Dynamic Workflow Adjustment with Security Constraints

被引:0
|
作者
Lu, Haibing [1 ]
Hong, Yuan [2 ]
Yang, Yanjiang [3 ]
Fang, Yi [1 ]
Duan, Lian [4 ]
机构
[1] Santa Clara Univ, Santa Clara, CA 95053 USA
[2] SUNY Albany, Albany, NY 12222 USA
[3] I2R Singapore, Singapore, Singapore
[4] New Jersey Inst Technol, Newark, NJ 07102 USA
关键词
workflow; security; dynamic; satisfiability;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Dynamic workflow adjustment studies how to minimally adjust existing user-task assignments, when a sudden change occurs, e.g. absence of users, so that all tasks are being attended and no constraint is violated. In particular, we study two key questions: (i) Will the workflow still be satisfiable given a change? (ii) If the answer is yes, how to find a satisfying assignment with the minimum perturbation to the old system? We consider various types of changes, including absence of a user, addition of a separation-of-duty constraint, addition of a binding-of-duty constraint, and revocation of a user-to-task authorization, study their theoretical properties and formulate them into the well-studied Boolean satisfiability problem, which enables a system engineer without much technical background to solve problems by using standard satisfiability solvers. A step further, towards more efficient solutions for our specific problems, we propose customized algorithms by adapting and tailoring the state-of-art algorithms inside standard solvers. Our work would have implications for business process management, staffing, and cost planning.
引用
收藏
页码:211 / 226
页数:16
相关论文
共 50 条
  • [1] DISCRETE TIME DYNAMIC OLIGOPOLIES WITH ADJUSTMENT CONSTRAINTS
    Burr, Chrystie
    Gardini, Laura
    Szidarovszky, Ferenc
    [J]. JOURNAL OF DYNAMICS AND GAMES, 2015, 2 (01): : 65 - 87
  • [2] Dynamic workflow generation with interoperable security alerts in MANET
    Fung, Casey K.
    Hung, Patrick C. K.
    Kearns, William M.
    Uczekaj, Stephen A.
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, 2007, : 418 - +
  • [3] Chinese Wall Security Model for Workflow Management Systems with Dynamic Security Policy
    Hsiao, Yu-Cheng
    Hwang, Gwan-Hwan
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2013, 29 (03) : 417 - 440
  • [4] Dynamic verification of temporal constraints on-the-fly for workflow systems
    Chen, JJ
    Yang, Y
    Chen, TY
    [J]. 11TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2004, : 30 - 37
  • [5] A design workflow for the identification of area constraints in dynamic reconfigurable systems
    Montone, Alessio
    Santarnbrogio, Marco D.
    Sciuto, Donatella
    [J]. DELTA 2008: FOURTH IEEE INTERNATIONAL SYMPOSIUM ON ELECTRONIC DESIGN, TEST AND APPLICATIONS, PROCEEDINGS, 2008, : 450 - 453
  • [6] Temporal dependency for dynamic verification of temporal constraints in workflow systems
    Chen, JJ
    Yang, Y
    [J]. GRID AND COOPERATIVE COMPUTING GCC 2004, PROCEEDINGS, 2004, 3251 : 1005 - 1008
  • [7] W-RBAC - A workflow security model incorporating controlled overriding of constraints
    Wainer, J
    Barthelmess, P
    Kumar, A
    [J]. INTERNATIONAL JOURNAL OF COOPERATIVE INFORMATION SYSTEMS, 2003, 12 (04) : 455 - 485
  • [8] Incremental Analysis of Temporal Constraints for Concurrent Workflow Processes With Dynamic Changes
    Du, Yanhua
    Yang, Benyuan
    Hu, Hesuan
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (05) : 2617 - 2627
  • [9] Microgrid Operational Optimization with Dynamic Voltage Security Constraints
    Nakiganda, Agnes M.
    Van Cutsem, Thierry
    Aristidou, Petros
    [J]. 2021 IEEE MADRID POWERTECH, 2021,
  • [10] Dynamic load dispatch with voltage security and environmental constraints
    Song, YH
    Yu, IK
    [J]. ELECTRIC POWER SYSTEMS RESEARCH, 1997, 43 (01) : 53 - 60