<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Temporal and Resource Controllability of Work ows Under Uncertainty</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Matteo Zavatteri</string-name>
          <email>matteo.zavatteri@univr.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Science, University of Verona</institution>
          ,
          <addr-line>Strada le Grazie 15, 37134 Verona</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Work ow technology has emerged as one of the leading technologies for modeling,
(re)designing and executing business processes in several di erent application
domains such as industrial R&amp;D, manufacturing, energy distribution, banking
processes, critical infrastructures and healthcare. A work ow is the automation
of a business process, in whole or part, during which documents, information or
tasks are passed from one participant to another for action, according to a set of
procedural rules. The conceptual modeling of work ows underlying business
processes has been receiving increasing attention over the last years and many
technical aspects have been discussed, including exibility, structured vs.
unstructured modeling, change management, authorization models, temporal features,
resource allocation, failure resistance and constraints (see, e.g., [
        <xref ref-type="bibr" rid="ref14 ref15 ref18 ref19 ref21">14,15,18,19,21</xref>
        ]).
      </p>
      <p>
        Recently, attention was devoted in particular to the issue of expressing
temporal features of work ows, such as task-duration constraints, temporal constraints
between non-consecutive tasks, delays, deadlines and so on [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Properties of
such temporal work ow models have been de ned and analyzed. One of the most
interesting is that of dynamic controllability, ensuring that a work ow can be
executed satisfying all the given temporal constraints without the work ow
management system restricting and/or controlling task durations but only assuming
that each duration is within a speci ed range (temporal uncertainty ) [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>
        The authors of [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] also tackled dynamic controllability under another kind
of uncertainty, conditional uncertainty, represented by the fact that some
subsets of tasks have to be executed if and only if some conditions (abstracted as
Boolean propositions) are true. Similarly to what happens for uncontrollable
task durations, the truth-value assignment to such propositions is out of
control. For instance, when a patient enters the emergency room, the severity of
his condition is not known a priori but it is established by a physician, while
the work ow is being executed. Since such a condition discriminates which tasks
have, or have not, to be executed (i.e., the choice of the work ow path), the
work ow management system must be able to get to the end of the work ow
satisfying all relevant temporal constraints regardless of which tasks have to be
executed and which task durations have to be satis ed. In [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], the authors did
not consider work ow instances specifying both controllable and uncontrollable
work ow paths such that the choice of a controllable work ow path may exclude
the choice of an uncontrollable one and vice versa. That is, they did not address
fallback temporal plans, i.e., plans in which making a decision may exclude some
uncontrollable part whose behavior risks violating some constraint.
      </p>
      <p>Work ows also deal with the management of associated resources in order
to complete business processes. In this thesis I considered, from a security point
of view, the most trivial of resources: users. When we talk about security in the
business process context, we must also talk about access control models, security
policies and authorization constraints.</p>
      <p>
        Therefore, an access-controlled work ow extends a classical work ow by adding
users and authorization constraints. Users are authorized for tasks whereas
authorization constraints say which users remain authorized for which tasks
depending on who did what. Role-based access control models (RBAC, [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]) put
another layer of security on top of access controlled work ows injecting the
concept of role, which acts as an interface between users and tasks saying, intuitively,
\who can do what". For example, in a nancial context, a clerk is authorized to
process a loan request, but he is not authorized to sign the contract at the end of
the process as only managers can do so. RBAC models can specify several kinds
of constraints involving roles (e.g., mutual exclusivity, hierarchy, etc.), but they
all fail to model constraints at user level such as, for example, the well-known
separation of duties (SoD ) and binding of duties (BoD ) [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. A SoD (resp., BoD)
says that the users executing a set of tasks must be di erent (resp., equal).
      </p>
      <p>
        Some proposals attempted at extending RBAC models to address such
constraints, e.g., [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], leading to a natural question: Does there exist an assignment
of tasks to users satisfying all constraints?, or more formally, Is the work ow
satis able? If so, then it means that at least a static plan, precomputed before
starting, to execute the work ow exists. Otherwise, either we decide not to
execute the work ow or we accept that any possible execution will violate at least
one constraint (and then we could look for a \least bad" plan [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] maximizing the
number of satis ed constraints). Thus, the work ow satis ability problem (WSP,
[
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]) is a constraint satisfaction problem (CSP ) where variables model tasks and
domains model authorized users. Although some techniques have been provided
to solve the WSP e ciently (e.g., [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]), consistency of a CSP is NP-complete.
