{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:49:15Z","timestamp":1742950155021,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662558614"},{"type":"electronic","value":"9783662558621"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-662-55862-1_3","type":"book-chapter","created":{"date-parts":[[2017,9,19]],"date-time":"2017-09-19T10:03:23Z","timestamp":1505815403000},"page":"43-69","source":"Crossref","is-referenced-by-count":1,"title":["Log- and Model-Based Techniques for Security-Sensitive Tackling of Obstructed Workflow Executions"],"prefix":"10.1007","author":[{"given":"Julius","family":"Holderer","sequence":"first","affiliation":[]},{"given":"Josep","family":"Carmona","sequence":"additional","affiliation":[]},{"given":"Farbod","family":"Taymouri","sequence":"additional","affiliation":[]},{"given":"G\u00fcnter","family":"M\u00fcller","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,20]]},"reference":[{"key":"3_CR1","unstructured":"Accorsi, R.: Sicherheit im Prozessmanagement. digma Zeitschrift f\u00fcr Datenrecht und Informationssicherheit (2013)"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Basin, D.A., Burri, S.J., Karjoth, G.: Obstruction-free authorization enforcement: aligning security with business objectives. In: CSF, pp. 99\u2013113. IEEE Computer Society (2011)","DOI":"10.1109\/CSF.2011.14"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Basin, D.A., Burri, S.J., Karjoth, G.: Optimal workflow-aware authorizations. In: Atluri, V., Vaidya, J., Kern, A., Kantarcioglu, M. (eds.) SACMAT, pp. 93\u2013102. ACM (2012)","DOI":"10.1145\/2295136.2295154"},{"key":"3_CR4","unstructured":"Bishop, M.: Introduction to Computer Security. Addison-Wesley Professional, Reading (2004)"},{"issue":"3","key":"3_CR5","doi-asserted-by":"crossref","first-page":"666","DOI":"10.1147\/sj.403.0666","volume":"40","author":"R Botha","year":"2001","unstructured":"Botha, R., Eloff, J.: Separation of duties for access control enforcement in workflow environments. IBM Syst. J. 40(3), 666\u2013682 (2001)","journal-title":"IBM Syst. J."},{"key":"3_CR6","unstructured":"Burri, S.J.: Modeling and enforcing workflow authorizations. Ph.D. thesis, ETH, Z\u00fcrich (2012)"},{"key":"3_CR7","unstructured":"Carmona, J., Colom, J.M., Cortadella, J., Garc\u00eda-Vall\u00e9s, F.: Synthesis of asynchronous controllers using integer linear programming. IEEE Trans. CAD Integr. Circuits Syst. 25(9), 1637\u20131651 (2006)"},{"key":"3_CR8","unstructured":"Clark, N., Jolly, D.: Societe generale loses $7 billion in trading fraud (2008)"},{"issue":"1","key":"3_CR9","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/TIT.1967.1053964","volume":"13","author":"T Cover","year":"1967","unstructured":"Cover, T., Hart, P.: Nearest neighbor pattern classification. IEEE Trans. Inform. Theory 13(1), 21\u201327 (1967)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Crampton, J., Gutin, G.: Constraint expressions and workflow satisfiability. In: Conti, M., Vaidya, J., Schaad, A. (eds.) SACMAT, pp. 73\u201384. ACM (2013)","DOI":"10.1145\/2462410.2462419"},{"key":"3_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-22444-7_1","volume-title":"Security and Trust Management","author":"J Crampton","year":"2011","unstructured":"Crampton, J., Morisset, C.: An auto-delegation mechanism for access control systems. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. LNCS, vol. 6710, pp. 1\u201316. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-22444-7_1"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Desel, J., Esparza, J.: Reachability in cyclic extended free-choice systems. TCS 114, Elsevier Science Publishers B.V. (1993)","DOI":"10.1016\/0304-3975(93)90154-L"},{"issue":"12","key":"3_CR13","doi-asserted-by":"crossref","first-page":"1281","DOI":"10.1016\/j.infsof.2008.02.006","volume":"50","author":"RM Dijkman","year":"2008","unstructured":"Dijkman, R.M., Dumas, M., Ouyang, C.: Semantics and analysis of business process models in BPMN. Inf. Softw. Technol. 50(12), 1281\u20131294 (2008)","journal-title":"Inf. Softw. Technol."},{"key":"3_CR14","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1023\/A:1008743212620","volume":"16","author":"J Esparza","year":"2000","unstructured":"Esparza, J., Melzer, S.: Verification of safety properties using integer programming: beyond the state equation. Formal Methods Syst. Des. 16, 159\u2013189 (2000)","journal-title":"Formal Methods Syst. Des."},{"key":"3_CR15","unstructured":"Inc. Gurobi Optimization. Gurobi optimizer reference manual (2016)"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Holderer, J., Accorsi, R., M\u00fcller, G.: When four-eyes become too much: a survey on the interplay of authorization constraints and workflow resilience. In: Wainwright, R.L., Corchado, J.M., Bechini, A., Hong, J. (eds.) Proceedings of the 30th Annual ACM Symposium on Applied Computing, Salamanca, Spain, 13\u201317 April 2015, pp. 1245\u20131248. ACM (2015)","DOI":"10.1145\/2695664.2699497"},{"issue":"3","key":"3_CR17","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1137\/0202012","volume":"2","author":"JE Hopcroft","year":"1973","unstructured":"Hopcroft, J.E., Tarjan, R.E.: Dividing a graph into triconnected components. SIAM J. Comput. 