{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:18:10Z","timestamp":1743077890587,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319208091"},{"type":"electronic","value":"9783319208107"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20810-7_6","type":"book-chapter","created":{"date-parts":[[2015,6,21]],"date-time":"2015-06-21T23:47:00Z","timestamp":1434930420000},"page":"85-100","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios"],"prefix":"10.1007","author":[{"given":"Daniel R.","family":"dos Santos","sequence":"first","affiliation":[]},{"given":"Silvio","family":"Ranise","sequence":"additional","affiliation":[]},{"given":"Luca","family":"Compagna","sequence":"additional","affiliation":[]},{"given":"Serena E.","family":"Ponta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,23]]},"reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-642-12459-4_6","volume-title":"Formal Aspects in Security and Trust","author":"A Armando","year":"2010","unstructured":"Armando, A., Ponta, S.E.: Model checking of security-sensitive business processes. In: Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, vol. 5983, pp. 66\u201380. Springer, Heidelberg (2010)"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Basin, D., Burri, S.J., Karjoth, G.: Obstruction-free authorization enforcement: aligning security with business objectives. In: CSF 2011, pp. 99\u2013113. IEEE (2011)","DOI":"10.1109\/CSF.2011.14"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Basin, D., Burri, S.J., Karjoth, G.: Optimal workflow-aware authorizations. In: Proceedings of SACMAT 2012, pp. 93\u2013102. ACM, New York (2012)","DOI":"10.1145\/2295136.2295154"},{"key":"6_CR4","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/300830.300837","volume":"2","author":"E Bertino","year":"1999","unstructured":"Bertino, E., Ferrari, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management systems. TISSeC 2, 65\u2013104 (1999)","journal-title":"TISSeC"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Bertolissi, C., dos Santos, D.R., Ranise, S.: Automated synthesis of run-time monitors to enforce authorization policies in business processes. In: ASIACCS 2015. ACM, USA (2015)","DOI":"10.1145\/2714576.2714633"},{"issue":"1","key":"6_CR6","first-page":"146","volume":"1","author":"S Ceri","year":"1989","unstructured":"Ceri, S., Gottlob, G., Tanca, L.: What you always wanted to know about datalog (and never dared to ask). IEEE TKDE 1(1), 146\u2013166 (1989)","journal-title":"IEEE TKDE"},{"key":"6_CR7","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1613\/jair.4435","volume":"51","author":"D Cohen","year":"2014","unstructured":"Cohen, D., Crampton, J., Gagarin, A., Gutin, G., Jones, M.: Iterative plan construction for the workflow satisfiability problem. JAIR 51, 555\u2013577 (2014)","journal-title":"JAIR"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Crampton, J.: A reference monitor for workflow systems with constrained task execution. In: 10th ACM SACMAT, pp. 38\u201347. ACM (2005)","DOI":"10.1145\/1063979.1063986"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Crampton, J., Gutin, G., Yeo, A.: On the parameterized complexity of the workflow satisfiability problem. In: CCS 2012, pp. 857\u2013868. ACM (2012)","DOI":"10.1145\/2382196.2382287"},{"issue":"1","key":"6_CR10","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s10009-012-0269-3","volume":"16","author":"J Crampton","year":"2014","unstructured":"Crampton, J., Huth, M., Kuo, J.: Authorized workflow schemas: deciding realizability through LTL(F) model checking. STTT 16(1), 31\u201348 (2014)","journal-title":"STTT"},{"issue":"2","key":"6_CR11","first-page":"91","volume":"63","author":"R Dijkman","year":"2012","unstructured":"Dijkman, R., La Rosa, M., Reijers, H.A.: Editorial: managing large collections of business process models-current techniques and challenges. CI 63(2), 91\u201397 (2012)","journal-title":"CI"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Kohler, M., Schaad, A.: Avoiding policy-based deadlocks in business processes. In: ARES 2008, pp. 709\u2013716. IEEE (2008)","DOI":"10.1109\/ARES.2008.131"},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/3-540-36388-2_6","volume-title":"Practical Aspects of Declarative Languages","author":"N Li","year":"2002","unstructured":"Li, N., Mitchell, J.C.: DATALOG with constraints: a foundation for trust management languages. In: Dahl, V. (ed.) PADL 2003. LNCS, vol. 2562, pp. 58\u201373. Springer, Heidelberg (2002)"},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/978-3-662-43936-4_14","volume-title":"Data and Applications Security and Privacy XXVIII","author":"H Lu","year":"2014","unstructured":"Lu, H., Hong, Y., Yang, Y., Fang, Y., Duan, L.: Dynamic workflow adjustment with security constraints. In: Atluri, V., Pernul, G. (eds.) DBSec 2014. LNCS, vol. 8566, pp. 211\u2013226. Springer, Heidelberg (2014)"},{"key":"6_CR15","unstructured":"OMG. Business process model and notation (BPMN), Version 2.0. Technical report, Object Management Group (2011)"},{"issue":"99","key":"6_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/MDT.2011.49","volume":"PP","author":"I Ray","year":"2013","unstructured":"Ray, I., Yang, P., Xie, X., Lu, S.: Satisfiability analysis of workflows with control-flow patterns and authorization constraints. IEEE TSC PP(99), 1\u201314 (2013)","journal-title":"IEEE TSC"},{"issue":"29","key":"6_CR17","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"2","author":"R Sandhu","year":"1996","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., Youmann, C.: Role-based access control models. IEEE Comput. 2(29), 38\u201347 (1996)","journal-title":"IEEE Comput."},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Solworth, J.A.: Approvability. In: Proceedings of ASIACCS 2006, pp. 231\u2013242. ACM, New York (2006)","DOI":"10.1145\/1128817.1128852"},{"key":"6_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2013\/507984","volume":"2013","author":"WMP Aalst van der","year":"2013","unstructured":"van der Aalst, W.M.P.: Business process management: a comprehensive survey. ISRN Softw. Eng. 2013, 1\u201337 (2013)","journal-title":"ISRN Softw. Eng."},{"key":"6_CR20","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.is.2004.02.002","volume":"30","author":"WMP Aalst van der","year":"2003","unstructured":"van der Aalst, W.M.P., Ter Hofstede, A.H.M.: Yawl: yet another workflow language. Inf. Sys. 30, 245\u2013275 (2003)","journal-title":"Inf. Sys."},{"key":"6_CR21","first-page":"40:1","volume":"13","author":"Q Wang","year":"2010","unstructured":"Wang, Q., Li, N.: Satisfiability and resiliency in workflow authorization systems. TISSeC 13, 40:1\u201340:35 (2010)","journal-title":"TISSeC"},{"key":"6_CR22","volume-title":"Business Process Management: Concepts, Languages, Architectures","author":"M Weske","year":"2007","unstructured":"Weske, M.: Business Process Management: Concepts, Languages, Architectures. Springer-Verlag New York Inc., Secaucus (2007)"},{"issue":"3","key":"6_CR23","doi-asserted-by":"publisher","first-page":"975","DOI":"10.1007\/s10270-012-0286-4","volume":"13","author":"N Zaaboub Haddar","year":"2014","unstructured":"Zaaboub Haddar, N., Makni, L., Ben Abdallah, H.: Literature review of reuse in business process modeling. Softw. Syst. Model. 13(3), 975\u2013989 (2014)","journal-title":"Softw. Syst. Model."}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXIX"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20810-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,21]],"date-time":"2019-06-21T20:14:34Z","timestamp":1561148074000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20810-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319208091","9783319208107"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20810-7_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"23 June 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}