skip to main content
research-article

On the Parameterized Complexity and Kernelization of the Workflow Satisfiability Problem

Published:01 June 2013Publication History
Skip Abstract Section

Abstract

A workflow specification defines a set of steps and the order in which these steps must be executed. Security requirements may impose constraints on which groups of users are permitted to perform subsets of these steps. A workflow specification is said to be satisfiable if there exists an assignment of users to workflow steps that satisfies all the constraints. An algorithm for determining whether such an assignment exists is important, both as a static analysis tool for workflow specifications and for the construction of runtime reference monitors for workflow management systems. Finding such an assignment is a hard problem in general, but work by Wang and Li [2010] using the theory of parameterized complexity suggests that efficient algorithms exist under reasonable assumptions about workflow specifications. In this article, we improve the complexity bounds for the workflow satisfiability problem. We also generalize and extend the types of constraints that may be defined in a workflow specification and prove that the satisfiability problem remains fixed-parameter tractable for such constraints. Finally, we consider preprocessing for the problem and prove that in an important special case, in polynomial time, we can reduce the given input into an equivalent one where the number of users is at most the number of steps. We also show that no such reduction exists for two natural extensions of this case, which bounds the number of users by a polynomial in the number of steps, provided a widely accepted complexity-theoretical assumption holds.

References

  1. American National Standards Institute. 2004. ANSI INCITS 359-2004 for Role Based Access Control. American National Standards Institute.Google ScholarGoogle Scholar
  2. Armando, A., Giunchiglia, E., and Ponta, S. E. 2009. Formal specification and automatic analysis of business processes under authorization constraints: An action-based approach. In Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business. S. Fischer-Hubner, C. Lambrinoudakis, and G. Pernul Eds., Lecture Notes in Computer Science, vol. 5695, Springer, 63--72. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Basin, D. A., Burri, S. J., and Karjoth, G. 2011. Obstruction-free authorization enforcement: Aligning security with business objectives. In Proceedings of 24th IEEE Symposium on Computer Security Foundations. IEEE Computer Society, 99--113. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Basin, D. A., Burri, S. J., and Karjoth, G. 2012. Optimal workflow-aware authorizations. In Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (SACMAT’12). V. Atluri, J. Vaidya, A. Kern, and M. Kantarcioglu Eds., ACM Press, New York, 93--102. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Bell, D. and LaPadula, L. 1976. Secure computer systems: Unified exposition and multics interpretation. Tech. rep. MTR-2997, Mitre Corporation, Bedford, MA.Google ScholarGoogle Scholar
  6. Bertino, E., Ferrari, E., and Atluri, V. 1999. The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur. 2, 1, 65--104. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Bertino, E., Bonatti, P. A., and Ferrari, E. 2001. TRBAC: A temporal role-based access control model. ACM Trans. Inf. Syst. Secur. 4, 3, 191--233. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Björklund, A., Husfeldt, T., and Koivisto, M. 2009. Set partitioning via inclusion-exclusion. SIAM J. Comput. 39, 2, 546--563. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Bodlaender, H. L., Downey, R. G., Fellows, M. R., and Hermelin, D. 2009. On problems without polynomial kernels. J. Comput. Syst. Sci. 75, 8, 423--434. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Bodlaender, H. L., Jansen, B. M. P., and Kratsch, S. 2011a. Cross-composition: A new technique for kernelization lower bounds. In Proceedings of the Symposium on Theoretical Aspects of Computer Science (STACS’11). T. Schwentick and C. Durr Eds., LIPIcs Series, vol. 9, Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, 165--176.Google ScholarGoogle Scholar
  11. Bodlaender, H. L., Thomassé, S., and Yeo, A. 2011b. Kernel bounds for disjoint cycles and disjoint paths. Theor. Comput. Sci. 412, 35, 4570--4578. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Brewer, D. F. C. and Nash, M. J. 1989. The chinese wall security policy. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society, 206--214.Google ScholarGoogle Scholar
  13. Crampton, J. 2005. A reference monitor for workflow systems with constrained task execution. In Proceedings of the 10th ACM Symposium on Access Control Models and Technologies (SACMAT’05). E. Ferrari and G.-J. Ahn Eds., ACM Press, New York, 38--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Crampton, J. and Gutin, G. 2013. Constraint expressions and workflow satisfiability. http://arxiv.org/abs/1301.3402. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Crampton, J., Gutin, G., and Yeo, A. 2012. On the parameterized complexity of the workflow satisfiability problem. In Proceedings of the ACM Conference on Computer and Communications Security. T. Yu, G. Danezis, and V. D. Gligor Eds., ACM Press, New York, 857--868. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Crowston, R., Gutin, G., Jones, M., Raman, V., and Saurabh, S. 2012. Parameterized complexity of maxsat above average. In Proceedings of the 10th Latin American International Conference on Theoretical Informatics (LATIN’12). D. Fernandez-Baca Ed., Lecture Notes in Computer Science, vol. 7256, Springer, 184--194. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Dom, M., Lokshtanov, D., and Saurabh, S. 2009. Incompressibility through colors and ids. In Proceedings of the 36th International Colloquium on Automata, Languages and Programming (ICALP’09). S. Albers, A. Marchetti-Spaccamela, Y. Matias, S. E. Nikoletseas, and W. Thomas Eds., Lecture Notes in Computer Science, vol. 5555, Springer, 378--389. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Downey, R. G. and Fellows, M. R. 1999. Parameterized Complexity. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Fellows, M. R., Friedrich, T., Hermelin, D., Narodytska, N., and Rosamond, F. A. 2011. Constraint satisfaction problems: Convexity makes all different constraints tractable. In Proceedings of the 22nd International Joint Conference on Artificial Intelligence (IJCAI’11). T. Walsh Ed., AAAI, 522--527. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Flum, J. and Grohe, M. 2006. Parameterized Complexity Theory. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Impagliazzo, R., Paturi, R., and Zane, F. 2001. Which problems have strongly exponential complexity? J. Comput. Syst. Sci. 63, 4, 512--530. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Joshi, J., Bertino, E., Latif, U., and Ghafoor, A. 2005. A generalized temporal role-based access control model. IEEE Trans. Knowl. Data Engin. 17, 1, 4--23. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Kaufman, T., Krivelevich, M., and Ron, D. 2004. Tight bounds for testing bipartiteness in general graphs. SIAM J. Comput. 33, 6, 1441--1483. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Kohler, M. and Schaad, A. 2008. Proactive access control for business process-driven environments. In Proceedings of the Annual Computer Security Applications Conference (ACSAC’08). IEEE Computer Society, 153--162. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Li, N., Tripunitara, M. V., and Bizri, Z. 2007. On mutually exclusive roles and separation-of-duty. ACM Trans. Inf. Syst. Secur. 10, 2. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Moffett, J. D. and Lupu, E. 1999. The uses of role hierarchies in access control. In Proceedings of the ACM Workshop on Role-Based Access Control. ACM Press, New York, 153--160. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman, C. E. 1996. Role-based access control models. IEEE Comput. 29, 2, 38--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Simon, R. T. and Zurko, M. E. 1997. Separation of duty in role-based environments. In Proceedings of the 10th Computer Security Foundations Workshop (CSFW’97). IEEE Computer Society, 183--194. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Szeider, S. 2004. Minimal unsatisfiable formulas with bounded clause-variable difference are fixed parameter tractable. J. Comput. Syst. Sci. 69, 4, 656--674. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Tsang, E. P. K. 1993. Foundations of Constraint Satisfaction. Academic Press.Google ScholarGoogle Scholar
  31. van der Aalst, W. M. P., Ter Hofstede, A. H. M., Kiepuszewski, B., and Barros, A. P. 2003. Workflow patterns. Distrib. Parallel Databases 14, 1, 5--51. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Wang, Q. and Li, N. 2010. Satisfiability and resiliency in workflow authorization systems. ACM Trans. Inf. Syst. Secur. 13, 4, 40. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. On the Parameterized Complexity and Kernelization of the Workflow Satisfiability Problem

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image ACM Transactions on Information and System Security
              ACM Transactions on Information and System Security  Volume 16, Issue 1
              June 2013
              113 pages
              ISSN:1094-9224
              EISSN:1557-7406
              DOI:10.1145/2487222
              Issue’s Table of Contents

              Copyright © 2013 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 June 2013
              • Accepted: 1 March 2013
              • Revised: 1 January 2013
              • Received: 1 August 2012
              Published in tissec Volume 16, Issue 1

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Research
              • Refereed

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader