On the Workflow Satisfiability Problem with Class-Independent Constraints for Hierarchical Organizations. / Crampton, Jason; Gagarin, Andrei; Gutin, Gregory; Jones, Mark; Wahlstrom, Magnus.

In: ACM Transactions on Privacy and Security, Vol. 19, No. 3, 12.12.2016, p. 1-29.

Research output: Contribution to journalArticle

Published

Documents

Links

Abstract

A workflow specification defines a set of steps, a set of users, and an access control policy. The policy determines which steps a user is authorized to perform and imposes constraints on which sets of users can perform which sets of steps. The workflow satisfiability problem (WSP) is the problem of determining whether there exists an assignment of users to workflow steps that satisfies the policy. Given the computational hardness of WSP and its importance in the context of workflow management systems, it is important to develop algorithms that are as efficient as possible to solve WSP.

In this article, we study the fixed-parameter tractability of WSP in the presence of class-independent constraints, which enable us to (1) model security requirements based on the groups to which users belong and (2) generalize the notion of a user-independent constraint. Class-independent constraints are defined in terms of equivalence relations over the set of users. We consider sets of nested equivalence relations because this enables us to model security requirements in hierarchical organizations. We prove that WSP is fixed-parameter tractable (FPT) for class-independent constraints defined over nested equivalence relations and develop an FPT algorithm to solve WSP instances incorporating such constraints. We perform experiments to evaluate the performance of our algorithm and compare it with that of SAT4J, an off-the-shelf pseudo-Boolean SAT solver. The results of these experiments demonstrate that our algorithm significantly outperforms SAT4J for many instances of WSP.
Original languageEnglish
Pages (from-to)1-29
Number of pages29
JournalACM Transactions on Privacy and Security
Volume19
Issue number3
DOIs
Publication statusPublished - 12 Dec 2016
This open access research output is licenced under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.

ID: 26852244