Issue No. 02 - April-June (2014 vol. 7)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/TSC.2013.31
Ping Yang , Department of Computer Science, State University of New York at Binghamton , Binghamton, New York, USA
Xing Xie , Department of Computer Science, Colorado State University, Fort Collins, CO, USA
Indrakshi Ray , Department of Computer Science, Colorado State University, Fort Collins, CO, USA
Shiyong Lu , Department of Computer Science, Wayne State University, Detroit , Michigan, USA
Workflow security has become increasingly important and challenging in today's open service world. While much research has been conducted on various security issues of workflow systems, the workflow satisfiability problem, which asks whether a set of users together can complete a workflow, is recently identified as an important research problem that needs more investigation. In this paper, we study the computational complexity of the problem along two directions: one is by considering either one path or all paths of a workflow, and the other is by considering the possible patterns in a workflow. We have shown that the general workflow satisfiability analysis problem is intractable. This result motivates us to consider restrictions on workflow control-flow patterns and access control policies, and to identify tractable cases of practical interest.
access control, Workflow satisfiability analysis
P. Yang, X. Xie, I. Ray and S. Lu, "Satisfiability Analysis of Workflows with Control-Flow Patterns and Authorization Constraints," in IEEE Transactions on Services Computing, vol. 7, no. 2, pp. 237-251, 2014.