2015
DOI: 10.1007/978-3-319-20810-7_6
|View full text |Cite
|
Sign up to set email alerts
|

Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios

Abstract: Abstract. To support the re-use of business process models, an emerging trend in Business Process Management, it is crucial to assist customers during deployment. We study how to do this for an important class of business processes, called security-sensitive workflows, in which execution constraints on the tasks are complemented with authorization constraints (e.g., Separation of Duty) and authorization policies (constraining which users can execute which tasks). We identify the capability of solving Scenario … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…The key idea behind the PBT algorithm is that it is not necessary to search the space of plans; it is sufficient to search the space of patterns checking, for each eligible complete pattern, if it is authorised. (This idea was used in the preliminary version [37] of this paper; a similar idea was also exploited by dos Santos et al [24,25] who however use different algorithmic techniques such as Petri nets and Datalog. )…”
Section: Pattern-backtracking Algorithm (Pbt)mentioning
confidence: 97%
“…The key idea behind the PBT algorithm is that it is not necessary to search the space of plans; it is sufficient to search the space of patterns checking, for each eligible complete pattern, if it is authorised. (This idea was used in the preliminary version [37] of this paper; a similar idea was also exploited by dos Santos et al [24,25] who however use different algorithmic techniques such as Petri nets and Datalog. )…”
Section: Pattern-backtracking Algorithm (Pbt)mentioning
confidence: 97%
“…In [32], dos Santos et al defined a class of Scenario Finding Problems, which are solutions solving the WSP that also satisfy other properties (e.g., a minimal number of users must be present). Their experimental evaluation involves two real world examples whose size are 7 tasks and 2 SoD constraints, and 9 tasks and 3 SoD constraints, respectively.…”
Section: Related Workmentioning
confidence: 99%
“…Afterwards, in [14], dos Santos et al solved static workflow resiliency by pre-computing reachability graphs by model checking the system, but they didn't address decremental resiliency nor dynamic resiliency. The experimental evaluation involves the same two workflows considered in [32]. Again, while we do not provide a comparison on these two examples for static resiliency as it would not be particularly meaningful, we wish to remark that our approach also addresses decremental and dynamic resiliency.…”
Section: Related Workmentioning
confidence: 99%
“…This paper is an extended version of [19], with the main additions being the definition of two new SFPs (involving resiliency and constrained scenarios) in Sections 3.3 and 3.4; an expanded description of the solution to the WSP in Section 4.2; new experiments in Section 5; an extensive comparison with related work in Section 6.1; and a description of future work in Section 6.2.…”
Section: Introductionmentioning
confidence: 99%