Browse by author
Lookup NU author(s): Dr John Mace,
Dr Charles Morisset,
Professor Aad van Moorsel
Full text for this publication is not currently held within this repository. Alternative links are provided below where available.
Copyright 2015 ACM. Workflows capture complex operational processes and include security constraints limiting which users can perform which tasks. An improper security policy may prevent certain tasks being assigned and may force a policy violation. Deciding whether a valid user-task assignment exists for a given policy is known to be extremely complex, especially when considering user unavailability (known as the resiliency problem). Therefore tools are required that allow automatic evaluation of workflow resiliency. Modelling well defined workflows is fairly straightforward, however user availability can be modelled in multiple ways for the same workflow. Correct choice of model is a complex yet necessary concern as it has a major impact on the calculated resiliency. We describe a number of user availability models and their encoding in the model checker PRISM, used to evaluate resiliency. We also show how model choice can affect resiliency computation in terms of its value, memory and CPU time.
Author(s): Mace JC, Morisset C, Van Moorsel A
Publication type: Conference Proceedings (inc. Abstract)
Publication status: Published
Conference Name: Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS '15
Year of Conference: 2015
Acceptance date: 01/01/1900
Publisher: Association for Computing Machinery
Library holdings: Search Newcastle University Library for this item
Series Title: ACM International Conference Proceeding Series