over real-valued temporal constraints.
7 CONCLUDING REMARKS
We defined ACTNs as an extension of CSTNUs in
order to take into consideration users and authoriza-
tion constraints, and we used them to analyze the of-
ficial STEMI guidelines as a concrete example. We
similarly extended the execution semantics for CST-
NUs given in terms of RTEDs. After that, we pro-
vided an encoding from ACTNs to TGAs discussing
a few optimizations to speed up the model-checking
phase. We proved that our encoding is polynomial,
fully automated, and we also showed the correctness
(see the appendix). As a result, we provided a sound
and complete approach for the temporal WSP. As a fi-
nal contribution, we discussed our experimental eval-
uation using the UPPAAL-TIGA software tool. We
are currently implementing the encoder from ACTNs
into TGAs and an executor for executing the ACTN
following the synthesized strategy.
As future work we will investigate two main di-
rections, distinguished by the use, or not, of TGAs.
In the first case, we plan to address the workflow re-
siliency problem, which is a refinement of the WSP
when a subset of the authorized user may become
absent before or during the execution (again, a new
kind of uncertainty that needs a controllability ap-
proach). In the second, we plan to devise a network-
based constraint-propagation algorithm for ACTN
DC-checking. These algorithms might be more com-
plex but are typically faster than TCTL model check-
ing as they tighten the network by ruling out all im-
possible execution strategies.
Finally, we plan to provide a structured modeling
language for designing access-controlled workflows
to be mapped into ACTNs for the DC checking.
REFERENCES
Barletta, M., Ranise, S., and Vigan
`
o, L. (2011). A
declarative two-level framework to specify and
verify workflow and authorization policies in
service-oriented architectures. SOCA, 5(2):105–137,
http://dx.doi.org/10.1007/s11761-010-0073-4.
Barth, A., Mitchell, J., Datta, A., and Sundaram,
S. (2007). Privacy and utility in business
processes. In CSF ’07, pages 279–294.
http://dx.doi.org/10.1109/CSF.2007.26.
Behrmann, G., Cougnard, A., David, A., Fleury, E.,
Larsen, K. G., and Lime, D. (2007). Uppaal-tiga:
Time for playing games! In Damm, W. and Her-
manns, H., editors, CAV 2007, LNCS, pages 121–125.
http://dx.doi.org/10.1007/978-3-540-73368-3 14.
Bertino, E., Bonatti, P. A., and Ferrari, E. (2001). TRBAC:
A temporal role-based access control model. ACM
Trans. Inf. Syst. Secur., 4(3).
Cimatti, A., Hunsberger, L., Micheli, A., Posenato, R., and
Roveri, M. (2016). Dynamic controllability via timed
game automata. Acta Informatica, 53(6–8):681–722,
http://dx.doi.org/10.1007/s00236-016-0257-2.
Combi, C., Gambini, M., Migliorini, S., and Pose-
nato, R. (2014a). Representing business pro-
cesses through a temporal data-centric workflow
modeling language: An application to the man-
agement of clinical pathways. IEEE Trans.
Syst., Man, Cybern., Syst., 44(9):1182–1203,
http://dx.doi.org/10.1109/TSMC.2014.2300055.
Combi, C., Hunsberger, L., and Posenato, R. (2013). An
algorithm for checking the dynamic controllability of
a conditional simple temporal network with uncer-
tainty. In ICAART 2013, volume 2, pages 144–156.
http://dx.doi.org/10.5220/0004256101440156.
Combi, C., Hunsberger, L., and Posenato, R. (2014b).
An algorithm for checking the dynamic controllabil-
ity of a conditional simple temporal network with
uncertainty - revisited. In Agents and Artificial In-
telligence, volume 449 of CCIS, pages 314–331.
http://dx.doi.org/10.1007/978-3-662-44440-5 19.
Combi, C., Vigan
`
o, L., and Zavatteri, M. (2016).
Security constraints in temporal role-based
access-controlled workflows. In CODASPY.
http://dx.doi.org/10.1145/2857705.2857716.
Crampton, J., Huth, M., and Kuo, J. H.-P. (2014).
Authorized workflow schemas: deciding re-
alizability through LTL model checking. Int
J Softw Tools Technol Transfer, 16(1):31–48,
http://dx.doi.org/10.1007/s10009-012-0269-3.
Hunsberger, L., Posenato, R., and Combi, C. (2012). The
Dynamic Controllability of Conditional STNs with
Uncertainty. In PlanEx at ICAPS 2012, pages 1–8.
http://arxiv.org/abs/1212.2005.
Hunsberger, L., Posenato, R., and Combi, C. (2015). A
sound-and-complete propagation-based algorithm for
checking the dynamic consistency of conditional sim-
ple temporal networks. In TIME 2015, pages 4–18.
http://dx.doi.org/10.1109/TIME.2015.26.
Lenz, R. and Reichert, M. (2007). It support
for healthcare processes - premises, challenges,
perspectives. Data Knowl. Eng., 61(1):39–58,
http://dx.doi.org/10.1016/j.datak.2006.04.007.
Morris, P. H., Muscettola, N., and Vidal, T. (2001). Dy-
namic control of plans with temporal uncertainty. In
IJCAI 2001, pages 494–502.
Wang, Q. and Li, N. (2010). Satisfiability and resiliency
in workflow authorization systems. ACM Trans. Inf.
Syst. Secur., 13(4).
APPENDIX
Theorem 1. Encoding ACTNs into TGAs has
polynomial-time complexity.
Proof. The main components having a role in the
complexity analysis of the encoding of an ACTN are:
Access Controlled Temporal Networks
129