35,675 research outputs found
Research on Modeling for Administrative Law Enforcement Based on Workflow-net
Abstract: To create simulation experimental software correctly, how to model for process of administrative law enforcement was discussed. Taking current regulations in China as example, two laws was modeled using workflow-net. Net for administrative reconsideration law enforcement was simplified, and then proved to be soundless. Improving method was proposed for program realization. The research shows that workflow-net model is necessary and effective for analysis of enforcement, which helps to find problem and improve it. Introduction Practice is necessary in teaching of administrative law enforcement, which helps students to learn and understand process of administrative law enforcement. Simulation experimental software is a good choice to reach it. Flow of administrative law enforcement will be expressed in the software, which illustrates how to enforce laws. To program, process of administrative law enforcement should be expressed in flowing way firstly. In fact, the work is to model for process of administrative law enforcement. Model described with standardized and formal method is easy to be verified and realized. Workflow-net technology is suit for modeling for process of administrative law enforcement. Workflow-net is based on Petri net, supported by powerful mathematical theory, having intuitive graph, with which business process can be summarized and abstracted. Flow of business can be described accurately without ambiguity. There are also abundant technologies for analyzing and verifying workflow-net. Simulation tools for Petri net can also be used to analyze and optimize workflow model. In these ways, model can be adapted to best status. In our project, we model for process of administrative law enforcement using workflow-net firstly. Models have accurate semantics and intuitive graphs. Later, we create programs realizing it using jBPM, popular work flow software
A Taxonomy of Workflow Management Systems for Grid Computing
With the advent of Grid and application technologies, scientists and
engineers are building more and more complex applications to manage and process
large data sets, and execute scientific experiments on distributed resources.
Such application scenarios require means for composing and executing complex
workflows. Therefore, many efforts have been made towards the development of
workflow management systems for Grid computing. In this paper, we propose a
taxonomy that characterizes and classifies various approaches for building and
executing workflows on Grids. We also survey several representative Grid
workflow systems developed by various projects world-wide to demonstrate the
comprehensiveness of the taxonomy. The taxonomy not only highlights the design
and engineering similarities and differences of state-of-the-art in Grid
workflow systems, but also identifies the areas that need further research.Comment: 29 pages, 15 figure
Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures (Full version)
A widespread design approach in distributed applications based on the
service-oriented paradigm, such as web-services, consists of clearly separating
the enforcement of authorization policies and the workflow of the applications,
so that the interplay between the policy level and the workflow level is
abstracted away. While such an approach is attractive because it is quite
simple and permits one to reason about crucial properties of the policies under
consideration, it does not provide the right level of abstraction to specify
and reason about the way the workflow may interfere with the policies, and vice
versa. For example, the creation of a certificate as a side effect of a
workflow operation may enable a policy rule to fire and grant access to a
certain resource; without executing the operation, the policy rule should
remain inactive. Similarly, policy queries may be used as guards for workflow
transitions.
In this paper, we present a two-level formal verification framework to
overcome these problems and formally reason about the interplay of
authorization policies and workflow in service-oriented architectures. This
allows us to define and investigate some verification problems for SO
applications and give sufficient conditions for their decidability.Comment: 16 pages, 4 figures, full version of paper at Symposium on Secure
Computing (SecureCom09
- …