Workflows are complex operational processes that include security constraints restricting which users can perform which tasks. An improper user-task assignment may prevent the completion of the workflow, and deciding such an assignment at runtime is known to be complex, especially when considering user unavailability (known as the resiliency problem). Therefore, design tools are required that allow fast evaluation of workflow resiliency. In this paper, we propose a methodology for workflow designers to assess the impact of the security policy on computing the resiliency of a workflow. Our approach relies on encoding a workflow into the probabilistic model-checker PRISM, allowing its resiliency to be evaluated by solving a Markov Decision Pr...
Distributed workflow based systems are widely used in various application domains including e-commer...
We introduce the notion of resiliency policies in the context of access control systems. Such polici...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
The workflow satisfiability problem is the problem of finding an assignment of users to tasks (i.e.,...
Workflows specify a collection of tasks that must be executed under the responsibility or supervisio...
A computerized workflow management system may enforce a security policy, specified in terms of autho...
In both business and computing, complex projects are often defined as workflows, which describe the ...
International audienceDynamic workflow adjustment studies how to minimally adjust existing user-task...
We introduce a new class of analysis problems, called Scenario Finding Problems (SFPs), for security...
Grid systems span multiple organizations, so their workflow processes have security requirements, su...
In scientific workflow systems, temporal consistency is critical to ensure the timely completion of ...
Workflow scheduling algorithms for cloud environments are extensively studied using workflow managem...
Abstract: In scientific workflow systems, it is critical to ensure the timely completion of scientif...
What are workflows to us? I Plans or schedules that map users or resources to tasks I Such mappings ...
Robustness and reliability with respect to the successful completion of a schedule are crucial requi...
Distributed workflow based systems are widely used in various application domains including e-commer...
We introduce the notion of resiliency policies in the context of access control systems. Such polici...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
The workflow satisfiability problem is the problem of finding an assignment of users to tasks (i.e.,...
Workflows specify a collection of tasks that must be executed under the responsibility or supervisio...
A computerized workflow management system may enforce a security policy, specified in terms of autho...
In both business and computing, complex projects are often defined as workflows, which describe the ...
International audienceDynamic workflow adjustment studies how to minimally adjust existing user-task...
We introduce a new class of analysis problems, called Scenario Finding Problems (SFPs), for security...
Grid systems span multiple organizations, so their workflow processes have security requirements, su...
In scientific workflow systems, temporal consistency is critical to ensure the timely completion of ...
Workflow scheduling algorithms for cloud environments are extensively studied using workflow managem...
Abstract: In scientific workflow systems, it is critical to ensure the timely completion of scientif...
What are workflows to us? I Plans or schedules that map users or resources to tasks I Such mappings ...
Robustness and reliability with respect to the successful completion of a schedule are crucial requi...
Distributed workflow based systems are widely used in various application domains including e-commer...
We introduce the notion of resiliency policies in the context of access control systems. Such polici...
Access control is the traditional center of gravity of computer security [1]. People specify access ...