Dynamic Workflow Adjustment with Security Constraints

被引:0
|
作者
Lu, Haibing [1 ]
Hong, Yuan [2 ]
Yang, Yanjiang [3 ]
Fang, Yi [1 ]
Duan, Lian [4 ]
机构
[1] Santa Clara Univ, Santa Clara, CA 95053 USA
[2] SUNY Albany, Albany, NY 12222 USA
[3] I2R Singapore, Singapore, Singapore
[4] New Jersey Inst Technol, Newark, NJ 07102 USA
关键词
workflow; security; dynamic; satisfiability;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Dynamic workflow adjustment studies how to minimally adjust existing user-task assignments, when a sudden change occurs, e.g. absence of users, so that all tasks are being attended and no constraint is violated. In particular, we study two key questions: (i) Will the workflow still be satisfiable given a change? (ii) If the answer is yes, how to find a satisfying assignment with the minimum perturbation to the old system? We consider various types of changes, including absence of a user, addition of a separation-of-duty constraint, addition of a binding-of-duty constraint, and revocation of a user-to-task authorization, study their theoretical properties and formulate them into the well-studied Boolean satisfiability problem, which enables a system engineer without much technical background to solve problems by using standard satisfiability solvers. A step further, towards more efficient solutions for our specific problems, we propose customized algorithms by adapting and tailoring the state-of-art algorithms inside standard solvers. Our work would have implications for business process management, staffing, and cost planning.
引用
收藏
页码:211 / 226
页数:16
相关论文
共 50 条
  • [31] The Analysis of Security Workflow Model
    Lei, Zheng
    Hui, Yuan
    Liang, Dong
    [J]. PROCEEDINGS OF 2017 IEEE 7TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC), 2017, : 211 - 214
  • [32] Security aspects in teleradiology workflow
    Soegner, PFW
    Helweg, G
    Holzer, H
    zur Nedden, D
    [J]. MEDICAL IMAGING 2000: PACS DESIGN AND EVALUATION - ENGINEERING AND CLINICAL ISSUES, 2000, 3980 : 322 - 326
  • [33] Cloud Workflow and Security: A Survey
    Anupa, J.
    Sekaran, K. Chandra
    [J]. 2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 1598 - 1607
  • [34] Security Constraints in Modeling of Access Control Rules for Dynamic Information Systems
    Poniszewska-Maranda, Aneta
    [J]. SOFSEM 2014: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2014, 8327 : 466 - 477
  • [35] Loadability of power systems with steady-state and dynamic security constraints
    Gan, D
    Qu, Z
    Wu, X
    [J]. INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2003, 25 (02) : 91 - 96
  • [36] A new algorithm for combined dynamic economic emission dispatch with security constraints
    Arul, R.
    Velusami, S.
    Ravi, G.
    [J]. ENERGY, 2015, 79 : 496 - 511
  • [37] E-GRANT: Enforcing Encrypted Dynamic Security Constraints in the Cloud
    Asghar, Muhammad Rizwan
    Russello, Giovanni
    Crispo, Bruno
    [J]. 2015 3RD INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD) AND INTERNATIONAL CONFERENCE ON OPEN AND BIG (OBD), 2015, : 135 - 144
  • [38] RATIONAL-EXPECTATIONS AND THE DYNAMIC ADJUSTMENT OF SECURITY ANALYSTS FORECASTS TO NEW INFORMATION
    ACKERT, LF
    HUNTER, WC
    [J]. JOURNAL OF FINANCIAL RESEARCH, 1994, 17 (03) : 387 - 401
  • [39] Dynamic Workflow Scheduling in the Edge-Cloud Continuum: Optimizing Runtimes under Budget Constraints
    Pedratscher, Stefan
    Fahringer, Thomas
    Aznar-Poveda, Juan
    [J]. 2024 IEEE 17TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, CLOUD 2024, 2024, : 69 - 80
  • [40] Adaptive Selection of Necessary and Sufficient Checkpoints for Dynamic Verification of Temporal Constraints in Grid Workflow Systems
    Chen, Jinjun
    Yang, Yun
    [J]. ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS, 2007, 2 (02)