{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T21:52:07Z","timestamp":1767649927496,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319112022"},{"type":"electronic","value":"9783319112039"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11203-9_20","type":"book-chapter","created":{"date-parts":[[2014,8,14]],"date-time":"2014-08-14T20:36:46Z","timestamp":1408048606000},"page":"344-361","source":"Crossref","is-referenced-by-count":20,"title":["Quantitative Workflow Resiliency"],"prefix":"10.1007","author":[{"given":"John C.","family":"Mace","sequence":"first","affiliation":[]},{"given":"Charles","family":"Morisset","sequence":"additional","affiliation":[]},{"given":"Aad","family":"van Moorsel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":": Workflow handbook, pp. 243\u2013293. John Wiley & Sons, Inc., New York (1997)"},{"issue":"1","key":"20_CR2","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/300830.300837","volume":"2","author":"E. Bertino","year":"1999","unstructured":"Bertino, E., Ferrari, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur.\u00a02(1), 65\u2013104 (1999)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"3","key":"20_CR3","doi-asserted-by":"publisher","first-page":"666","DOI":"10.1147\/sj.403.0666","volume":"40","author":"R. Botha","year":"2001","unstructured":"Botha, R., Eloff, J.H.P.: Separation of duties for access control enforcement in workflow environments. IBM Systems Journal\u00a040(3), 666\u2013682 (2001)","journal-title":"IBM Systems Journal"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Kohler, M., Liesegang, C., Schaad, A.: Classification model for access control constraints. In: IEEE International Performance, Computing, and Communications Conference, IPCCC 2007, pp. 410\u2013417 (April 2007)","DOI":"10.1109\/PCCC.2007.358921"},{"key":"20_CR5","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/1063979.1063986","volume-title":"Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, SACMAT 2005","author":"J. Crampton","year":"2005","unstructured":"Crampton, J.: A reference monitor for workflow systems with constrained task execution. In: Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, SACMAT 2005, pp. 38\u201347. ACM, New York (2005)"},{"issue":"4","key":"20_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1880022.1880034","volume":"13","author":"Q. Wang","year":"2010","unstructured":"Wang, Q., Li, N.: Satisfiability and resiliency in workflow authorization systems. ACM Trans. Inf. Syst. Secur.\u00a013(4), 40:1\u201340:35 (2010)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"3","key":"20_CR7","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1080\/07421222.2002.11045693","volume":"18","author":"A. Kumar","year":"2002","unstructured":"Kumar, A., van der Aalst, W.M.P., Verbeek, E.M.W.: Dynamic work distribution in workflow management systems: How to balance quality and performance. J. Manage. Inf. Syst.\u00a018(3), 157\u2013193 (2002)","journal-title":"J. Manage. Inf. Syst."},{"key":"20_CR8","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1109\/CSF.2011.14","volume-title":"Proceedings of the 2011 IEEE 24th Computer Security Foundations Symposium, CSF 2011","author":"D. Basin","year":"2011","unstructured":"Basin, D., Burri, S.J., Karjoth, G.: Obstruction-free authorization enforcement: Aligning security with business objectives. In: Proceedings of the 2011 IEEE 24th Computer Security Foundations Symposium, CSF 2011, pp. 99\u2013113. IEEE Computer Society, Washington, DC (2011)"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Kohler, M., Schaad, A.: Avoiding policy-based deadlocks in business processes. In: Third International Conference on Availability, Reliability and Security, ARES 2008, pp. 709\u2013716 (2008)","DOI":"10.1109\/ARES.2008.131"},{"key":"20_CR10","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1145\/2382196.2382287","volume-title":"Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012","author":"J. Crampton","year":"2012","unstructured":"Crampton, J., Gutin, G., Yeo, A.: On the parameterized complexity of the workflow satisfiability problem. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp. 857\u2013868. ACM, New York (2012)"},{"key":"20_CR11","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1145\/2462410.2462419","volume-title":"Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, SACMAT 2013","author":"J. Crampton","year":"2013","unstructured":"Crampton, J., Gutin, G.: Constraint expressions and workflow satisfiability. In: Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, SACMAT 2013, pp. 73\u201384. ACM, New York (2013)"},{"key":"20_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-642-33167-1_7","volume-title":"Computer Security \u2013 ESORICS 2012","author":"A.A. Khan","year":"2012","unstructured":"Khan, A.A., Fong, P.W.L.: Satisfiability and feasibility in a relationship-based workflow authorization model. