Conference Proceedings

Log- and Model-Based Techniques for Security-Sensitive Tackling of Obstructed Workflow Executions

Julius Holderer, Josep Carmona, Farbod Taymouri, Guenter Mueller, M Koutny (ed.), J Kleijn (ed.), W Penczek (ed.)

TRANSACTIONS ON PETRI NETS AND OTHER MODELS OF CONCURRENCY XII | SPRINGER INTERNATIONAL PUBLISHING AG | Published : 2017

Abstract

Imposing access control onto workflows considerably reduces the set of users authorized to execute the workflow tasks. Further constraints (e.g. Separation of Duties) as well as unexpected unavailability of users may finally obstruct the successful workflow execution. To still complete the execution of an obstructed workflow, we envisage a hybrid approach. We first flatten the workflow and its authorizations into a Petri net and analyse for or encode the obstruction with a corresponding “obstruction marking”. If a log is provided, we partition its traces into “successful” or “obstructed” by replaying the log on the flattened net. An obstruction should then be solved by finding its nearest ma..

View full abstract

Grants

Awarded by European Union (FEDER funds) under grant COMMAS


Funding Acknowledgements

This work has been partially supported by funds from the Spanish Ministry for Economy and Competitiveness (MINECO), the European Union (FEDER funds) under grant COMMAS (ref. TIN2013-46181-C2-1-R).