{"id":"https://openalex.org/W2524822342","doi":"https://doi.org/10.1109/tdsc.2015.2481881","title":"Composability Verification of Multi-Service Workflows in a Policy-Driven Cloud Computing Environment","display_name":"Composability Verification of Multi-Service Workflows in a Policy-Driven Cloud Computing Environment","publication_year":2015,"publication_date":"2015-09-24","ids":{"openalex":"https://openalex.org/W2524822342","doi":"https://doi.org/10.1109/tdsc.2015.2481881","mag":"2524822342"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2015.2481881","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2015.2481881","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002242200","display_name":"Basit Shafiq","orcid":"https://orcid.org/0000-0002-7862-6682"},"institutions":[{"id":"https://openalex.org/I207789805","display_name":"Lahore University of Management Sciences","ror":"https://ror.org/05b5x4a35","country_code":"PK","type":"education","lineage":["https://openalex.org/I207789805"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Basit Shafiq","raw_affiliation_strings":["Department of Computer Science, Lahore University of Management Sciences, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Lahore University of Management Sciences, Pakistan","institution_ids":["https://openalex.org/I207789805"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078490388","display_name":"Sameera Ghayyur","orcid":null},"institutions":[{"id":"https://openalex.org/I207789805","display_name":"Lahore University of Management Sciences","ror":"https://ror.org/05b5x4a35","country_code":"PK","type":"education","lineage":["https://openalex.org/I207789805"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Sameera Ghayyur","raw_affiliation_strings":["Department of Computer Science, Lahore University of Management Sciences, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Lahore University of Management Sciences, Pakistan","institution_ids":["https://openalex.org/I207789805"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061368085","display_name":"Ammar Masood","orcid":"https://orcid.org/0000-0002-5118-0617"},"institutions":[{"id":"https://openalex.org/I899713450","display_name":"Air University","ror":"https://ror.org/03yfe9v83","country_code":"PK","type":"education","lineage":["https://openalex.org/I899713450"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Ammar Masood","raw_affiliation_strings":["Department of Avionics Engineering, Air University, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Avionics Engineering, Air University, Pakistan","institution_ids":["https://openalex.org/I899713450"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085526008","display_name":"Zahid Pervaiz","orcid":"https://orcid.org/0000-0002-8530-2440"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zahid Pervaiz","raw_affiliation_strings":["ECE, Purdue University, West Lafayette, IN"],"affiliations":[{"raw_affiliation_string":"ECE, Purdue University, West Lafayette, IN","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063843479","display_name":"Abdulrahman Almutairi","orcid":null},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Abdulrahman Almutairi","raw_affiliation_strings":["Collage of Computer and information Sciences, King Saud University, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Collage of Computer and information Sciences, King Saud University, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104295140","display_name":"Farrukh Aftab Khan","orcid":null},"institutions":[{"id":"https://openalex.org/I48205209","display_name":"Texas Southern University","ror":"https://ror.org/05ch0aw77","country_code":"US","type":"education","lineage":["https://openalex.org/I48205209"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Farrukh Khan","raw_affiliation_strings":["Computer Science Department, Texas Southern University, Houston, TX"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Texas Southern University, Houston, TX","institution_ids":["https://openalex.org/I48205209"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022057487","display_name":"Arif Ghafoor","orcid":"https://orcid.org/0000-0002-3707-8173"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Arif Ghafoor","raw_affiliation_strings":["School of Electrical and Computer Engineering, Purdue University, West Lafayette, IN"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Computer Engineering, Purdue University, West Lafayette, IN","institution_ids":["https://openalex.org/I219193219"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5002242200"],"corresponding_institution_ids":["https://openalex.org/I207789805"],"apc_list":null,"apc_paid":null,"fwci":1.0749,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.88059206,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"14","issue":"5","first_page":"478","last_page":"493"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/composability","display_name":"Composability","score":0.9245960712432861},{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.8699871897697449},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8376801609992981},{"id":"https://openalex.org/keywords/workflow-management-system","display_name":"Workflow management system","score":0.6886297464370728},{"id":"https://openalex.org/keywords/workflow-technology","display_name":"Workflow technology","score":0.6515756845474243},{"id":"https://openalex.org/keywords/workflow-engine","display_name":"Workflow