Modelling user availability in workflow resiliency analysis

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Workflows capture complex operational processes and include security constraints limiting which users can perform which tasks. An improper security policy may prevent certain tasks being assigned and may force a policy violation. Deciding whether a valid user-task assignment exists for a given policy is known to be extremely complex, especially when considering user unavailability (known as the resiliency problem). Therefore tools are required that allow automatic evaluation of workflow resiliency. Modelling well defined workflows is fairly straightforward, however user availability can be modelled in multiple ways for the same workflow. Correct choice of model is a complex yet necessary concern as it has a major impact on the calculated resiliency. We describe a number of user availability models and their encoding in the model checker PRISM, used to evaluate resiliency. We also show how model choice can affect resiliency computation in terms of its value, memory and CPU time.

Original languageEnglish
Title of host publicationProceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015
PublisherAssociation for Computing Machinery
ISBN (Electronic)9781450333764
DOIs
Publication statusPublished - 21 Apr 2015
EventSymposium and Bootcamp on the Science of Security, HotSoS 2015 - Urbana, United States
Duration: 21 Apr 201522 Apr 2015

Publication series

NameACM International Conference Proceeding Series
Volume21-22-April-2015

Conference

ConferenceSymposium and Bootcamp on the Science of Security, HotSoS 2015
Country/TerritoryUnited States
CityUrbana
Period21/04/1522/04/15

Bibliographical note

Publisher Copyright:
Copyright 2015 ACM.

Keywords

  • Markov Decision Process
  • Probabilistic model checker
  • Workflow satisfiability problem

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Modelling user availability in workflow resiliency analysis'. Together they form a unique fingerprint.

Cite this