{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T20:08:37Z","timestamp":1743019717971,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319222639"},{"type":"electronic","value":"9783319222646"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22264-6_16","type":"book-chapter","created":{"date-parts":[[2015,8,21]],"date-time":"2015-08-21T10:33:29Z","timestamp":1440153209000},"page":"244-259","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Impact of Policy Design on Workflow Resiliency Computation Time"],"prefix":"10.1007","author":[{"given":"John C.","family":"Mace","sequence":"first","affiliation":[]},{"given":"Charles","family":"Morisset","sequence":"additional","affiliation":[]},{"given":"Aad van","family":"Moorsel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,22]]},"reference":[{"key":"16_CR1","unstructured":"Workflow handbook 1997. chapter The Workflow Reference Model, pp. 243\u2013293. John Wiley and Sons Inc, New York (1997)"},{"key":"16_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2013.10.002","volume":"40","author":"A Armando","year":"2014","unstructured":"Armando, A., Ponta, S.E.: Model checking authorization requirements in business processes. Comput. Secur. 40, 1\u201322 (2014)","journal-title":"Comput. Secur."},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Ayed, S., Cuppens-Boulahia, N., Cuppens, F.: Deploying security policy in intra and inter workflow management systems. In: International Conference on Availability, Reliability and Security (ARES 2009), pp. 58\u201365, March 2009","DOI":"10.1109\/ARES.2009.152"},{"issue":"4","key":"16_CR4","first-page":"267","volume":"11","author":"HE Bakkali","year":"2013","unstructured":"Bakkali, H.E.: Enhancing workflow systems resiliency by using delegation and priority concepts. J. Digital Inf. Manage. 11(4), 267\u2013276 (2013)","journal-title":"J. Digital Inf. Manage."},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Basin, D., Burri, S.J., Karjoth, G.: Obstruction-free authorization enforcement: aligning security with business objectives. In: Proceedings of the 2011 IEEE 24th Computer Security Foundations Symposium (CSF 2011), pp. 99\u2013113. IEEE Computer Society, Washington (2011)","DOI":"10.1109\/CSF.2011.14"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Basin, D., Burri, S.J., Karjoth, G.: Optimal workflow-aware authorizations. In: Proceedings of SACMAT 2012, pp. 93\u2013102. ACM, New York (2012)","DOI":"10.1145\/2295136.2295154"},{"issue":"1","key":"16_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1287\/isre.13.1.1.94","volume":"13","author":"A Basu","year":"2002","unstructured":"Basu, A., Kumar, A.: Research commentary: workflow management issues in e-business. Info. Sys. Res. 13(1), 1\u201314 (2002)","journal-title":"Info. Sys. Res."},{"issue":"1","key":"16_CR8","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/300830.300837","volume":"2","author":"E Bertino","year":"1999","unstructured":"Bertino, E., Ferrari, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur. 2(1), 65\u2013104 (1999)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"3","key":"16_CR9","doi-asserted-by":"publisher","first-page":"666","DOI":"10.1147\/sj.403.0666","volume":"40","author":"R Botha","year":"2001","unstructured":"Botha, R., Eloff, J.H.P.: Separation of duties for access control enforcement in workflow environments. IBM Sys. J. 40(3), 666\u2013682 (2001)","journal-title":"IBM Sys. J."},{"issue":"9","key":"16_CR10","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/2330667.2330686","volume":"55","author":"R Calinescu","year":"2012","unstructured":"Calinescu, R., Ghezzi, C., Kwiatkowska, M., Mirandola, R.: Self-adaptive software needs quantitative verification at runtime. Commun. ACM 55(9), 69\u201377 (2012)","journal-title":"Commun. ACM"},{"issue":"3","key":"16_CR11","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1109\/TSE.2010.92","volume":"37","author":"R Calinescu","year":"2011","unstructured":"Calinescu, R., Grunske, L., Kwiatkowska, M., Mirandola, R., Tamburrelli, G.: Dynamic QoS management and optimisation in service-based systems. IEEE Trans. Softw. Eng. 37(3), 387\u2013409 (2011)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"1","key":"16_CR12","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/2487222.2487226","volume":"16","author":"J Crampton","year":"2013","unstructured":"Crampton, J., Gutin, G., Yeo, A.: On the parameterized complexity and kernelization of the workflow satisfiability problem. ACM Trans. Inf. Syst. Secur. 16(1), 4 (2013)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Crampton, J., Khambhammettu, H.: Delegation and satisfiability in workflow systems. In: Proceedings of the 13th ACM symposium on Access control models and technologies, pp. 31\u201340. ACM (2008)","DOI":"10.1145\/1377836.1377842"},{"issue":"2","key":"16_CR14","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/BF01277643","volume":"3","author":"D Georgakopoulos","year":"1995","unstructured":"Georgakopoulos, D., Hornick, M., Sheth, A.: An overview of workflow management: From process modeling to workflow automation infrastructure. Distrib. Parallel Databases 3(2), 119\u2013153 (1995)","journal-title":"Distrib. Parallel Databases"},{"issue":"8","key":"16_CR15","doi-asserted-by":"publisher","first-page":"1177","DOI":"10.1016\/j.future.2012.03.003","volume":"28","author":"L He","year":"2012","unstructured":"He, L., Huang, C., Duan, K., Li, K., Chen, H., Sun, J., Jarvis, S.A.: Modeling and analyzing the impact of authorization on workflow executions. Future Gener. Comput. Sys. 28(8), 1177\u20131193 (2012)","journal-title":"Future Gener. Comput. Sys."