{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T05:51:35Z","timestamp":1718171495779},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T00:00:00Z","timestamp":1496275200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s11704-016-6016-2","type":"journal-article","created":{"date-parts":[[2016,11,18]],"date-time":"2016-11-18T22:32:01Z","timestamp":1479508321000},"page":"528-540","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["On the satisfiability of authorization requirements in business process"],"prefix":"10.1007","volume":"11","author":[{"given":"Yang","family":"Bo","sequence":"first","affiliation":[]},{"given":"Chunhe","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Zhigang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xinzheng","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,21]]},"reference":[{"issue":"2","key":"6016_CR1","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1007\/s10796-014-9529-y","volume":"18","author":"J Becker","year":"2016","unstructured":"Becker J, Delfmann P, Dietrich H-A, Steinhorst M, Eggert M. Business process compliance checking \u2014applying and evaluating a generic pattern matching approach for conceptual models in the financial sector. Information Systems Frontiers, 2016, 18(2): 359\u2013405","journal-title":"Information Systems Frontiers"},{"key":"6016_CR2","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1007\/978-3-642-25109-2_7","volume":"7044","author":"L T Ly","year":"2011","unstructured":"Ly L T, Rinderle-Ma S, Knuplesch D, Dadam P. Monitoring business process compliance using compliance rule graphs. Lecture Notes in Computer Science, 2011, 7044: 82\u201399","journal-title":"Lecture Notes in Computer Science"},{"issue":"1","key":"6016_CR3","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.datak.2007.06.007","volume":"64","author":"L T Ly","year":"2008","unstructured":"Ly L T, Rinderle S, Dadam P. Integration and verification of semantic constraints in adaptive process management systems. Data & Knowledge Engineering, 2008, 64(1): 3\u201323","journal-title":"Data & Knowledge Engineering"},{"issue":"3","key":"6016_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1379759.1379760","volume":"55","author":"N H Li","year":"2008","unstructured":"Li N H, Wang Q H. Beyond separation of duty: an algebra for specifying high-level security policies. Journal of the ACM, 2008, 55(3): 1\u201346","journal-title":"Journal of the ACM"},{"key":"6016_CR5","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1007\/978-3-540-75183-0_5","volume-title":"Proceedings of International Conference on Business Process Management","author":"C Wolter","year":"2007","unstructured":"Wolter C, Schaad A. Modeling of task-based authorization constraints in BPMN. In: Proceedings of International Conference on Business Process Management. 2007, 64\u201379"},{"issue":"1","key":"6016_CR6","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/300830.300837","volume":"2","author":"E Bertino","year":"1999","unstructured":"Bertino E, Ferrari E, Atluri V. An authorization model for supporting the specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information System Security, 1999, 2(1): 65\u2013104","journal-title":"ACM Transactions on Information System Security"},{"key":"6016_CR7","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/2752952.2752961","volume-title":"Proceedings of the 20th ACM Symposium on Access Control Models and Technologies","author":"J Crampton","year":"2015","unstructured":"Crampton J, Gutin G, Karapetyan. D. Valued workflow satisfiability problem. In: Proceedings of the 20th ACM Symposium on Access Control Models and Technologies. 2015, 3\u201313"},{"key":"6016_CR8","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1007\/978-3-319-19647-3_13","volume-title":"Proceedings of the 9th International Workshop on Frontiers in Algorithmics","author":"D Karapetyan","year":"2015","unstructured":"Karapetyan D, Gagarin A, Gutin G. Pattern backtracking algorithm for the workflow satisfiability problem with user-independent constraints. In: Proceedings of the 9th International Workshop on Frontiers in Algorithmics. 2015, 138\u2013149"},{"key":"6016_CR9","first-page":"1","volume-title":"Proceedings of Symposium and Bootcamp on the Science of Security","author":"J C Mace","year":"2015","unstructured":"Mace J C, Morisset C, Van Moorsel A. Modelling user availability in workflow resiliency analysis. In: Proceedings of Symposium and Bootcamp on the Science of Security. 2015, 1\u201310"},{"key":"6016_CR10","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1613\/jair.4435","volume":"51","author":"D Cohen","year":"2014","unstructured":"Cohen D, Crampton J, Gagarin A, Gutin G, Jones M. Iterative plan construction for the workflow satisfiability problem. Journal of Artificial Intelligence Research, 2014, 51: 555\u2013577","journal-title":"Journal of Artificial Intelligence Research"},{"issue":"1","key":"6016_CR11","first-page":"1518","volume":"16","author":"J Crampton","year":"2012","unstructured":"Crampton J, Gutin G, Yeo A. On the parameterized complexity and kernelization of the workflow satisfiability problem. ACM Transactions on Information and System Security, 2012, 16(1): 1518\u20131527","journal-title":"ACM Transactions on Information and System Security"},{"key":"6016_CR12","first-page":"1","volume-title":"Journal of Combinatorial Optimization","author":"D Cohen","year":"2015","unstructured":"Cohen D, Crampton J, Gagarin A, Gutin G, Jones M. Algorithms for the workflow satisfiability problem engineered for counting constraints. Journal of Combinatorial Optimization, 2015: 1\u201322"},{"issue":"11","key":"6016_CR13","first-page":"2298","volume":"43","author":"Z N Zhai","year":"2015","unstructured":"Zhai Z N, Wang G, Zheng Z J. Verification of (\u2260, =) constrained workflow robustness based on satisfiability counting. Chinese Journal of Electronics, 2015, 43(11): 2298\u20132304","journal-title":"Chinese Journal of Electronics"},{"key":"6016_CR14","first-page":"171","volume-title":"Proceedings of the 9th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","author":"Y Bo","year":"2014","unstructured":"Bo Y, Xia C H, Luo Y, Tang Q. Static compliance checking beyond separation of duty constraints. In: Proceedings of the 9th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC). 