Run-time monitors are crucial to the development of workflow management systems, which are at the heart of several modern E-services. In this paper, we propose a new methodology to build run-time monitors capable of ensuring the successful termination of workflows subject to authorization constraints. The methodology is based on state-of-the-art Satisfiability Modulo Theories techniques. © 2013 Infonomics Society.
A methodology to build run-time monitors for security-aware workflows / Bertolissi, C.; Ranise, S.. - (2013), pp. 501-502. (Intervento presentato al convegno 2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013 tenutosi a Yangzhou, Jiangsu, chn nel 2013) [10.1109/ICITST.2013.6750251].
A methodology to build run-time monitors for security-aware workflows
Ranise S.
2013-01-01
Abstract
Run-time monitors are crucial to the development of workflow management systems, which are at the heart of several modern E-services. In this paper, we propose a new methodology to build run-time monitors capable of ensuring the successful termination of workflows subject to authorization constraints. The methodology is based on state-of-the-art Satisfiability Modulo Theories techniques. © 2013 Infonomics Society.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione