Tight lower bounds for the Workflow Satisfiability Problem based on the Strong Exponential Time Hypothesis
•The Workflow Satisfiability Problem (WSP) is a problem used in access control.•The WSP is parameterized by the number of steps.•The WSP is considered for regular and user-independent constraints.•Tight lower bounds are proved for WSP algorithms with the two types of constraints. The Workflow Satisf...
Saved in:
Published in | Information processing letters Vol. 116; no. 3; pp. 223 - 226 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Amsterdam
Elsevier B.V
01.03.2016
Elsevier Sequoia S.A |
Subjects | |
Online Access | Get full text |
ISSN | 0020-0190 1872-6119 |
DOI | 10.1016/j.ipl.2015.11.008 |
Cover
Loading…
Abstract | •The Workflow Satisfiability Problem (WSP) is a problem used in access control.•The WSP is parameterized by the number of steps.•The WSP is considered for regular and user-independent constraints.•Tight lower bounds are proved for WSP algorithms with the two types of constraints.
The Workflow Satisfiability Problem (WSP) asks whether there exists an assignment of authorized users to the steps in a workflow specification, subject to certain constraints on the assignment. The problem is NP-hard even when restricted to just not equal constraints. Since the number of steps k is relatively small in practice, Wang and Li (2010) [21] introduced a parametrisation of WSP by k. Wang and Li (2010) [21] showed that, in general, the WSP is W[1]-hard, i.e., it is unlikely that there exists a fixed-parameter tractable (FPT) algorithm for solving the WSP. Crampton et al. (2013) [10] and Cohen et al. (2014) [6] designed FPT algorithms of running time O⁎(2k) and O⁎(2klog2k) for the WSP with so-called regular and user-independent constraints, respectively. In this note, we show that there are no algorithms of running time O⁎(2ck) and O⁎(2cklog2k) for the two restrictions of WSP, respectively, with any c<1, unless the Strong Exponential Time Hypothesis fails. |
---|---|
AbstractList | •The Workflow Satisfiability Problem (WSP) is a problem used in access control.•The WSP is parameterized by the number of steps.•The WSP is considered for regular and user-independent constraints.•Tight lower bounds are proved for WSP algorithms with the two types of constraints.
The Workflow Satisfiability Problem (WSP) asks whether there exists an assignment of authorized users to the steps in a workflow specification, subject to certain constraints on the assignment. The problem is NP-hard even when restricted to just not equal constraints. Since the number of steps k is relatively small in practice, Wang and Li (2010) [21] introduced a parametrisation of WSP by k. Wang and Li (2010) [21] showed that, in general, the WSP is W[1]-hard, i.e., it is unlikely that there exists a fixed-parameter tractable (FPT) algorithm for solving the WSP. Crampton et al. (2013) [10] and Cohen et al. (2014) [6] designed FPT algorithms of running time O⁎(2k) and O⁎(2klog2k) for the WSP with so-called regular and user-independent constraints, respectively. In this note, we show that there are no algorithms of running time O⁎(2ck) and O⁎(2cklog2k) for the two restrictions of WSP, respectively, with any c<1, unless the Strong Exponential Time Hypothesis fails. The Workflow Satisfiability Problem (WSP) asks whether there exists an assignment of authorized users to the steps in a workflow specification, subject to certain constraints on the assignment. The problem is NP-hard even when restricted to just not equal constraints. Since the number of steps k is relatively small in practice, Wang and Li (2010) [21] introduced a parametrisation of WSP by k. Wang and Li (2010) [21] showed that, in general, the WSP is W[1]-hard, i.e., it is unlikely that there exists a fixed-parameter tractable (FPT) algorithm for solving the WSP. Crampton et al. (2013) [10] and Cohen et al. (2014) [6] designed FPT algorithms of running time O*(2...) and O*(2...) for the WSP with so-called regular and user-independent constraints, respectively. In this note, we show that there are no algorithms of running time O*(2...) and O*(2...) for the two restrictions of WSP, respectively, with any c<1, unless the Strong Exponential Time Hypothesis fails. (ProQuest: ... denotes formulae/symbols omitted.) |
Author | Wahlström, Magnus Gutin, Gregory |
Author_xml | – sequence: 1 givenname: Gregory surname: Gutin fullname: Gutin, Gregory email: gutin@cs.rhul.ac.uk – sequence: 2 givenname: Magnus surname: Wahlström fullname: Wahlström, Magnus |
BookMark | eNp9kE1PxCAURYnRxPHjB7gjcd3Kg6EtcWWMX4mJJo5xSSilSu1ABUadfy86rly4IuTew3ucPbTtvDMIHQEpgUB1MpR2GktKgJcAJSHNFppBU9OiAhDbaEYIJQUBQXbRXowDIaSas3qGhoV9fkl49B8m4NavXBdx7wNOLwY_-fDa5wQ_qGRjb1VrR5vW-D74djRL3KpoOuzdT_khBe-e8cXnlBdzyaoRL-zS4Ov15HMebTxAO70aozn8PffR4-XF4vy6uL27ujk_uy00ozwVoidz0fOqEZS1naZCcVB1TTgYBVRwUc15w1ita9b2ptO66Vilc9blm6CU7aPjzbtT8G8rE5Mc_Cq4PFJCzStO8xiWW7Bp6eBjDKaXU7BLFdYSiPxWKgeZlcpvpRJAZqWZqf8w2qbsxrsUlB3_JU83pMkff7cmyKitcdp0NhidZOftP_QXShmUCw |
CODEN | IFPLAT |
CitedBy_id | crossref_primary_10_1109_TDSC_2022_3227241 crossref_primary_10_1177_18479790231224909 crossref_primary_10_1155_2021_3330923 crossref_primary_10_1016_j_artint_2017_01_005 crossref_primary_10_3233_JCS_16849 crossref_primary_10_1145_2988239 |
Cites_doi | 10.1145/300830.300837 10.1006/jcss.2000.1727 10.3233/JCS-140500 10.1613/jair.4435 10.1109/TKDE.2005.1 10.1145/501978.501979 10.1145/1880022.1880034 10.1145/2487222.2487226 10.1006/jcss.2001.1774 10.1109/2.485845 |
ContentType | Journal Article |
Copyright | 2015 Elsevier B.V. Copyright Elsevier Sequoia S.A. Mar 2016 |
Copyright_xml | – notice: 2015 Elsevier B.V. – notice: Copyright Elsevier Sequoia S.A. Mar 2016 |
DBID | AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
DOI | 10.1016/j.ipl.2015.11.008 |
DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1872-6119 |
EndPage | 226 |
ExternalDocumentID | 3920741641 10_1016_j_ipl_2015_11_008 S0020019015001921 |
Genre | Feature |
GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1RT 1~. 1~5 29I 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABEFU ABFNM ABFSI ABJNI ABMAC ABTAH ABXDB ABYKQ ACDAQ ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADJOM ADMUD AEBSH AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BKOJK BKOMP BLXMC CS3 DU5 E.L EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q G8K GBLVA GBOLZ HLZ HMJ HVGLF HZ~ IHE J1W KOM LG9 M26 M41 MO0 MS~ O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 R2- RIG ROL RPZ SBC SDF SDG SDP SES SEW SME SPC SPCBC SSV SSZ T5K TN5 UQL WH7 WUQ XPP ZMT ZY4 ~G- AATTM AAXKI AAYWO AAYXX ABDPE ABWVN ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AFXIZ AGCQF AGQPQ AGRNS AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP BNPGV CITATION SSH 7SC 8FD EFKBS JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c325t-9f049f568923bdc29a51a77051ea129596458337c73bfedcc8d36cea1dfed9223 |
IEDL.DBID | .~1 |
ISSN | 0020-0190 |
IngestDate | Fri Jul 25 06:13:35 EDT 2025 Tue Jul 01 02:26:54 EDT 2025 Thu Apr 24 23:10:43 EDT 2025 Fri Feb 23 02:16:27 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Keywords | Constraint satisfaction Fixed-parameter tractable Workflow Satisfiability Problem Strong Exponential Time Hypothesis Computational complexity |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c325t-9f049f568923bdc29a51a77051ea129596458337c73bfedcc8d36cea1dfed9223 |
Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 |
PQID | 1756523253 |
PQPubID | 45522 |
PageCount | 4 |
