2017
DOI: 10.3233/jcs-16894
|View full text |Cite
|
Sign up to set email alerts
|

Automatically finding execution scenarios to deploy security-sensitive workflows

Abstract: We introduce a new class of analysis problems, called Scenario Finding Problems (SFPs), for security-sensitive business processes that-besides execution constraints on tasks-define access control policies (constraining which users can execute which tasks) and authorization constraints (such as Separation of Duty). The solutions to SFPs are concrete execution scenarios that assist customers in the reuse and deployment of security-sensitive workflows. We study the relationship of SFPs to well-known properties of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 37 publications
0
6
0
Order By: Relevance
“…The key idea behind the PBT algorithm is that it is not necessary to search the space of plans; it is sufficient to search the space of patterns checking, for each eligible complete pattern, if it is authorised. (This idea was used in the preliminary version [37] of this paper; a similar idea was also exploited by dos Santos et al [24,25] who however use different algorithmic techniques such as Petri nets and Datalog. )…”
Section: Pattern-backtracking Algorithm (Pbt)mentioning
confidence: 98%
See 3 more Smart Citations
“…The key idea behind the PBT algorithm is that it is not necessary to search the space of plans; it is sufficient to search the space of patterns checking, for each eligible complete pattern, if it is authorised. (This idea was used in the preliminary version [37] of this paper; a similar idea was also exploited by dos Santos et al [24,25] who however use different algorithmic techniques such as Petri nets and Datalog. )…”
Section: Pattern-backtracking Algorithm (Pbt)mentioning
confidence: 98%
“…We have considered the instances appearing in practice from [6,24,25], namely, TRW (Trip Request Workflow), ITIL (IT Financial Reporting), and ISO (Budgeting for Quality Management) having 5, 7, 9 steps (tasks) and 5, 2, 3 not-equals constraints, respectively. More details and description of user-step authorisations for 3 satisfiable and 3 unsatisfiable versions of these instances can be found in Section 5 of [25]. Our new solver PBT correctly solved each of the six instances in less than 0.001 sec.…”
Section: Instance Generator and Phase Transitionsmentioning
confidence: 99%
See 2 more Smart Citations
“…Some works have addressed workflow resiliency probabilistically, e.g., [10,11], whereas other works addressed it by modifying the constraints, e.g., [12,13]. Several approaches consider static resiliency only (e.g., [14,15,16]), one of them also considers decremental resiliency [16], whereas, to the best of our knowledge, an exact approach to dynamic resiliency (i.e., an approach that returns a dynamic execution plan if and only if a workflow is resilient without modifying the problem nor returning an execution plan that may fail) remains unexplored; see also [17] for a very recent survey on workflow satisfiability and resiliency.…”
Section: What Can Go Wrong?mentioning
confidence: 99%