},{"issue":"1","key":"16_CR16","doi-asserted-by":"publisher","first-page":"011007","DOI":"10.1115\/1.4023362","volume":"13","author":"L Herbert","year":"2013","unstructured":"Herbert, L., Sharp, R.: Precise quantitative analysis of probabilistic business process model and notation workflows. J. Comput. Inf. Sci. Eng. 13(1), 011007 (2013)","journal-title":"J. Comput. Inf. Sci. Eng."},{"issue":"1983","key":"16_CR17","doi-asserted-by":"publisher","first-page":"20120085","DOI":"10.1098\/rsta.2012.0085","volume":"371","author":"H Hiden","year":"2013","unstructured":"Hiden, H., Woodman, S., Watson, P., Cala, J.: Developing cloud applications using the e-science central platform. Philos. Trans. R. Soc. A : Math. Phys. Eng. Sci. 371(1983), 20120085 (2013)","journal-title":"Philos. Trans. R. Soc. A : Math. Phys. Eng. Sci."},{"key":"16_CR18","volume-title":"Dynamic Programming and Markov Processes","author":"RA Howard","year":"1960","unstructured":"Howard, R.A.: Dynamic Programming and Markov Processes. MIT Press, Cambridge (1960)"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Kohler, M., Liesegang, C., Schaad, A.: Classification model for access control constraints. In: IEEE International on Performance, Computing, and Communications Conference (IPCCC 2007) pp. 410\u2013417, April 2007","DOI":"10.1109\/PCCC.2007.358921"},{"key":"16_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1007\/978-3-642-22110-1_47","volume-title":"Computer Aided Verification","author":"M Kwiatkowska","year":"2011","unstructured":"Kwiatkowska, M., Norman, G., Parker, D.: PRISM 4.0: verification of probabilistic real-time systems. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 585\u2013591. Springer, Heidelberg (2011)"},{"key":"16_CR21","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-642-03315-5_15","volume-title":"The Future of Identity in the Information Society","author":"M Lowalekar","year":"2009","unstructured":"Lowalekar, M., Tiwari, R.K., Karlapalem, K.: Security policy satisfiability and failure resilience in workflows. In: Maty\u00e1\u0161, V., Fischer-H\u00fcbner, S., Cvr\u010dek, D., \u0160venda, P. (eds.) The Future of Identity. IFIP AICT, vol. 298, pp. 197\u2013210. Springer, Heidelberg (2009)"},{"key":"16_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1007\/978-3-319-11203-9_20","volume-title":"Computer Security - ESORICS 2014","author":"JC Mace","year":"2014","unstructured":"Mace, J.C., Morisset, C., van Moorsel, A.: Quantitative workflow resiliency. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ICAIS 2014, Part I. LNCS, vol. 8712, pp. 344\u2013361. Springer, Heidelberg (2014)"},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"Mace, J.C., Morisset, C., van Moorsel, A.: Impact of policy design on workflow resiliency computation time. Technical report CS-TR-1469, School of Computing Science, Newcastle University, UK, May 2015","DOI":"10.1007\/978-3-319-22264-6_16"},{"key":"16_CR24","doi-asserted-by":"crossref","unstructured":"Mace, J.C., Morisset, C., van Moorsel, A.: Modelling user availability in workflow resiliency analysis. In: Proceedings of the 2015 Symposium and Bootcamp on the Science of Security (HotSoS 2015), pp. 7:1\u20137:10. ACM, New York (2015)","DOI":"10.1145\/2746194.2746201"},{"key":"16_CR25","doi-asserted-by":"crossref","unstructured":"Martinelli, F., Morisset, C.: Quantitative access control with partially-observable markov decision processes. In: Proceedings of CODASPY 2012, pp. 169\u2013180. ACM, New York (2012)","DOI":"10.1145\/2133601.2133623"},{"issue":"3","key":"16_CR26","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1136\/amiajnl-2011-000432","volume":"19","author":"KM Unertl","year":"2012","unstructured":"Unertl, K.M., Johnson, K.B., Lorenzi, N.M.: Health information exchange technology on the front lines of healthcare: workflow factors and patterns of use. J. Am. Med. Inform. Assoc. 19(3), 392\u2013400 (2012)","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"16_CR27","first-page":"2003","volume":"12","author":"J Wainer","year":"2003","unstructured":"Wainer, J., Barthelmess, P., Kumar, A.: W-rbac - a workflow security model incorporating controlled overriding of constraints. Int. J. Coop. Inf. Sys. 12, 2003 (2003)","journal-title":"Int. J. Coop. Inf. Sys."},{"issue":"4","key":"16_CR28","doi-asserted-by":"publisher","first-page":"40:1","DOI":"10.1145\/1880022.1880034","volume":"13","author":"Q Wang","year":"2010","unstructured":"Wang, Q., Li, N.: Satisfiability and resiliency in workflow authorization systems. ACM Trans. Inf. Syst. Secur. 13(4), 40:1\u201340:35 (2010)","journal-title":"ACM Trans. Inf. Syst. Secur."}],"container-title":["Lecture Notes in Computer Science","Quantitative Evaluation of Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22264-6_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T17:59:10Z","timestamp":1675274350000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22264-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319222639","9783319222646"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22264-6_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"22 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}