Abstract
A workflow (WF) is a formal description of a business process in which single atomic work units (tasks), organized in a partial order, are assigned to processing entities (agents) in order to achieve some business goal(s). A workflow management system must coordinate the execution of tasks and WF instances. Usually, the assignment of tasks to agents is accomplished by external constraints not represented in a WF. An access-controlled workflow (ACWF) extends a classical WF by explicitly representing agent availability for each task and authorization constraint. Authorization constraints model which users are authorized for which tasks depending on “who did what”. Recent research has addressed temporal controllability of WFs under conditional and temporal uncertainty. However, controllability analysis for ACWFs under conditional uncertainty has never been addressed before. In this paper, we define weak, strong and dynamic controllability of ACWFs under conditional uncertainty, we present algorithmic approaches to address each of these types of controllability, and we synthesize execution strategies that specify which user has been (or will be) assigned to which task.
Similar content being viewed by others
Notes
- 1.
SoD is a security policy saying that a subset of tasks must be carried out by different users, whereas BoD says that a subset of tasks must be carried out by the same user.
- 2.
Two tasks with consistent labels must be considered in at least one WF execution.
References
Cabanillas, C., Resinas, M., del Río-Ortega, A., Cortés, A.R.: Specification and automated design-time analysis of the business process human resource perspective. Inf. Syst. 52, 55–82 (2015). doi:10.1016/j.is.2015.03.002
Cimatti, A., Hunsberger, L., Micheli, A., Posenato, R., Roveri, M.: Dynamic controllability via timed game automata. Acta Informatica 53(6–8), 681–722 (2016). doi:10.1007/s00236-016-0257-2
Combi, C., Gambini, M., Migliorini, S.: The NestFlow interpretation of workflow control-flow patterns. In: Eder, J., Bielikova, M., Tjoa, A.M. (eds.) ADBIS 2011. LNCS, vol. 6909, pp. 316–332. Springer, Heidelberg (2011). doi:10.1007/978-3-642-23737-9_23
Combi, C., Gambini, M., Migliorini, S., Posenato, R.: Representing business processes through a temporal data-centric workflow modeling language: an application to the management of clinical pathways. IEEE Trans. Syst. Man Cybern. Syst. 44(9), 1182–1203 (2014). doi:10.1109/TSMC.2014.2300055
Combi, C., Posenato, R., Viganò, L., Zavatteri, M.: Access controlled temporal networks. In: Proceedings of the 9th International Conference on Agents and Artificial Intelligence (ICAART), pp. 118–131 (2017). doi:10.5220/0006185701180131
Combi, C., Viganò, L., Zavatteri, M.: Security constraints in temporal role-based access-controlled workflows. In: CODASPY 2016, pp. 207–218 (2016). doi:10.1145/2857705.2857716
Dechter, R.: Constraint Processing. Kaufmann, San Francisco (2003)
Dechter, R., Pearl, J.: Network-based heuristics for constraint-satisfaction problems. Artif. Intell. 34(1), 1–38 (1987). doi:10.1016/0004-3702(87)90002-6
Freuder, E.C.: A sufficient condition for backtrack-free search. J. ACM 29, 24–32 (1982)
Gottlob, G.: On minimal constraint networks. Artif. Intell. 191–192, 42–60 (2012). doi:10.1016/j.artint.2012.07.006
Hollingsworth, D.: The workflow reference model (1995). http://www.wfmc.org/standards/model.htm
Mackworth, A.K.: Consistency in networks of relations. Artif. Intell. 8(1), 99–118 (1977). doi:10.1016/0004-3702(77)90007-8
Montanari, U.: Networks of constraints: fundamental properties and applications to picture processing. Inf. Sci. 7, 95–132 (1974). doi:10.1016/0020-0255(74)90008-5
Morris, P.H., Muscettola, N., Vidal, T.: Dynamic control of plans with temporal uncertainty. In: IJCAI 2001, pp. 494–502 (2001)
Reijers, H., Mendling, J.: Modularity in process models: review and effects. In: Dumas, M., Reichert, M., Shan, M.-C. (eds.) BPM 2008. LNCS, vol. 5240, pp. 20–35. Springer, Heidelberg (2008). doi:10.1007/978-3-540-85758-7_5
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Comput. 29(2), 38–47 (1996). doi:10.1109/2.485845
Wang, Q., Li, N.: Satisfiability and resiliency in workflow authorization systems. ACM Trans. Inf. Syst. Secur. 13(4) (2010). doi:10.1145/1880022.1880034
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Zavatteri, M., Combi, C., Posenato, R., Viganò, L. (2017). Weak, Strong and Dynamic Controllability of Access-Controlled Workflows Under Conditional Uncertainty. In: Carmona, J., Engels, G., Kumar, A. (eds) Business Process Management. BPM 2017. Lecture Notes in Computer Science(), vol 10445. Springer, Cham. https://doi.org/10.1007/978-3-319-65000-5_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-65000-5_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-64999-3
Online ISBN: 978-3-319-65000-5
eBook Packages: Computer ScienceComputer Science (R0)