Assisting the deployment of security-sensitive workflows by finding execution scenarios

3Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

To support the re-use of business process models, an emerging trend in Business Process Management, it is crucial to assist customers during deployment. We study how to do this for an important class of business processes, called security-sensitive workflows, in which execution constraints on the tasks are complemented with authorization constraints (e.g., Separation of Duty) and authorization policies (constraining which users can execute which tasks).We identify the capability of solving Scenario Finding Problems (SFPs), i.e. finding concrete execution scenarios, as crucial in supporting the re-use of security-sensitive workflows. Solutions of SFPs provide evidence that the business process model can be successfully executed under the policy adopted by the customer. We present a technique for solving two SFPs and validate it on real-world business process models taken from an on-line library.

Cite

CITATION STYLE

APA

dos Santos, D. R., Ranise, S., Compagna, L., & Ponta, S. E. (2015). Assisting the deployment of security-sensitive workflows by finding execution scenarios. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9149, pp. 85–100). Springer Verlag. https://doi.org/10.1007/978-3-319-20810-7_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free