Toggle Main Menu Toggle Search

Open Access padlockePrints

Modelling user availability in workflow resiliency analysis

Lookup NU author(s): Dr John Mace, Dr Charles Morisset, Professor Aad van Moorsel


Full text for this publication is not currently held within this repository. Alternative links are provided below where available.


Copyright 2015 ACM. Workflows capture complex operational processes and include security constraints limiting which users can perform which tasks. An improper security policy may prevent certain tasks being assigned and may force a policy violation. Deciding whether a valid user-task assignment exists for a given policy is known to be extremely complex, especially when considering user unavailability (known as the resiliency problem). Therefore tools are required that allow automatic evaluation of workflow resiliency. Modelling well defined workflows is fairly straightforward, however user availability can be modelled in multiple ways for the same workflow. Correct choice of model is a complex yet necessary concern as it has a major impact on the calculated resiliency. We describe a number of user availability models and their encoding in the model checker PRISM, used to evaluate resiliency. We also show how model choice can affect resiliency computation in terms of its value, memory and CPU time.

Publication metadata

Author(s): Mace JC, Morisset C, Van Moorsel A

Publication type: Conference Proceedings (inc. Abstract)

Publication status: Published

Conference Name: Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS '15

Year of Conference: 2015

Acceptance date: 01/01/1900

Publisher: Association for Computing Machinery


DOI: 10.1145/2746194.2746201

Library holdings: Search Newcastle University Library for this item

Series Title: ACM International Conference Proceeding Series

ISBN: 9781450333764