2(3), 135\u2013158 (1973)","journal-title":"SIAM J. Comput."},{"issue":"3","key":"3_CR18","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/j.infsof.2013.12.004","volume":"56","author":"M Leitner","year":"2014","unstructured":"Leitner, M., Rinderle-Ma, S.: A systematic review on security in process-aware information systems - constitution, challenges, and future directions. Inform. Softw. Technol. 56(3), 273\u2013293 (2014)","journal-title":"Inform. Softw. Technol."},{"issue":"4","key":"3_CR19","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/5.24143","volume":"77","author":"T Murata","year":"1989","unstructured":"Murata, T.: Petri nets: properties, analysis and applications. Proc. IEEE 77(4), 541\u2013574 (1989)","journal-title":"Proc. IEEE"},{"key":"3_CR20","unstructured":"Accorsi, R., Holderer, J., Stocker, T., Zahoransky, R.M.: Security workflow analysis toolkit. In: Katzenbeisser, S., Lotz, V., Weippl, E.R. (eds.) Sicherheit 2014: Sicherheit, Schutz und Zuverl\u00e4ssigkeit, Beitr\u00e4ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f\u00fcr Informatik e.V. (GI), 19\u201321 M\u00e4rz 2014, Wien, \u00d6sterreich, vol. 228. LNI, pp. 433\u2013442. GI (2014)"},{"issue":"1","key":"3_CR21","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.is.2007.07.001","volume":"33","author":"A Rozinat","year":"2008","unstructured":"Rozinat, A., van der Aalst, W.M.P.: Conformance checking of processes based on monitoring real behavior. Inform. Syst. 33(1), 64\u201395 (2008)","journal-title":"Inform. Syst."},{"key":"3_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/3-540-65306-6_19","volume-title":"Lectures on Petri Nets I: Basic Models","author":"M Silva","year":"1998","unstructured":"Silva, M., Terue, E., Colom, J.M.: Linear algebraic and linear programming techniques for the analysis of place\/transition net systems. In: Reisig, W., Rozenberg, G. (eds.) ACPN 1996. LNCS, vol. 1491, pp. 309\u2013373. Springer, Heidelberg (1998). doi: 10.1007\/3-540-65306-6_19"},{"issue":"1","key":"3_CR23","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MSP.2016.6","volume":"14","author":"RL Trope","year":"2016","unstructured":"Trope, R.L., Ressler, E.K.: Mettle fatigue: Vw\u2019s single-point-of-failure ethics. IEEE Secur. Priv. 14(1), 12\u201330 (2016)","journal-title":"IEEE Secur. Priv."},{"issue":"1","key":"3_CR24","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1142\/S0218126698000043","volume":"8","author":"WMP Aalst van der","year":"1998","unstructured":"van der Aalst, W.M.P.: The application of Petri nets to workflow management. J. Circuits Syst. Comput. 8(1), 21\u201366 (1998)","journal-title":"J. Circuits Syst. Comput."},{"key":"3_CR25","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-19345-3","volume-title":"Process Mining - Discovery Conformance and Enhancement of Business Processes","author":"WMP Aalst van der","year":"2011","unstructured":"van der Aalst, W.M.P.: Process Mining - Discovery Conformance and Enhancement of Business Processes. Springer, Berlin (2011)"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Wang, Q., Li, N.: Satisfiability and resiliency in workflow authorization systems. ACM Trans. Inform. Syst. Secur. 13(4), 40:1\u201340:35 (2010)","DOI":"10.1145\/1880022.1880034"},{"key":"3_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-540-88313-5_21","volume-title":"Computer Security - ESORICS 2008","author":"Q Wang","year":"2008","unstructured":"Wang, Q., Li, N., Chen, H.: On the security of delegation in access control systems. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 317\u2013332. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-88313-5_21"},{"key":"3_CR28","unstructured":"Wolter, C., Menzel, M., Meinel, C.: Modelling security goals in business processes. In: K\u00fchne, T., Reisig, W., Steimann, F. (eds.) Modellierung 2008, 12\u201314 M\u00e4rz 2008, Berlin, vol. 127. LNI, pp. 197\u2013212. GI (2008)"}],"container-title":["Lecture Notes in Computer Science","Transactions on Petri Nets and Other Models of Concurrency XII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-55862-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T00:43:02Z","timestamp":1659487382000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-55862-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783662558614","9783662558621"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-55862-1_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}