4.6 Article

Security-Aware Collaboration Plan Recommendation for Dynamic Multiple Workflow Processes

Journal

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2021.3127630

Keywords

Security; Collaboration; Costs; Business; Safety; Petri nets; Computational modeling; Dynamic relation; collaboration plan; sprouting graph; security requirement

Ask authors/readers for more resources

Currently, recommending secure collaboration plans for multiple workflow processes with dynamic relations has become a hot topic, as it can reduce risks during execution and prevent financial losses caused by security breaches. However, existing methods fail to solve the parametric problem caused by dynamic relations or recommend optimal collaboration plans due to erroneous information. This article proposes a new approach to recommend security-aware collaboration plans for multiple workflow processes with dynamic relations.
Currently, recommending collaboration plans of dynamic multiple workflow processes under security requirements or constraints has become a hot topic, as it not only can reduce the risk during execution, but also can avoid enormous financial loss caused by security breaches. However, the existing methods cannot solve the parametric problem caused by dynamic relations of multiple workflow processes or recommend an optimal collaboration plan because of erroneous information. In this article, we propose a new approach to recommend security-aware collaboration plans for multiple workflow processes with dynamic relations. First, we develop three basic computing patterns of dynamic relations and construct a parametric sprouting graph for multiple workflow processes with dynamic relations. Second, we present the procedure of recommending an optimal secure collaboration plan that satisfy security requirements. By comparison with the existing methods via two experiments, our approach not only can solve the parametric problem caused by dynamic relations of multiple workflow processes, but also can recommend an optimal secure collaboration plan under security requirements.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available