Security policy satisfiability and failure resilience in workflows

7Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Security policy satisfiability and high failure resilience (i.e. survivability) are desirable properties of every system. Security issues and failure resilience are usually treated in stand alone mode and not in synergy. In this paper, we bridge this gap for workflows. We propose techniques which ensure that user-task assignment is both secure and failure resilient and present frameworks that meet different criteria of security policy, security constraints, and failure resilience.

Cite

CITATION STYLE

APA

Lowalekar, M., Tiwari, R. K., & Karlapalem, K. (2009). Security policy satisfiability and failure resilience in workflows. In IFIP Advances in Information and Communication Technology (Vol. 298, pp. 197–210). Springer New York LLC. https://doi.org/10.1007/978-3-642-03315-5_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free