2014, 171\u2013178."},{"issue":"4","key":"6016_CR15","first-page":"747","volume":"13","author":"Q H Wang","year":"2010","unstructured":"Wang Q H, Li N H. Satisfiability and resiliency in workflow authorization systems. ACM Transactions on Information and System Security, 2010, 13(4): 747\u2013759","journal-title":"ACM Transactions on Information and System Security"},{"key":"6016_CR16","first-page":"709","volume-title":"Proceedings of International Conference on Availability, Reliability and Security","author":"M Kohler","year":"2008","unstructured":"Kohler M, Schaad A. Avoiding policy-based deadlocks in business processes. In: Proceedings of International Conference on Availability, Reliability and Security. 2008, 709\u2013716"},{"key":"6016_CR17","volume-title":"Lecture Notes in Computer Science","author":"M Strembeck","year":"2010","unstructured":"Strembeck M, Mendling J. Generic algorithms for consistency checking of mutual-exclusion and binding constraints in a business process context. Lecture Notes in Computer Science, 2010: 204\u2013221"},{"key":"6016_CR18","first-page":"155","volume-title":"Proceedings of the 17th IEEE Computer Security Foundations Workshop","author":"K Tan","year":"2004","unstructured":"Tan K, Crampton J, Gunter C A. The consistency of task-based authorization constraints in workflow systems. In: Proceedings of the 17th IEEE Computer Security Foundations Workshop. 2004, 155\u2013169"},{"issue":"2","key":"6016_CR19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cose.2013.10.002","volume":"40","author":"A Armando","year":"2014","unstructured":"Armando A, Ponta S E. Model checking authorization requirements in business processes. Computers and Security, 2014, 40(2): 1\u201322","journal-title":"Computers and Security"},{"issue":"2","key":"6016_CR20","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1007\/s10796-009-9179-7","volume":"14","author":"J Hoffmann","year":"2012","unstructured":"Hoffmann J, Weber I, Governatori G. On compliance checking for clausal constraints in annotated process models. Information Systems Frontiers, 2012, 14(2): 155\u2013177","journal-title":"Information Systems Frontiers"},{"key":"6016_CR21","first-page":"250","volume-title":"Proceedings of the 14th European Symposium on Research in Computer Security","author":"D Basin","year":"2009","unstructured":"Basin D, Burri S J, Karjoth G. Dynamic enforcement of abstract separation of duty constraints. In: Proceedings of the 14th European Symposium on Research in Computer Security. 2009, 250\u2013267"},{"key":"6016_CR22","first-page":"289","volume-title":"Proceedings of the 16th International Conference on Computational Science and Engineering","author":"M Barletta","year":"2009","unstructured":"Barletta M, Ranise S, Vigano L. Verifying the interplay of authorization policies and workflow in service-oriented architectures. In: Proceedings of the 16th International Conference on Computational Science and Engineering. 2009, 289\u2013296"},{"key":"6016_CR23","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1007\/978-3-642-12459-4_6","volume":"5983","author":"A Armando","year":"2009","unstructured":"Armando A, Ponta S E. Model checking of security-sensitive business processes. Lecture Notes in Computer Science, 2009, 5983: 66\u201380","journal-title":"Lecture Notes in Computer Science"},{"issue":"4","key":"6016_CR24","doi-asserted-by":"crossref","first-page":"745","DOI":"10.1093\/ietisy\/e90-d.4.745","volume":"90","author":"A Rodr\u00edguez","year":"2007","unstructured":"Rodr\u00edguez A, Fern\u00e1ndez-Medina E, Piattini M. A BPMN extension for the modeling of security requirements in business processes. IEICE Transactions on Information and Systems, 2007, 90(4): 745\u2013752","journal-title":"IEICE Transactions on Information and Systems"},{"key":"6016_CR25","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1007\/978-3-319-08016-1_5","volume":"8497","author":"D Cohen","year":"2014","unstructured":"Cohen D, Crampton J, Gagarin A, Gutin G, Jones M. Engineering algorithms for workflow satisfiability problem with user-independent constraints. Lecture Notes in Computer Science, 2014, 8497: 48\u201359","journal-title":"Lecture Notes in Computer Science"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11704-016-6016-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-016-6016-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-016-6016-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T15:33:04Z","timestamp":1568561584000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11704-016-6016-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["6016"],"URL":"https:\/\/doi.org\/10.1007\/s11704-016-6016-2","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,6]]}}}