Abstract
Workflow security has become increasingly important and challenging in today's open service world. While much research has been conducted on various security issues of workflow systems, the workflow satisfiability problem, which asks whether a set of users together can complete a workflow, is recently identified as an important research problem that needs more investigation. In this paper, we study the computational complexity of the problem along two directions: one is by considering either one path or all paths of a workflow, and the other is by considering the possible patterns in a workflow. We have shown that the general workflow satisfiability analysis problem is intractable. This result motivates us to consider restrictions on workflow control-flow patterns and access control policies, and to identify tractable cases of practical interest.
| Original language | English |
|---|---|
| Article number | 6517190 |
| Pages (from-to) | 237-251 |
| Number of pages | 15 |
| Journal | IEEE Transactions on Services Computing |
| Volume | 7 |
| Issue number | 2 |
| DOIs | |
| State | Published - 2014 |
Keywords
- Workflow satisfiability analysis
- access control
Fingerprint
Dive into the research topics of 'Satisfiability analysis of workflows with control-flow patterns and authorization constraints'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver