谷歌浏览器插件
订阅小程序
在清言上使用

Log- and Model-Based Techniques for Security-Sensitive Tackling of Obstructed Workflow Executions.

Lecture Notes in Computer Science(2017)

引用 1|浏览9
暂无评分
摘要
Imposing access control onto workflows considerably reduces the set of users authorized to execute the workflow tasks. Further constraints (e.g. Separation of Duties) as well as unexpected unavailability of users may finally obstruct the successful workflow execution. To still complete the execution of an obstructed workflow, we envisage a hybrid approach. We first flatten the workflow and its authorizations into a Petri net and analyse for or encode the obstruction with a corresponding "obstruction marking". If a log is provided, we partition its traces into "successful" or "obstructed" by replaying the log on the flattened net. An obstruction should then be solved by finding its nearest match from the list of successful traces. If no log is provided, the structural theory of Petri nets shall be used to provide a minimized Parikh vector, that may violate given firing rules, but reach a complete marking and by that, complete the workflow.
更多
查看译文
关键词
Workflow satisfiability,Authorization,Obstruction,Petri nets
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要