Many workflow management systems have been developed to enhance the performance of workflow executions. The authorization policies deployed in the system may restrict the task executions. The common authorization constraints include role constraints, Separation of Duty (SoD), Binding of Duty (BoD) and temporal constraints. This paper presents the methods to check the feasibility of these constraints, and also determines the time durations when the temporal constraints will not impose negative impact on performance. Further, this paper presents an optimal authorization method, which is optimal in the sense that it can minimize a workflow’s delay caused by the temporal constraints. The authorization analysis methods are also extended to analy...
In a workflow system, autonomous agents perform various activities cooperatively to complete a commo...
A workflow (WF) is a formal description of a business process in which single atomic work units (tas...
This paper investigates the resource allocation problem for a type of workflow in pervasive computin...
Role-Based Access Control (RBAC) remains one of the most popular authorization control mechanisms. W...
It has been a subject of a significant amount of research to automate the execution of workflows (or...
Cloud-based workflow architecture has been widely used in e-science, e-business, smart city, and oth...
Automating the execution of workflows (or business processes) on computer resources has been the sub...
Businesses are continually striving to become more efficient. In an effort to achieve optimal effici...
When investigating the performance of running scientific/commercial workflows in parallel and distri...
Access control is fundamental in protecting information systems but it can also pose an obstacle to ...
Balancing protection and empowerment is a central problem when specifying autho-rizations. The princ...
In previous work, we showed how to use an SMT-based model checker to synthesize run-time enforcement...
Abstract — Workflows are often used to represent enterprise-type activities, and authorisation contr...
The execution of workflow processes requires authorizations for enforcing the assignment of tasks to...
Separation of duty and binding of duty in workflow systems is an important area of current research ...
In a workflow system, autonomous agents perform various activities cooperatively to complete a commo...
A workflow (WF) is a formal description of a business process in which single atomic work units (tas...
This paper investigates the resource allocation problem for a type of workflow in pervasive computin...
Role-Based Access Control (RBAC) remains one of the most popular authorization control mechanisms. W...
It has been a subject of a significant amount of research to automate the execution of workflows (or...
Cloud-based workflow architecture has been widely used in e-science, e-business, smart city, and oth...
Automating the execution of workflows (or business processes) on computer resources has been the sub...
Businesses are continually striving to become more efficient. In an effort to achieve optimal effici...
When investigating the performance of running scientific/commercial workflows in parallel and distri...
Access control is fundamental in protecting information systems but it can also pose an obstacle to ...
Balancing protection and empowerment is a central problem when specifying autho-rizations. The princ...
In previous work, we showed how to use an SMT-based model checker to synthesize run-time enforcement...
Abstract — Workflows are often used to represent enterprise-type activities, and authorisation contr...
The execution of workflow processes requires authorizations for enforcing the assignment of tasks to...
Separation of duty and binding of duty in workflow systems is an important area of current research ...
In a workflow system, autonomous agents perform various activities cooperatively to complete a commo...
A workflow (WF) is a formal description of a business process in which single atomic work units (tas...
This paper investigates the resource allocation problem for a type of workflow in pervasive computin...