SYSTEM TO AVOID POLICY-BASED DEADLOCKS IN WORKFLOW EXECUTION
First Claim
Patent Images
1. A computer-implemented method comprising:
- retrieving information describing a workflow including tasks, roles assigned to the tasks and security constraints related to the tasks;
automatically generating at least one data structure representative of relationships between the tasks and the security constraints; and
performing an automated, design-time evaluation, using the at least one data structure, to determine a minimal number of resources to be assigned to the roles in order to execute the tasks of the workflow and to avoid deadlock in execution of the tasks of the workflow as a result of the security constraints.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method avoids policy-based deadlocks in execution of a workflow. The method includes receiving information describing a workflow. The workflow includes tasks, roles, site of tasks and security constraints related to the tasks. A data structure, representative of relationships between the tasks and the security constraints is automatically generated. An automated, design-time evaluation is performed using the data structure to determine a minimal number of resources to be assigned to the roles in order to execute the tasks of the workflow, and to avoid deadlock in execution of the tasks of the workflow as a result of security constraints.
25 Citations
24 Claims
-
1. A computer-implemented method comprising:
-
retrieving information describing a workflow including tasks, roles assigned to the tasks and security constraints related to the tasks; automatically generating at least one data structure representative of relationships between the tasks and the security constraints; and performing an automated, design-time evaluation, using the at least one data structure, to determine a minimal number of resources to be assigned to the roles in order to execute the tasks of the workflow and to avoid deadlock in execution of the tasks of the workflow as a result of the security constraints. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-implemented system comprising:
-
a first component to retrieve information describing a workflow including tasks, roles assigned to the tasks and security constraints related to the tasks, and to automatically generate at least one data structure representative of relationships between the tasks and the security constraints; and a second component to perform an automated, design-time evaluation, using the at least one data structure, to determine a minimal number of resources to be assigned to the roles in order to execute the tasks of the workflow and to avoid deadlock in execution of the tasks of the workflow as a result of the security constraints. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A computer system comprising:
-
a memory; and a processor, communicatively coupled to the memory, to; retrieve information describing a workflow including tasks, roles assigned to the tasks and security constraints related to the tasks; automatically generate at least one data structure representative of relationships between the tasks and the security constraints; and perform an automated, design-time evaluation, using the at least one data structure, to determine a minimal number of resources to be assigned to the roles in order to execute the tasks of the workflow and to avoid deadlock in execution of the tasks of the workflow as a result of the security constraints.
-
-
24. A machine-readable medium storing instructions that, when executed by a processor, cause the processor to:
-
retrieve information describing a workflow including tasks, roles assigned to the tasks and security constraints related to the tasks; automatically generate at least one data structure representative of relationships between the tasks and the security constraints; and perform an automated, design-time evaluation, using the at least one data structure, to determine a minimal number of resources to be assigned to the roles in order to execute the tasks of the workflow and to avoid deadlock in execution of the tasks of the workflow as a result of the security constraints.
-
Specification