      </p>
      <p>When an access controlled work ow does not specify any uncontrollable part
work ow satis ability is enough to synthesize a valid plan. Instead, when some
part is out of control (e.g., the choice of the work ow path or the absence of
users), we need, as for temporal work ows discussed above, a controllability
approach to decide in real time which users to commit to which tasks. For
example, consider an access controlled work ow under conditional uncertainty.
In this work ow, the choices of the work ow paths to take are out of control
(or by abusing language we say that these work ow paths are uncontrollable).
Di erently from the WSP, the assignment of a user to a task might not be
precomputed before starting as the work ow may in general specify di erent
authorization constraints for di erent work ow paths involving the same users
for some common tasks which must be considered in any execution. In that
case, we must make this assignment while executing, typically after having full
information on which work ow path we will go through (online planning).</p>
      <p>
        Another controllability problem in the context of work ows with resources
is the work ow resiliency problem (WRP), i.e., a dynamic WSP coping with the
absence of users. If a work ow is resilient, it is of course satis able, but the
vice versa does not hold. A few years ago, Wang and Li de ned three levels of
resiliency: static (level 1), decremental (level 2) and dynamic (level 3) [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. In
static resiliency, up to k users might be absent before the execution starts and
never become available for that execution. In decremental resiliency, up to k
users might be absent before or during execution and, again, they never become
available for that execution. In dynamic resiliency, up to k (possibly di erent)
users might be absent before executing any task and they may in general turn
absent and available continuously, before or during the execution. Much work
has been carried out to tackle static resiliency, little for decremental and, to the
best of my knowledge, nothing for dynamic.
      </p>
      <p>Finally, we can of course consider variants of the previously discussed aspects.
For instance, a work ow employing users and temporal constraints may specify
a temporal separation (or binding) of duties. A temporal SoD says that a user is
allowed to carry out two tasks provided a further temporal constraint is satis ed.
For example, a surgeon, who has just carried out a 4-hour intervention, is allowed
to do another one only after resting from 2 to 4 hours. Likewise, an aircraft
pilot must rest for at least 10 hours after a transatlantic ight. These temporal
constraints must be considered in conjunction with access control as there is a
mutual in uence. However, when everything is under control, these constraints
boil down to normal disjunctions for which a satis ability approach is enough.
The interesting part is when some part is, again, out of control. Consider again
a transatlantic ight taking o from Europe and suppose that once the aircraft
lands in America, it will take o again 12 hours after the expected landing
time (so potentially the same pilot is ne for the return ight). However, the
exact duration of the outbound ight is uncontrollable. Suppose that it takes
normally 10 hours. Once boarding is complete, the take o could be delayed for
extreme weather conditions and related safety procedures such as, for example,
deicing. Deicing is the process of removing snow and ice from the plane surfaces
(especially wings) by \power washing" the aircraft with chemicals which also
remain on the surfaces in order to prevent the reformation of the ice. If deicing
process takes 3 hours (as each plane queues for its turn), the ight will land after
13 hours since boarding. As a result, the next take o will be scheduled after 9
(and no longer 12) hours, so the same pilot is not going to be ne.</p>
      <p>To the best of my knowledge security policies involving temporal, conditional
and resource uncertainty still need to be explored in depth.</p>
      <p>When facing uncontrollable parts we can in general act in three main ways:
1. We assume that we know in advance how the uncontrollable part will
behave and make sure that a (possibly di erent) strategy to operate on the
controllable part exists.
2. We assume that we have a xed strategy operating on the controllable part
always the same way no matter how the uncontrollable one will behave.
3. We assume that we have a strategy operating (possibly di erently) on the
same controllable part making decisions in real time depending on how the
uncontrollable part is behaving (online planning).</p>
      <p>These are the intuitions behind the three main kinds of controllability: weak (for
presumptuous), strong (for anxious) and dynamic (for grandmasters).
