Mostra el registre d'ítem simple
Security-sensitive tackling of obstructed workflow executions
dc.contributor.author | Holderer, Julius |
dc.contributor.author | Carmona Vargas, Josep |
dc.contributor.author | Müller, Günter |
dc.contributor.other | Universitat Politècnica de Catalunya. Departament de Ciències de la Computació |
dc.date.accessioned | 2016-09-28T08:32:00Z |
dc.date.available | 2016-09-28T08:32:00Z |
dc.date.issued | 2016 |
dc.identifier.citation | Holderer, J., Carmona, J., Müller, G. Security-sensitive tackling of obstructed workflow executions. A: International Workshop on Algorithms & Theories for the Analysis of Event Data. "Proceedings of the International Workshop on Algorithms & Theories for the Analysis of Event Data 2016: Torun, Poland, June 20-21, 2016". Torun: CEUR-WS.org, 2016, p. 126-137. |
dc.identifier.issn | 1613-0073 |
dc.identifier.uri | http://hdl.handle.net/2117/90247 |
dc.description.abstract | Imposing access control onto workflows considerably reduces the set of users authorized to execute the workflow tasks. Further constraints (e.g. Separation of Duties) as well as unexpected unavailabilty of users may finally obstruct the successful workflow execution. To still complete the execution of an obstructed workflow, we envisage a hybrid approach. If a log is provided, we partition its traces into “successful” and “obstructed” ones by analysing the given workflow and its authorizations. An obstruction should then be solved by finding its nearest match from the list of successful traces. If no log is provided, we flatten the workflow and its authorizations into a Petri net and encode the obstruction with a corresponding “obstruction marking”. The structural theory of Petri nets shall then be tweaked to provide a minimized Parikh vector, that may violate given firing rules, however reach a complete marking and by that, complete the workflow. |
dc.format.extent | 12 p. |
dc.language.iso | eng |
dc.publisher | CEUR-WS.org |
dc.subject | Àrees temàtiques de la UPC::Informàtica::Informàtica teòrica |
dc.subject.lcsh | Petri nets |
dc.subject.other | Authorization |
dc.subject.other | Obstruction |
dc.subject.other | Workflow satisfiability |
dc.title | Security-sensitive tackling of obstructed workflow executions |
dc.type | Conference report |
dc.subject.lemac | Petri, Xarxes de |
dc.contributor.group | Universitat Politècnica de Catalunya. ALBCOM - Algorismia, Bioinformàtica, Complexitat i Mètodes Formals |
dc.description.peerreviewed | Peer Reviewed |
dc.relation.publisherversion | http://ceur-ws.org/Vol-1592/paper09.pdf |
dc.rights.access | Open Access |
local.identifier.drac | 18789086 |
dc.description.version | Postprint (published version) |
local.citation.author | Holderer, J.; Carmona, J.; Müller, G. |
local.citation.contributor | International Workshop on Algorithms & Theories for the Analysis of Event Data |
local.citation.pubplace | Torun |
local.citation.publicationName | Proceedings of the International Workshop on Algorithms & Theories for the Analysis of Event Data 2016: Torun, Poland, June 20-21, 2016 |
local.citation.startingPage | 126 |
local.citation.endingPage | 137 |