381). Online publication date: 1-Feb-2017.

    https://doi.org/10.1007/s10115-016-0951-y

  • Zhu X, Zha Y, Jiao P and Chen H. Security-aware workflow scheduling with selective task duplication in clouds. Proceedings of the 24th High Performance Computing Symposium. (1-8).

    https://doi.org/10.22360/SpringSim.2016.HPC.048

  • Ali M, Khan S and Vasilakos A. (2015). Security in cloud computing. Information Sciences: an International Journal. 305:C. (357-383). Online publication date: 1-Jun-2015.

    https://doi.org/10.1016/j.ins.2015.01.025