Abstract
Security-sensitive workflows impose constraints on the controlflow and authorization policies that may lead to unsatisfiable instances. In these cases, it is still possible to find "least bad" executions where costs associated to authorization violations are minimized, solving the so-called Multi-Objective Workflow Satisfiability Problem (MO-WSP). The MO-WSP is inspired by the Valued WSP and its generalization, the Bi-Objective WSP, but our work considers quantitative solutions to the WSP without abstracting control-flow constraints. In this paper, we define variations of the MO-WSP and solve them using bounded model checking and optimization modulo theories solving. We validate our solutions on real-world workflows and show their scalability on synthetic instances.
| Original language | English |
|---|---|
| Title of host publication | SACMAT 2018 - Proceedings of the 23rd ACM Symposium on Access Control Models and Technologies |
| Publisher | Association for Computing Machinery, Inc. |
| Pages | 117-128 |
| Number of pages | 12 |
| ISBN (Electronic) | 9781450356664 |
| DOIs | |
| Publication status | Published - 7 Jun 2018 |
| Event | 23rd ACM Symposium on Access Control Models and Technologies (SACMAT 2018) - Indianapolis, United States Duration: 13 Jun 2018 → 15 Jun 2018 Conference number: 23 http://www.sacmat.org |
Conference
| Conference | 23rd ACM Symposium on Access Control Models and Technologies (SACMAT 2018) |
|---|---|
| Abbreviated title | SACMAT 2018 |
| Country/Territory | United States |
| City | Indianapolis |
| Period | 13/06/18 → 15/06/18 |
| Internet address |
Keywords
- Business process
- Optimization modulo theories
- Workflow satisfiability
Fingerprint
Dive into the research topics of 'Solving multi-objective workflow satisfiability problems with optimization modulo theories techniques'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver