35,675 research outputs found

    Research on Modeling for Administrative Law Enforcement Based on Workflow-net

    Get PDF
    Abstract: To create simulation experimental software correctly, how to model for process of administrative law enforcement was discussed. Taking current regulations in China as example, two laws was modeled using workflow-net. Net for administrative reconsideration law enforcement was simplified, and then proved to be soundless. Improving method was proposed for program realization. The research shows that workflow-net model is necessary and effective for analysis of enforcement, which helps to find problem and improve it. Introduction Practice is necessary in teaching of administrative law enforcement, which helps students to learn and understand process of administrative law enforcement. Simulation experimental software is a good choice to reach it. Flow of administrative law enforcement will be expressed in the software, which illustrates how to enforce laws. To program, process of administrative law enforcement should be expressed in flowing way firstly. In fact, the work is to model for process of administrative law enforcement. Model described with standardized and formal method is easy to be verified and realized. Workflow-net technology is suit for modeling for process of administrative law enforcement. Workflow-net is based on Petri net, supported by powerful mathematical theory, having intuitive graph, with which business process can be summarized and abstracted. Flow of business can be described accurately without ambiguity. There are also abundant technologies for analyzing and verifying workflow-net. Simulation tools for Petri net can also be used to analyze and optimize workflow model. In these ways, model can be adapted to best status. In our project, we model for process of administrative law enforcement using workflow-net firstly. Models have accurate semantics and intuitive graphs. Later, we create programs realizing it using jBPM, popular work flow software

    A Taxonomy of Workflow Management Systems for Grid Computing

    Full text link
    With the advent of Grid and application technologies, scientists and engineers are building more and more complex applications to manage and process large data sets, and execute scientific experiments on distributed resources. Such application scenarios require means for composing and executing complex workflows. Therefore, many efforts have been made towards the development of workflow management systems for Grid computing. In this paper, we propose a taxonomy that characterizes and classifies various approaches for building and executing workflows on Grids. We also survey several representative Grid workflow systems developed by various projects world-wide to demonstrate the comprehensiveness of the taxonomy. The taxonomy not only highlights the design and engineering similarities and differences of state-of-the-art in Grid workflow systems, but also identifies the areas that need further research.Comment: 29 pages, 15 figure

    Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures (Full version)

    Full text link
    A widespread design approach in distributed applications based on the service-oriented paradigm, such as web-services, consists of clearly separating the enforcement of authorization policies and the workflow of the applications, so that the interplay between the policy level and the workflow level is abstracted away. While such an approach is attractive because it is quite simple and permits one to reason about crucial properties of the policies under consideration, it does not provide the right level of abstraction to specify and reason about the way the workflow may interfere with the policies, and vice versa. For example, the creation of a certificate as a side effect of a workflow operation may enable a policy rule to fire and grant access to a certain resource; without executing the operation, the policy rule should remain inactive. Similarly, policy queries may be used as guards for workflow transitions. In this paper, we present a two-level formal verification framework to overcome these problems and formally reason about the interplay of authorization policies and workflow in service-oriented architectures. This allows us to define and investigate some verification problems for SO applications and give sufficient conditions for their decidability.Comment: 16 pages, 4 figures, full version of paper at Symposium on Secure Computing (SecureCom09
    • …
    corecore