engine","score":0.6333790421485901},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6066802740097046},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5632050633430481},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.49520936608314514},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.47607630491256714},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4716198742389679},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.42519497871398926},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.37851786613464355},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.2739407420158386},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1849367916584015},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15654045343399048}],"concepts":[{"id":"https://openalex.org/C2778814252","wikidata":"https://www.wikidata.org/wiki/Q5156715","display_name":"Composability","level":2,"score":0.9245960712432861},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.8699871897697449},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8376801609992981},{"id":"https://openalex.org/C140824633","wikidata":"https://www.wikidata.org/wiki/Q2808660","display_name":"Workflow management system","level":3,"score":0.6886297464370728},{"id":"https://openalex.org/C19612761","wikidata":"https://www.wikidata.org/wiki/Q8034836","display_name":"Workflow technology","level":3,"score":0.6515756845474243},{"id":"https://openalex.org/C188220564","wikidata":"https://www.wikidata.org/wiki/Q3325097","display_name":"Workflow engine","level":3,"score":0.6333790421485901},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6066802740097046},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5632050633430481},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.49520936608314514},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.47607630491256714},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4716198742389679},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.42519497871398926},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.37851786613464355},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.2739407420158386},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1849367916584015},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15654045343399048},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2015.2481881","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2015.2481881","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6200000047683716,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G3944844065","display_name":null,"funder_award_id":"IIS-0964639","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G532481929","display_name":null,"funder_award_id":"1137732","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W78613945","https://openalex.org/W195358106","https://openalex.org/W1752392398","https://openalex.org/W1964910660","https://openalex.org/W1969367632","https://openalex.org/W1981808971","https://openalex.org/W2008239401","https://openalex.org/W2016758618","https://openalex.org/W2025875999","https://openalex.org/W2038953226","https://openalex.org/W2046102134","https://openalex.org/W2054618740","https://openalex.org/W2063997960","https://openalex.org/W2069568030","https://openalex.org/W2082912784","https://openalex.org/W2094027030","https://openalex.org/W2095362421","https://openalex.org/W2101134527","https://openalex.org/W2101508170","https://openalex.org/W2105507811","https://openalex.org/W2105782034","https://openalex.org/W2115826669","https://openalex.org/W2121163399","https://openalex.org/W2123837566","https://openalex.org/W2141696417","https://openalex.org/W2143935684","https://openalex.org/W2156137400","https://openalex.org/W2156885966","https://openalex.org/W2913459036","https://openalex.org/W4252484485","https://openalex.org/W6603179261","https://openalex.org/W6889274900"],"related_works":["https://openalex.org/W2379425324","https://openalex.org/W2373541195","https://openalex.org/W2376410910","https://openalex.org/W2091596831","https://openalex.org/W2365658322","https://openalex.org/W2352344200","https://openalex.org/W329008868","https://openalex.org/W2367975678","https://openalex.org/W2906819665","https://openalex.org/W2375552622"],"abstract_inverted_index":{"The":[0,73],"emergence":[1],"of":[2,33,49,65,75,100,107,116],"cloud":[3],"computing":[4],"infrastructure":[5],"and":[6,19,38,45,150,160],"Semantic":[7],"Web":[8],"technologies":[9],"has":[10],"created":[11],"unprecedented":[12],"opportunities":[13],"for":[14,61,132,153],"composing":[15],"large-scale":[16],"business":[17,36],"processes":[18,37,87],"workflow-based":[20],"applications":[21],"that":[22,82],"span":[23],"multiple":[24],"organizational":[25,52],"domains.":[26,53,103],"A":[27,104],"key":[28,105],"challenge":[29],"related":[30],"to":[31,80,94,111,120],"composition":[32],"such":[34,108],"multi-organizational":[35],"workflows":[39,67,149],"is":[40,79,110,144,151],"posed":[41],"by":[42,176],"the":[43,50,84,89,95,113,138,156,165,168,172],"security":[44,97,159],"access":[46,161],"control":[47,162],"policies":[48],"underlying":[51],"In":[54,137,164],"this":[55],"paper,":[56],"we":[57],"propose":[58],"a":[59,124,129,141],"framework":[60],"verifying":[62,133],"secure":[63,134],"composability":[64,77],"distributed":[66,117,142],"in":[68],"an":[69],"autonomous":[70],"multi-domain":[71],"environment.":[72],"objective":[74],"workflow":[76,91,135,143,173],"verification":[78,109],"ensure":[81],"all":[83,101],"users":[85],"or":[86],"executing":[88],"designated":[90],"tasks":[92,174],"conform":[93],"time-dependent":[96,114],"policy":[98],"specifications":[99],"collaborating":[102,178],"aspect":[106],"determine":[112],"schedulability":[115],"workflows,":[118],"assumed":[119],"be":[121],"invoked":[122],"on":[123],"recurrent":[125],"basis.":[126],"We":[127],"use":[128],"two-step":[130],"approach":[131],"composability.":[136],"first":[139],"step,":[140,167],"decomposed":[145],"into":[146],"domain-specific":[147],"projected":[148],"verified":[152],"conformance":[154],"with":[155],"respective":[157],"domain's":[158],"policy.":[163],"second":[166],"cross-domain":[169],"dependencies":[170],"amongst":[171],"performed":[175],"different":[177],"domains":[179],"are":[180],"verified.":[181]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":3},{"year":2018,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
