{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T22:08:25Z","timestamp":1767650905708,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319231280"},{"type":"electronic","value":"9783319231297"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23129-7_10","type":"book-chapter","created":{"date-parts":[[2015,8,27]],"date-time":"2015-08-27T09:03:18Z","timestamp":1440666198000},"page":"128-143","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Resiliency Variance in Workflows with Choice"],"prefix":"10.1007","author":[{"given":"John C.","family":"Mace","sequence":"first","affiliation":[]},{"given":"Charles","family":"Morisset","sequence":"additional","affiliation":[]},{"given":"Aad","family":"van Moorsel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,28]]},"reference":[{"key":"10_CR1","first-page":"243","volume-title":"Workflow Handbook 1997","author":"Workflow Management Coalition","year":"1997","unstructured":"Workflow Management Coalition: The workflow reference model. In: Lawrence, P. (ed.) Workflow Handbook 1997, pp. 243\u2013293. Wiley, New York (1997)"},{"issue":"4","key":"10_CR2","first-page":"267","volume":"11","author":"HE Bakkali","year":"2013","unstructured":"Bakkali, H.E.: Enhancing workflow systems resiliency by using delegation and priority concepts. J. Digit. Inf. Manag. 11(4), 267\u2013276 (2013)","journal-title":"J. Digit. Inf. Manag."},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Basin, D., Burri, S.J., Karjoth, G.: Obstruction-free authorization enforcement: aligning security with business objectives. In: Proceedings of the 2011 IEEE 24th Computer Security Foundations Symposium, CSF 2011, pp. 99\u2013113. IEEE Computer Society, Washington, DC (2011)","DOI":"10.1109\/CSF.2011.14"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Basin, D., Burri, S.J., Karjoth, G.: Optimal workflow-aware authorizations. In: Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, SACMAT 2012, pp. 93\u2013102. ACM, New York (2012)","DOI":"10.1145\/2295136.2295154"},{"issue":"1","key":"10_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1287\/isre.13.1.1.94","volume":"13","author":"A Basu","year":"2002","unstructured":"Basu, A., Kumar, A.: Research commentary: workflow management issues in e-business. Inf. Syst. Res. 13(1), 1\u201314 (2002)","journal-title":"Inf. Syst. Res."},{"key":"10_CR6","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1512\/iumj.1957.6.56038","volume":"6","author":"R Bellman","year":"1957","unstructured":"Bellman, R.: A Markovian decision process. Indiana Univ. Math. J. 6, 679\u2013684 (1957)","journal-title":"Indiana Univ. Math. J."},{"issue":"3","key":"10_CR7","doi-asserted-by":"publisher","first-page":"666","DOI":"10.1147\/sj.403.0666","volume":"40","author":"R Botha","year":"2001","unstructured":"Botha, R., Eloff, J.H.P.: Separation of duties for access control enforcement in workflow environments. IBM Syst. J. 40(3), 666\u2013682 (2001)","journal-title":"IBM Syst. J."},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Brunel, J., Cuppens, F., Cuppens, N., Sans, T., Bodeveix, J.-P.: Security policy compliance with violation management. In: Proceedings of the 2007 ACM Workshop on Formal Methods in Security Engineering, FMSE 2007, pp. 31\u201340. ACM, New York (2007)","DOI":"10.1145\/1314436.1314441"},{"issue":"1","key":"10_CR9","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/2487222.2487226","volume":"16","author":"J Crampton","year":"2013","unstructured":"Crampton, J., Gutin, G., Yeo, A.: On the parameterized complexity and kernelization of the workflow satisfiability problem. ACM Trans. Inf. Syst. Secur. 16(1), 4 (2013)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"10_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-22444-7_1","volume-title":"Security and Trust Management","author":"J Crampton","year":"2011","unstructured":"Crampton, J., Morisset, C.: An auto-delegation mechanism for access control systems. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. LNCS, vol. 6710, pp. 1\u201316. Springer, Heidelberg (2011)"},{"key":"10_CR11","volume-title":"Strategic Risk Taking: A Framework for Risk Management","author":"A Damodaran","year":"2007","unstructured":"Damodaran, A.: Strategic Risk Taking: A Framework for Risk Management, 1st edn. Wharton School Publishing, Upper Saddle River (2007)","edition":"1"},{"key":"10_CR12","unstructured":"Eder, J., Liebhart, W.: Workflow recovery. In: Proceedings of the First IFCIS International Conference on Cooperative Information Systems, 1996, pp. 124\u2013134, June 1996"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Gaaloul, K., Schaad, A., Flegel, U., Charoy, F.: A secure task delegation model for workflows. In: Second International Conference on Emerging Security Information, Systems and Technologies, 2008, SECURWARE 2008, pp. 10\u201315, August 2008","DOI":"10.1109\/SECURWARE.2008.21"},{"issue":"2","key":"10_CR14","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/BF01277643","volume":"3","author":"D Georgakopoulos","year":"1995","unstructured":"Georgakopoulos, D., Hornick, M., Sheth, A.: An overview of workflow management: from process modeling to workflow automation infrastructure. Distrib. Parallel Databases 3(2), 119\u2013153 (1995)","journal-title":"Distrib. Parallel Databases"},{"issue":"1983","key":"10_CR15","doi-asserted-by":"publisher","first-page":"20120085","DOI":"10.1098\/rsta.2012.0085","volume":"371","author":"H Hiden","year":"2013","unstructured":"Hiden, H., Woodman, S., Watson, P., Cala, J.: Developing cloud applications using the e-science central platform. Philos. Trans. R. Soc. A Math. Phys. Eng. Sci. 371(1983), 20120085 (2013)","journal-title":"Philos. Trans. R. Soc. A Math. Phys. Eng. Sci."