Skip to main content

Weak, Strong and Dynamic Controllability of Access-Controlled Workflows Under Conditional Uncertainty

  • Conference paper
  • First Online:
Business Process Management (BPM 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10445))

Included in the following conference series:

Abstract

A workflow (WF) is a formal description of a business process in which single atomic work units (tasks), organized in a partial order, are assigned to processing entities (agents) in order to achieve some business goal(s). A workflow management system must coordinate the execution of tasks and WF instances. Usually, the assignment of tasks to agents is accomplished by external constraints not represented in a WF. An access-controlled workflow (ACWF) extends a classical WF by explicitly representing agent availability for each task and authorization constraint. Authorization constraints model which users are authorized for which tasks depending on “who did what”. Recent research has addressed temporal controllability of WFs under conditional and temporal uncertainty. However, controllability analysis for ACWFs under conditional uncertainty has never been addressed before. In this paper, we define weak, strong and dynamic controllability of ACWFs under conditional uncertainty, we present algorithmic approaches to address each of these types of controllability, and we synthesize execution strategies that specify which user has been (or will be) assigned to which task.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    SoD is a security policy saying that a subset of tasks must be carried out by different users, whereas BoD says that a subset of tasks must be carried out by the same user.

  2. 2.

    Two tasks with consistent labels must be considered in at least one WF execution.

References

  1. Cabanillas, C., Resinas, M., del Río-Ortega, A., Cortés, A.R.: Specification and automated design-time analysis of the business process human resource perspective. Inf. Syst. 52, 55–82 (2015). doi:10.1016/j.is.2015.03.002

    Article  Google Scholar 

  2. Cimatti, A., Hunsberger, L., Micheli, A., Posenato, R., Roveri, M.: Dynamic controllability via timed game automata. Acta Informatica 53(6–8), 681–722 (2016). doi:10.1007/s00236-016-0257-2

    Article  MathSciNet  MATH  Google Scholar 

  3. Combi, C., Gambini, M., Migliorini, S.: The NestFlow interpretation of workflow control-flow patterns. In: Eder, J., Bielikova, M., Tjoa, A.M. (eds.) ADBIS 2011. LNCS, vol. 6909, pp. 316–332. Springer, Heidelberg (2011). doi:10.1007/978-3-642-23737-9_23

    Chapter  Google Scholar 

  4. Combi, C., Gambini, M., Migliorini, S., Posenato, R.: Representing business processes through a temporal data-centric workflow modeling language: an application to the management of clinical pathways. IEEE Trans. Syst. Man Cybern. Syst. 44(9), 1182–1203 (2014). doi:10.1109/TSMC.2014.2300055

    Article  Google Scholar 

  5. Combi, C., Posenato, R., Viganò, L., Zavatteri, M.: Access controlled temporal networks. In: Proceedings of the 9th International Conference on Agents and Artificial Intelligence (ICAART), pp. 118–131 (2017). doi:10.5220/0006185701180131

  6. Combi, C., Viganò, L., Zavatteri, M.: Security constraints in temporal role-based access-controlled workflows. In: CODASPY 2016, pp. 207–218 (2016). doi:10.1145/2857705.2857716

  7. Dechter, R.: Constraint Processing. Kaufmann, San Francisco (2003)

    MATH  Google Scholar 

  8. Dechter, R., Pearl, J.: Network-based heuristics for constraint-satisfaction problems. Artif. Intell. 34(1), 1–38 (1987). doi:10.1016/0004-3702(87)90002-6

    Article  MathSciNet  MATH  Google Scholar 

  9. Freuder, E.C.: A sufficient condition for backtrack-free search. J. ACM 29, 24–32 (1982)

    Article  MathSciNet  Google Scholar 

  10. Gottlob, G.: On minimal constraint networks. Artif. Intell. 191–192, 42–60 (2012). doi:10.1016/j.artint.2012.07.006

    Article  MathSciNet  MATH  Google Scholar 

  11. Hollingsworth, D.: The workflow reference model (1995). http://www.wfmc.org/standards/model.htm

  12. Mackworth, A.K.: Consistency in networks of relations. Artif. Intell. 8(1), 99–118 (1977). doi:10.1016/0004-3702(77)90007-8

    Article  MathSciNet  MATH  Google Scholar 

  13. Montanari, U.: Networks of constraints: fundamental properties and applications to picture processing. Inf. Sci. 7, 95–132 (1974). doi:10.1016/0020-0255(74)90008-5

    Article  MathSciNet  MATH  Google Scholar 

  14. Morris, P.H., Muscettola, N., Vidal, T.: Dynamic control of plans with temporal uncertainty. In: IJCAI 2001, pp. 494–502 (2001)

    Google Scholar 

  15. Reijers, H., Mendling, J.: Modularity in process models: review and effects. In: Dumas, M., Reichert, M., Shan, M.-C. (eds.) BPM 2008. LNCS, vol. 5240, pp. 20–35. Springer, Heidelberg (2008). doi:10.1007/978-3-540-85758-7_5

    Chapter  Google Scholar 

  16. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Comput. 29(2), 38–47 (1996). doi:10.1109/2.485845

    Article  Google Scholar 

  17. Wang, Q., Li, N.: Satisfiability and resiliency in workflow authorization systems. ACM Trans. Inf. Syst. Secur. 13(4) (2010). doi:10.1145/1880022.1880034

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Matteo Zavatteri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Zavatteri, M., Combi, C., Posenato, R., Viganò, L. (2017). Weak, Strong and Dynamic Controllability of Access-Controlled Workflows Under Conditional Uncertainty. In: Carmona, J., Engels, G., Kumar, A. (eds) Business Process Management. BPM 2017. Lecture Notes in Computer Science(), vol 10445. Springer, Cham. https://doi.org/10.1007/978-3-319-65000-5_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-65000-5_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-64999-3

  • Online ISBN: 978-3-319-65000-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics