{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:07:22Z","timestamp":1750306042715,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,7]],"date-time":"2017-06-07T00:00:00Z","timestamp":1496793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Royal Society Wolfson Research Merit Award"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,7]]},"DOI":"10.1145\/3078861.3078866","type":"proceedings-article","created":{"date-parts":[[2017,5,31]],"date-time":"2017-05-31T19:31:40Z","timestamp":1496259100000},"page":"207-217","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["On the Satisfiability of Workflows with Release Points"],"prefix":"10.1145","author":[{"given":"Jason","family":"Crampton","sequence":"first","affiliation":[{"name":"Royal Holloway, University of London, Egham, United Kingdom"}]},{"given":"Gregory","family":"Gutin","sequence":"additional","affiliation":[{"name":"Royal Holloway, University of London, Egham, United Kingdom"}]},{"given":"R\u00e9mi","family":"Watrigant","sequence":"additional","affiliation":[{"name":"Inria Sophia Antipolis, Sophia Antipolis, France"}]}],"member":"320","published-online":{"date-parts":[[2017,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"ANSI INCITS 359--2004 for Role Based Access Control","author":"American National Standards Institute.","year":"2004","unstructured":"American National Standards Institute. ANSI INCITS 359--2004 for Role Based Access Control , 2004 . American National Standards Institute. ANSI INCITS 359--2004 for Role Based Access Control, 2004."},{"key":"e_1_3_2_1_2_1","volume-title":"Digraphs - theory, algorithms and applications","author":"Bang-Jensen J.","year":"2002","unstructured":"Bang-Jensen , J. , and Gutin , G . Digraphs - theory, algorithms and applications . Springer , 2002 . Bang-Jensen, J., and Gutin, G. Digraphs - theory, algorithms and applications. Springer, 2002."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-140500"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/300830.300837"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714633"},{"key":"e_1_3_2_1_6_1","volume-title":"Iterative plan construction for the workflow satisfiability problem. J. Artif. Intell. Res. (JAIR) 51","author":"Cohen D.","year":"2014","unstructured":"Cohen , D. , Crampton , J. , Gagarin , A. , Gutin , G. , and Jones , M . Iterative plan construction for the workflow satisfiability problem. J. Artif. Intell. Res. (JAIR) 51 ( 2014 ), 555--577. Cohen, D., Crampton, J., Gagarin, A., Gutin, G., and Jones, M. Iterative plan construction for the workflow satisfiability problem. J. Artif. Intell. Res. (JAIR) 51 (2014), 555--577."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10878-015-9877-7"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1063986"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2988239"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462410.2462419"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487222.2487226"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2815661"},{"key":"e_1_3_2_1_13_1","series-title":"Graduate texts in mathematics","volume-title":"Graph Theory","author":"Diestel R.","year":"2012","unstructured":"Diestel , R. Graph Theory , 4 th Edition, vol. 173 of Graduate texts in mathematics . Springer , 2012 . Diestel, R. Graph Theory, 4th Edition, vol. 173 of Graduate texts in mathematics. Springer, 2012.","edition":"4"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2568438"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2015.11.008"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.2000.1727"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/0196-6774(83)90042-1"},{"key":"e_1_3_2_1_18_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1007\/978-3-319-19647-3_13","volume-title":"Frontiers in Algorithmics - 9th International Workshop, FAW","author":"Karapetyan D.","year":"2015","unstructured":"Karapetyan , D. , Gagarin , A. V. , and Gutin , G . Pattern backtracking algorithm for the workflow satisfiability problem with user-independent constraints . In Frontiers in Algorithmics - 9th International Workshop, FAW 2015 , Guilin, China, July 3-5, 2015, Proceedings (2015), J. Wang and C. Yap, Eds., vol. 9130 of Lecture Notes in Computer Science , Springer , pp. 138 -- 149 . Karapetyan, D., Gagarin, A. V., and Gutin, G. Pattern backtracking algorithm for the workflow satisfiability problem with user-independent constraints. In Frontiers in Algorithmics - 9th International Workshop, FAW 2015, Guilin, China, July 3-5, 2015, Proceedings (2015), J. Wang and C. Yap, Eds., vol. 9130 of Lecture Notes in Computer Science, Springer, pp. 138--149."},{"key":"e_1_3_2_1_19_1","volume-title":"Pattern-based approach to the workflow satisfiability problem with user-independent constraints. CoRR abs\/1604.05636","author":"Karapetyan D.","year":"2016","unstructured":"Karapetyan , D. , Parkes , A. J. , Gutin , G. , and Gagarin , A . Pattern-based approach to the workflow satisfiability problem with user-independent constraints. CoRR abs\/1604.05636 ( 2016 ). Karapetyan, D., Parkes, A. J., Gutin, G., and Gagarin, A. Pattern-based approach to the workflow satisfiability problem with user-independent constraints. CoRR abs\/1604.05636 (2016)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(74)90001-5"},{"key":"e_1_3_2_1_21_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1007\/978-3-319-11203-9_20","volume-title":"Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security","author":"Mace J. C.","year":"2014","unstructured":"Mace , J. C. , Morisset , C. , and van Moorsel , A. P. A. Quantitative workflow resiliency . In Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security , Wroclaw, Poland, September 7-11, 2014 . Proceedings, Part I (2014), M. Kutylowski and J. Vaidya, Eds., vol. 8712 of Lecture Notes in Computer Science , Springer , pp. 344 -- 361 . Mace, J. C., Morisset, C., and van Moorsel, A. P. A. Quantitative workflow resiliency. In Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I (2014), M. Kutylowski and J. Vaidya, Eds., vol. 8712 of Lecture Notes in Computer Science, Springer, pp. 344--361."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539791202647"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022883727209"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/24.1.83"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1880022.1880034"},{"key":"e_1_3_2_1_26_1","volume-title":"Future Strategies Incorporated","author":"White S.","year":"2008","unstructured":"White , S. , and Miers , D . BPMN Modeling and Reference Guide: Understanding and Using BPMN . Future Strategies Incorporated , 2008 . White, S., and Miers, D. BPMN Modeling and Reference Guide: Understanding and Using BPMN. Future Strategies Incorporated, 2008."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2013.31"}],"event":{"name":"SACMAT'17: The 22nd ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Indianapolis Indiana USA","acronym":"SACMAT'17"},"container-title":["Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078861.3078866","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3078861.3078866","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:09Z","timestamp":1750215789000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078861.3078866"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,7]]},"references-count":27,"alternative-id":["10.1145\/3078861.3078866","10.1145\/3078861"],"URL":"https:\/\/doi.org\/10.1145\/3078861.3078866","relation":{},"subject":[],"published":{"date-parts":[[2017,6,7]]},"assertion":[{"value":"2017-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}