2</p>
    </sec>
    <sec id="sec-2">
      <title>Contributions and Scienti c Publications</title>
      <p>
        Towards these unexplored directions, my contributions fall in the areas of
constraint satisfaction, uncertainty in AI, planning and scheduling, algorithms,
business process management and security and are the following.
1. I address temporal controllability of work ows specifying controllable and
uncontrollable work ow paths and uncontrollable task durations. This part
relies on temporal constraint networks. I provide conditional simple
temporal networks with uncertainty and decisions (CSTNUDs) as a new temporal
network formalism and an encoding from temporal work ows into
CSTNUDs. I also address simple temporal networks with decisions (STNDs), a
subclass of CSTNUDs equivalent to DTNs (disjunctive temporal networks). I
provide Esse (https://github.com/matteozavatteri/esse) and Kappa
(http://regis.di.univr.it/EE_STND2018.tar.bz2), two tools for
CSTNUDs and STNDs, respectively, with which I carry out a few experimental
evaluations. The results I obtained are published in [
        <xref ref-type="bibr" rid="ref1 ref5 ref8">1,5,8</xref>
        ].
2. I address resource controllability of work ows specifying uncontrollable
workow paths. This part relies on constraint networks. I provide constraint
networks under conditional uncertainty (CNCUs) as a new formalism of
constraint networks able to model conditional uncertainty. Then, I provide an
encoding from access controlled work ows into CNCUs. After that, I also
address work ow resiliency via real-time controller synthesis for timed game
automata. I provide Zeta (https://github.com/matteozavatteri/zeta)
and Erre (https://github.com/matteozavatteri/erre), two tools for
CNCUs and work ow resiliency, respectively, with which I carry out a few
experimental evaluations. The results I obtained are published in [
        <xref ref-type="bibr" rid="ref10 ref11 ref6 ref7 ref9">6,7,9,10,11</xref>
        ].
3. I address temporal and resource controllability together. This part relies on
further new extensions of temporal networks whose dynamic controllability is
checked via controller synthesis for the corresponding timed game automata.
I provide access controlled temporal networks (ACTNs) and conditional
simple temporal networks with uncertainty and resources (CSTNURs) in order
to model temporal security policies. I also show how the temporal constraints
of a temporal role based access control model (TRBAC) can be represented
as a simple temporal network to be connected to the temporal network
modeling the work ow in order to understand if the access controlled work ow
can be executed. The results I obtained are published in [
        <xref ref-type="bibr" rid="ref2 ref3 ref4">2,3,4</xref>
        ].
      </p>
    </sec>
    <sec id="sec-3">
      <title>Published Papers</title>
    </sec>
    <sec id="sec-4">
      <title>Essential References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Cairo</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Combi</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Comin</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hunsberger</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Posenato</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rizzi</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zavatteri</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Incorporating decision nodes into conditional simple temporal networks</article-title>
          .
          <source>In: 24th International Symposium on Temporal Representation and Reasoning (TIME</source>
          <year>2017</year>
          ). vol.
          <volume>90</volume>
          , pp.
          <volume>9</volume>
          :
          <issue>1</issue>
          {9:
          <fpage>17</fpage>
          .
          <string-name>
            <given-names>Schloss</given-names>
            <surname>Dagstuhl-Leibniz-Zentrum fuer Informatik</surname>
          </string-name>
          (
          <year>2017</year>
          ). https://doi.org/10.4230/LIPIcs.TIME.
          <year>2017</year>
          .9
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Combi</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Posenato</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vigano</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zavatteri</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Access controlled temporal networks</article-title>
          .
          <source>In: 9th International Conference on Agents and Arti cial Intelligence (ICAART</source>
          <year>2017</year>
          ). pp.
          <volume>118</volume>
          {
          <fpage>131</fpage>
          .
          <string-name>
            <surname>ScitePress</surname>
          </string-name>
          (
          <year>2017</year>
          ). https://doi.org/10.5220/0006185701180131
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Combi</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Posenato</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vigano</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zavatteri</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Conditional simple temporal networks with uncertainty and resources</article-title>
          .
