Log- and Model-Based Techniques for Security-Sensitive Tackling of Obstructed Workflow Executions
Julius Holderer, Josep Carmona, Farbod Taymouri, Guenter Mueller, M Koutny (ed.), J Kleijn (ed.), W Penczek (ed.)
TRANSACTIONS ON PETRI NETS AND OTHER MODELS OF CONCURRENCY XII | SPRINGER INTERNATIONAL PUBLISHING AG | Published : 2017
Imposing access control onto workflows considerably reduces the set of users authorized to execute the workflow tasks. Further constraints (e.g. Separation of Duties) as well as unexpected unavailability of users may finally obstruct the successful workflow execution. To still complete the execution of an obstructed workflow, we envisage a hybrid approach. We first flatten the workflow and its authorizations into a Petri net and analyse for or encode the obstruction with a corresponding “obstruction marking”. If a log is provided, we partition its traces into “successful” or “obstructed” by replaying the log on the flattened net. An obstruction should then be solved by finding its nearest ma..View full abstract
Awarded by European Union (FEDER funds) under grant COMMAS
This work has been partially supported by funds from the Spanish Ministry for Economy and Competitiveness (MINECO), the European Union (FEDER funds) under grant COMMAS (ref. TIN2013-46181-C2-1-R).