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol.\u00a07459, pp. 109\u2013126. Springer, Heidelberg (2012)"},{"key":"20_CR13","unstructured":"Tan, K., Crampton, J., Gunter, C.: The consistency of task-based authorization constraints in workflow. In: Proceedings of the 17th IEEE Computer Security Foundations Workshop, pp. 155\u2013169 (June 2004)"},{"key":"20_CR14","unstructured":"National Quality Board: How to ensure the right people, with the right skills, are in the right place at the right time @ONLINE (2013)"},{"key":"20_CR15","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-642-03315-5_15","volume-title":"The Future of Identity in the Information Society","author":"M. Lowalekar","year":"2009","unstructured":"Lowalekar, M., Tiwari, R.K., Karlapalem, K.: Security policy satisfiability and failure resilience in workflows. In: Maty\u00e1\u0161, V., Fischer-H\u00fcbner, S., Cvr\u010dek, D., \u0160venda, P. (eds.) The Future of Identity. IFIP AICT, vol.\u00a0298, pp. 197\u2013210. Springer, Heidelberg (2009)"},{"key":"20_CR16","first-page":"93","volume-title":"Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, SACMAT 2012","author":"D. Basin","year":"2012","unstructured":"Basin, D., Burri, S.J., Karjoth, G.: Optimal workflow-aware authorizations. In: Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, SACMAT 2012, pp. 93\u2013102. ACM, New York (2012)"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Wainer, J., Barthelmess, P., Kumar, A.: W-rbac - a workflow security model incorporating controlled overriding of constraints. International Journal of Cooperative Information Systems\u00a012, 2003 (2003)","DOI":"10.1142\/S0218843003000814"},{"issue":"4","key":"20_CR18","first-page":"267","volume":"11","author":"H.E. Bakkali","year":"2013","unstructured":"Bakkali, H.E.: Enhancing workflow systems resiliency by using delegation and priority concepts. Journal of Digital Information Management\u00a011(4), 267\u2013276 (2013)","journal-title":"Journal of Digital Information Management"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Mace, J., van Moorsel, A., Watson, P.: The case for dynamic security solutions in public cloud workflow deployments. In: 2011 IEEE\/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), pp. 111\u2013116 (June 2011)","DOI":"10.1109\/DSNW.2011.5958795"},{"issue":"1","key":"20_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/2192-113X-1-1","volume":"1","author":"P. Watson","year":"2012","unstructured":"Watson, P.: A multi-level security model for partitioning workflows over federated clouds. Journal of Cloud Computing\u00a01(1), 1\u201315 (2012)","journal-title":"Journal of Cloud Computing"},{"key":"20_CR21","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1512\/iumj.1957.6.56038","volume":"6","author":"R. Bellman","year":"1957","unstructured":"Bellman, R.: A markovian decision process. Indiana Univ. Math. J.\u00a06, 679\u2013684 (1957)","journal-title":"Indiana Univ. Math. J."},{"key":"20_CR22","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1145\/2133601.2133623","volume-title":"Proceedings of the Second ACM Conference on Data and Application Security and Privacy, CODASPY 2012","author":"F. Martinelli","year":"2012","unstructured":"Martinelli, F., Morisset, C.: Quantitative access control with partially-observable markov decision processes. In: Proceedings of the Second ACM Conference on Data and Application Security and Privacy, CODASPY 2012, pp. 169\u2013180. ACM, New York (2012)"},{"key":"20_CR23","unstructured":"Cassandra, A.R.: Optimal policies for partially observable markov decision processes. Technical report, Brown University, Providence, RI, USA (1994)"},{"issue":"1","key":"20_CR24","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/2487222.2487226","volume":"16","author":"J. Crampton","year":"2013","unstructured":"Crampton, J., Gutin, G., Yeo, A.: On the parameterized complexity and kernelization of the workflow satisfiability problem. ACM Trans. Inf. Syst. Secur.\u00a016(1), 4 (2013)","journal-title":"ACM Trans. Inf. Syst. Secur."}],"container-title":["Lecture Notes in Computer Science","Computer Security - ESORICS 2014"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11203-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,14]],"date-time":"2022-04-14T15:15:59Z","timestamp":1649949359000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11203-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319112022","9783319112039"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11203-9_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}