2018
DOI: 10.1016/j.is.2017.08.002
|View full text |Cite
|
Sign up to set email alerts
|

Decentralized enforcement of document lifecycle constraints

Abstract: Artifact-centric workflows describe possible executions of a business process through constraints expressed from the point of view of the documents exchanged between principals. A sequence of manipulations is deemed valid as long as every document in the workflow follows its prescribed lifecycle at all steps of the process. So far, establishing that a given workflow complies with artifact lifecycles has mostly been done through static verification, or by assuming a centralized access to all artifacts where the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
2
1

Relationship

4
5

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 40 publications
0
8
0
Order By: Relevance
“…As far as we know, so far there have been proposed only a few distributed runtime enforcement algorithms (e.g. [9,46,48,53,81]).…”
Section: Related Workmentioning
confidence: 99%
“…As far as we know, so far there have been proposed only a few distributed runtime enforcement algorithms (e.g. [9,46,48,53,81]).…”
Section: Related Workmentioning
confidence: 99%
“…We note that fewer methods have been actually implemented for centralized enforcement, see TiPEX [18] or GREP [21] for instance. Although there are a few approaches [14,15] considering decentralized enforcement in decentralized systems, these are tailored to specific systems and our work is the first generic approach able to enforce any property expressed in linear-temporal logic.…”
Section: Related Workmentioning
confidence: 99%
“…Regarding applications for usage control, runtime enforcement was applied to enforce usage control policies in [73], enforcement of the usage of the Android library in [41], disabling Android advertisements in [36]. Regarding applications in the domain of security, runtime enforcement was applied to enforce the opacity of secrets in [46,55,109], access control policies in [76][77][78], confidentiality in [28,53], information-flow policies [28,49,64,64], security and authorization policies in [22,38], privacy policies in [28,56,65], control-flow integrity in [2,34,52,57,62], and memory safety in [24,25,35,100].…”
Section: Deploymentmentioning
confidence: 99%