          <source>Journal of Arti cial Intelligence Research (JAIR) 64</source>
          ,
          <fpage>931</fpage>
          {
          <fpage>985</fpage>
          (
          <year>2019</year>
          ). https://doi.org/10.1613/jair.1.
          <fpage>11453</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Combi</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vigano</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zavatteri</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>Security constraints in temporal rolebased access-controlled work ows</article-title>
          .
          <source>In: 6th ACM Conference on Data and Application Security and Privacy (CODASPY</source>
          <year>2016</year>
          ). pp.
          <volume>207</volume>
          {
          <fpage>218</fpage>
          .
          <string-name>
            <surname>ACM</surname>
          </string-name>
          (
          <year>2016</year>
          ). https://doi.org/10.1145/2857705.2857716
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Zavatteri</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Conditional simple temporal networks with uncertainty and decisions</article-title>
          .
          <source>In: 24th International Symposium on Temporal Representation and Reasoning (TIME</source>
          <year>2017</year>
          ). vol.
          <volume>90</volume>
          , pp.
          <volume>23</volume>
          :
          <issue>1</issue>
          {
          <fpage>23</fpage>
          :
          <fpage>17</fpage>
          .
          <string-name>
            <given-names>Schloss</given-names>
            <surname>Dagstuhl-Leibniz-Zentrum fuer Informatik</surname>
          </string-name>
          (
          <year>2017</year>
          ). https://doi.org/10.4230/LIPIcs.TIME.
          <year>2017</year>
          .23
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Zavatteri</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Combi</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Posenato</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vigano</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Weak, strong and dynamic controllability of access-controlled work ows under conditional uncertainty</article-title>
          .
          <source>In: 15th International Conference on Business Process Management (BPM</source>
          <year>2017</year>
          ). pp.
          <volume>235</volume>
          {
          <fpage>251</fpage>
          . Springer (
          <year>2017</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -65000-5 14
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Zavatteri</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Combi</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vigano</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Resource controllability of work ows under conditional uncertainty</article-title>
          .
          <source>In: Business Process Management Workshops (AI4BPM</source>
          <year>2019</year>
          )
          <article-title>(to appear</article-title>
          ). Springer International Publishing
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Zavatteri</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vigano</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Conditional simple temporal networks with uncertainty and decisions</article-title>
          . Theoretical Computer Science (article in press) (
          <year>2018</year>
          ). https://doi.org/10.1016/j.tcs.
          <year>2018</year>
          .
          <volume>09</volume>
          .023
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Zavatteri</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vigano</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Constraint networks under conditional uncertainty</article-title>
          .
          <source>In: 10th International Conference on Agents and Arti - cial Intelligence (ICAART</source>
          <year>2018</year>
          ). vol.
          <volume>2</volume>
          , pp.
          <volume>41</volume>
          {
          <fpage>52</fpage>
          .
          <string-name>
            <surname>SciTePress</surname>
          </string-name>
          (
          <year>2018</year>
          ). https://doi.org/10.5220/0006553400410052
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Zavatteri</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vigano</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Conditional uncertainty in constraint networks</article-title>
          .
          <source>In: Agents and Arti cial Intelligence</source>
          . pp.
          <volume>130</volume>
          {
          <fpage>160</fpage>
          . Springer (
          <year>2019</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -05453-3 7
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Zavatteri</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vigano</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Last man standing: Static, decremental and dynamic resiliency via controller synthesis</article-title>
          .
          <source>Journal of Computer Security</source>
          <volume>27</volume>
          (
          <issue>3</issue>
          ),
          <volume>343</volume>
          {
          <fpage>373</fpage>
          (
          <year>2019</year>
          ). https://doi.org/10.3233/JCS-181244
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Bertino</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ferrari</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Atluri</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>The speci cation and enforcement of authorization constraints in work ow management systems</article-title>
          .