},{"key":"10_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/3-540-45140-4_29","volume-title":"Advanced Information Systems Engineering","author":"B Kiepuszewski","year":"2000","unstructured":"Kiepuszewski, B., ter Hofstede, A.H.M., Bussler, C.J.: On structured workflow modelling. In: Wangler, B., Bergman, L.D. (eds.) CAiSE 2000. LNCS, vol. 1789, pp. 431\u2013445. Springer, Heidelberg (2000)"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Kohler, M., Liesegang, C., Schaad, A.: Classification model for access control constraints. In: IEEE International Performance, Computing, and Communications Conference, 2007, IPCCC 2007, pp. 410\u2013417, April 2007","DOI":"10.1109\/PCCC.2007.358921"},{"issue":"3","key":"10_CR18","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1080\/07421222.2002.11045693","volume":"18","author":"A Kumar","year":"2002","unstructured":"Kumar, A., van der Aalst, W.M.P., Verbeek, E.M.W.: Dynamic work distribution in workflow management systems: how to balance quality and performance. J. Manage. Inf. Syst. 18(3), 157\u2013193 (2002)","journal-title":"J. Manage. Inf. Syst."},{"key":"10_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1007\/978-3-642-22110-1_47","volume-title":"Computer Aided Verification","author":"M Kwiatkowska","year":"2011","unstructured":"Kwiatkowska, M., Norman, G., Parker, D.: PRISM 4.0: verification of probabilistic real-time systems. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 585\u2013591. Springer, Heidelberg (2011)"},{"key":"10_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1007\/978-3-319-11203-9_20","volume-title":"Computer Security - ESORICS 2014","author":"JC Mace","year":"2014","unstructured":"Mace, J.C., Morisset, C., van Moorsel, A.: Quantitative workflow resiliency. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ICAIS 2014, Part I. LNCS, vol. 8712, pp. 344\u2013361. Springer, Heidelberg (2014)"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Mace, J., Morisset, C., van Moorsel, A.: Modelling user availability in workflow resiliency analysis. In: Proceedings of the Symposium and Bootcamp on the Science of Security, HotSoS. ACM (2015)","DOI":"10.1145\/2746194.2746201"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Mace, J.C., Morisset, C., van Moorsel, A.: Impact of policy design on workflow resiliency computation time. Technical Report CS-TR-1469, School of Computing Science, Newcastle University, UK, May 2015","DOI":"10.1007\/978-3-319-22264-6_16"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Marinovic, S., Craven, R., Ma, J., Dulay, N.: Rumpole: a flexible break-glass access control model. In: Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, SACMAT 2011, pp. 73\u201382. ACM, New York (2011)","DOI":"10.1145\/1998441.1998453"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Povey, D.: Optimistic security: a new access control paradigm. In: Proceedings of the 1999 Workshop on New Security Paradigms, NSPW 1999, pp. 40\u201345. ACM, New York (2000)","DOI":"10.1145\/335169.335188"},{"key":"10_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30409-5","volume-title":"Enabling Flexibility in Process-aware Information Systems: Challenges, Methods, Technologies","author":"M Reichert","year":"2012","unstructured":"Reichert, M., Weber, B.: Enabling Flexibility in Process-aware Information Systems: Challenges, Methods, Technologies. Springer Science & Business Media, Heidelberg (2012)"},{"key":"10_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/11767138_20","volume-title":"Advanced Information Systems Engineering","author":"N Russell","year":"2006","unstructured":"Russell, N., van der Aalst, W.M.P., ter Hofstede, A.H.M.: Workflow exception patterns. In: Martinez, F.H., Pohl, K. (eds.) CAiSE 2006. LNCS, vol. 4001, pp. 288\u2013302. Springer, Heidelberg (2006)"},{"key":"10_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/3-540-47961-9_37","volume-title":"Advanced Information Systems Engineering","author":"WMP van der Aalst","year":"2002","unstructured":"van der Aalst, W.M.P., Hirnschall, A., Verbeek, H.M.W.E.: An alternative way to analyze workflow graphs. In: Pidduck, A.B., Mylopoulos, J., Woo, C.C., Ozsu, M.T. (eds.) CAiSE 2002. LNCS, vol. 2348, pp. 535\u2013552. Springer, Heidelberg (2002)"},{"key":"10_CR28","doi-asserted-by":"publisher","first-page":"2003","DOI":"10.1142\/S0218843003000814","volume":"12","author":"J Wainer","year":"2003","unstructured":"Wainer, J., Barthelmess, P., Kumar, A.: W-RBAC - a workflow security model incorporating controlled overriding of constraints. Int. J. Coop. Inf. Syst. 12, 2003 (2003)","journal-title":"Int. J. Coop. Inf. Syst."},{"issue":"4","key":"10_CR29","doi-asserted-by":"publisher","first-page":"40:1","DOI":"10.1145\/1880022.1880034","volume":"13","author":"Q Wang","year":"2010","unstructured":"Wang, Q., Li, N.: Satisfiability and resiliency in workflow authorization systems. ACM Trans. Inf. Syst. Secur. 13(4), 40:1\u201340:35 (2010)","journal-title":"ACM Trans. Inf. Syst. Secur."}],"container-title":["Lecture Notes in Computer Science","Software Engineering for Resilient Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23129-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T15:35:28Z","timestamp":1676475328000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-23129-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319231280","9783319231297"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23129-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"28 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}