Security-Aware Collaboration Plan Recommendation for Dynamic Multiple Workflow Processes

被引:6
作者
Du, Yanhua [1 ]
Sun, Zijian [1 ]
Hu, Hesuan [2 ]
机构
[1] Univ Sci & Technol Beijing, Sch Mech Engn, Beijing 100083, Peoples R China
[2] Xidian Univ, Sch Electromech Engn, Xian 710071, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Security; Collaboration; Costs; Business; Safety; Petri nets; Computational modeling; Dynamic relation; collaboration plan; sprouting graph; security requirement; SPECIFICATION LANGUAGE; CONFORMANCE CHECKING; SERVICE SELECTION; REQUIREMENTS; VERIFICATION; ENVIRONMENTS; ARCHITECTURE; CONSTRAINTS; PATTERNS; DESIGN;
D O I
10.1109/TDSC.2021.3127630
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, recommending collaboration plans of dynamic multiple workflow processes under security requirements or constraints has become a hot topic, as it not only can reduce the risk during execution, but also can avoid enormous financial loss caused by security breaches. However, the existing methods cannot solve the parametric problem caused by dynamic relations of multiple workflow processes or recommend an optimal collaboration plan because of erroneous information. In this article, we propose a new approach to recommend security-aware collaboration plans for multiple workflow processes with dynamic relations. First, we develop three basic computing patterns of dynamic relations and construct a parametric sprouting graph for multiple workflow processes with dynamic relations. Second, we present the procedure of recommending an optimal secure collaboration plan that satisfy security requirements. By comparison with the existing methods via two experiments, our approach not only can solve the parametric problem caused by dynamic relations of multiple workflow processes, but also can recommend an optimal secure collaboration plan under security requirements.
引用
收藏
页码:100 / 113
页数:14
相关论文
共 59 条
[1]   Adaptable Cross-organizational Unstructured Business Processes via Dynamic Rule-based Semantic Network [J].
Alirezaei, Ehsan ;
Parsa, Saeed .
INFORMATION SYSTEMS FRONTIERS, 2020, 22 (03) :771-787
[2]   Conformance checking and diagnosis for declarative business process models in data-aware scenarios [J].
Borrego, Diana ;
Barba, Irene .
EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (11) :5340-5352
[3]   Conformance checking based on multi-perspective declarative process models [J].
Burattin, Andrea ;
Maggi, Fabrizio M. ;
Sperduti, Alessandro .
EXPERT SYSTEMS WITH APPLICATIONS, 2016, 65 :194-211
[4]   Semiautomated Verification of Access Control Implementation in Industrial Networked Systems [J].
Cheminod, Manuel ;
Durante, Luca ;
Seno, Lucia ;
Valenzano, Adriano .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2015, 11 (06) :1388-1399
[5]   An Access Control Model for Online Social Networks Using User-to-User Relationships [J].
Cheng, Yuan ;
Park, Jaehong ;
Sandhu, Ravi .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (04) :424-436
[6]   Quasi-Inconsistency in Declarative Process Models [J].
Corea, Carl ;
Delfmann, Patrick .
BUSINESS PROCESS MANAGEMENT FORUM, BPM FORUM 2019, 2019, 360 :20-35
[7]   Declarative Process Modeling in BPMN [J].
De Giacomo, Giuseppe ;
Dumas, Marlon ;
Maggi, Fabrizio Maria ;
Montali, Marco .
ADVANCED INFORMATION SYSTEMS ENGINEERING, CAISE 2015, 2015, 9097 :84-100
[8]   Privacy-Preserving Data Processing with Flexible Access Control [J].
Ding, Wenxiu ;
Yan, Zheng ;
Deng, Robert H. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (02) :363-376
[9]   Analyzing Security Requirements in Timed Workflow Processes [J].
Du, Yanhua ;
Wang, Yang ;
Yang, Benyuan ;
Hu, Hesuan .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) :190-207
[10]   Self-Adaptive Execution of Data-Aware Workflow Processes [J].
Du, Yanhua ;
Li, Na ;
Hu, Hesuan .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (12) :7295-7305