          <source>ACM Transactions on Information and System Security (TISSEC) 2</source>
          (
          <issue>1</issue>
          ),
          <volume>65</volume>
          {
          <fpage>104</fpage>
          (
          <year>1999</year>
          ). https://doi.org/10.1145/300830.300837
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Clark</surname>
            ,
            <given-names>D.D.</given-names>
          </string-name>
          , Wilson,
          <string-name>
            <surname>D.R.:</surname>
          </string-name>
          <article-title>A comparison of commercial and military computer security policies</article-title>
          .
          <source>In: Security &amp; Privacy '87</source>
          . pp.
          <volume>184</volume>
          {
          <fpage>195</fpage>
          .
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          (
          <year>1987</year>
          ). https://doi.org/10.1109/SP.
          <year>1987</year>
          .10001
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Combi</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gambini</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Migliorini</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Posenato</surname>
          </string-name>
          , R.:
          <article-title>Representing business processes through a temporal data-centric work ow modeling language: An application to the management of clinical pathways</article-title>
          .
          <source>IEEE T. Systems, Man, and Cybernetics: Systems</source>
          <volume>44</volume>
          (
          <issue>9</issue>
          ),
          <volume>1182</volume>
          {
          <fpage>1203</fpage>
          (
          <year>2014</year>
          ). https://doi.org/10.1109/TSMC.
          <year>2014</year>
          .2300055
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Combi</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Posenato</surname>
          </string-name>
          , R.:
          <article-title>Controllability in temporal conceptual work ow schemata</article-title>
          .
          <source>In: 7th International Conference on Business Process Management (BPM</source>
          <year>2009</year>
          ). pp.
          <volume>64</volume>
          {
          <fpage>79</fpage>
          . Springer (
          <year>2009</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>642</fpage>
          - 03848-8 6
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Crampton</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gutin</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Karapetyan</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Valued work ow satis ability problem</article-title>
          .
          <source>In: 20th ACM Symposium on Access Control Models and Technologies (SACMAT</source>
          <year>2015</year>
          ). pp.
          <volume>3</volume>
          {
          <fpage>13</fpage>
          .
          <string-name>
            <surname>ACM</surname>
          </string-name>
          (
          <year>2015</year>
          ). https://doi.org/10.1145/2752952.2752961
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Crampton</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gutin</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yeo</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>On the parameterized complexity and kernelization of the work ow satis ability problem</article-title>
          .
          <source>ACM Transactions on Information and System Security (TISSEC) 16(1)</source>
          , 4:
          <issue>1</issue>
          {4:
          <issue>31</issue>
          (
          <year>2013</year>
          ). https://doi.org/10.1145/2487222.2487226
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Posenato</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zerbato</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Combi</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Managing decision tasks and events in time-aware business process models</article-title>
          .
          <source>In: 16th International Conference on Business Process Management (BPM</source>
          <year>2018</year>
          ). pp.
          <volume>102</volume>
          {
          <fpage>118</fpage>
          . Springer (
          <year>2018</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -98648-7 7
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Reijers</surname>
            ,
            <given-names>H.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mendling</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>Modularity in process models: Review and e ects</article-title>
          .
          <source>In: 6th International Conference on Business Process Management (BPM</source>
          <year>2008</year>
          ). pp.
          <volume>20</volume>
          {
          <issue>35</issue>
          (
          <year>2008</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>540</fpage>
          -85758-7 5
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Sandhu</surname>
            ,
            <given-names>R.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Coyne</surname>
            ,
            <given-names>E.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Feinstein</surname>
            ,
            <given-names>H.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Youman</surname>
            ,
            <given-names>C.E.</given-names>
          </string-name>
          :
          <article-title>Role-based access control models</article-title>
          .
          <source>Computer</source>
          <volume>29</volume>
          , 38{
          <fpage>47</fpage>
          (
          <year>1996</year>
          ). https://doi.org/10.1109/2.485845
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          :
          <article-title>Satis ability and resiliency in work ow authorization systems</article-title>
          .
          <source>ACM Transactions on Information and System Security (TISSEC) 13(4)</source>
          ,
          <volume>40</volume>
          :1{
          <fpage>40</fpage>
          :
          <fpage>35</fpage>
          (
          <year>2010</year>
          ). https://doi.org/10.1145/1880022.1880034
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>