ParticipantIDs | proquest_journals_1756523253 crossref_primary_10_1016_j_ipl_2015_11_008 crossref_citationtrail_10_1016_j_ipl_2015_11_008 elsevier_sciencedirect_doi_10_1016_j_ipl_2015_11_008 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | March 2016 2016-03-00 20160301 |
PublicationDateYYYYMMDD | 2016-03-01 |
PublicationDate_xml | – month: 03 year: 2016 text: March 2016 |
PublicationDecade | 2010 |
PublicationPlace | Amsterdam |
PublicationPlace_xml | – name: Amsterdam |
PublicationTitle | Information processing letters |
PublicationYear | 2016 |
Publisher | Elsevier B.V Elsevier Sequoia S.A |
Publisher_xml | – name: Elsevier B.V – name: Elsevier Sequoia S.A |
References | Abboud, Williams (br0010) 2014 Basin, Burri, Karjoth (br0030) 2014; 22 Impagliazzo, Paturi, Zane (br0160) 2001; 63 ANSI INCITS 359-2004 for role based access control, American National Standards Institute, 2004. Wang, Li (br0210) 2010; 13 Cohen, Crampton, Gagarin, Gutin, Jones (br0070) 2015 Cygan, Dell, Lokshtanov, Marx, Nederlof, Okamoto, Paturi, Saurabh, Wahlström (br0110) 2012 Joshi, Bertino, Latif, Ghafoor (br0170) 2005; 17 Sandhu, Coyne, Feinstein, Youman (br0200) 1996; 29 Cygan, Fomin, Kowalik, Lokshtanov, Marx, Pilipczuk, Pilipczuk, Saurabh (br0120) 2015 Bertino, Bonatti, Ferrari (br0040) 2001; 4 Crampton, Gutin, Yeo (br0100) 2013; 16 Crampton (br0080) 2005 dos Santos, Ranise, Compagna, Ponta (br0130) 2015; vol. 9149 Downey, Fellows (br0140) 2013 Impagliazzo, Paturi (br0150) 2001; 62 Crampton, Gutin, Karapetyan (br0090) 2015 Karapetyan, Gagarin, Gutin (br0180) 2015; vol. 9130 Cohen, Crampton, Gagarin, Gutin, Jones (br0060) 2014; 51 Lokshtanov, Marx, Saurabh (br0190) 2011 Bertino, Ferrari, Atluri (br0050) 1999; 2 Impagliazzo (10.1016/j.ipl.2015.11.008_br0160) 2001; 63 Bertino (10.1016/j.ipl.2015.11.008_br0040) 2001; 4 Abboud (10.1016/j.ipl.2015.11.008_br0010) 2014 Cygan (10.1016/j.ipl.2015.11.008_br0110) 2012 Joshi (10.1016/j.ipl.2015.11.008_br0170) 2005; 17 Cohen (10.1016/j.ipl.2015.11.008_br0060) 2014; 51 Basin (10.1016/j.ipl.2015.11.008_br0030) 2014; 22 Karapetyan (10.1016/j.ipl.2015.11.008_br0180) 2015; vol. 9130 Bertino (10.1016/j.ipl.2015.11.008_br0050) 1999; 2 Crampton (10.1016/j.ipl.2015.11.008_br0100) 2013; 16 10.1016/j.ipl.2015.11.008_br0020 Impagliazzo (10.1016/j.ipl.2015.11.008_br0150) 2001; 62 Downey (10.1016/j.ipl.2015.11.008_br0140) 2013 Cohen (10.1016/j.ipl.2015.11.008_br0070) 2015 Crampton (10.1016/j.ipl.2015.11.008_br0080) 2005 Lokshtanov (10.1016/j.ipl.2015.11.008_br0190) 2011 Cygan (10.1016/j.ipl.2015.11.008_br0120) 2015 dos Santos (10.1016/j.ipl.2015.11.008_br0130) 2015; vol. 9149 Crampton (10.1016/j.ipl.2015.11.008_br0090) 2015 Sandhu (10.1016/j.ipl.2015.11.008_br0200) 1996; 29 Wang (10.1016/j.ipl.2015.11.008_br0210) 2010; 13 |
References_xml | – volume: vol. 9149 start-page: 85 year: 2015 end-page: 100 ident: br0130 article-title: Assisting the deployment of security-sensitive workflows by finding execution scenarios publication-title: Data and Applications Security and Privacy XXIX – volume: 17 start-page: 4 year: 2005 end-page: 23 ident: br0170 article-title: A generalized temporal role-based access control model publication-title: IEEE Trans. Knowl. Data Eng. – start-page: 3 year: 2015 end-page: 13 ident: br0090 article-title: Valued workflow satisfiability problem publication-title: Proceedings of the 20th ACM Symposium on Access Control Models and Technologies – volume: 13 start-page: 40 year: 2010 ident: br0210 article-title: Satisfiability and resiliency in workflow authorization systems publication-title: ACM Trans. Inf. Syst. Secur. – volume: 16 start-page: 4 year: 2013 ident: br0100 article-title: On the parameterized complexity and kernelization of the workflow satisfiability problem publication-title: ACM Trans. Inf. Syst. Secur. – volume: 4 start-page: 191 year: 2001 end-page: 233 ident: br0040 article-title: TRBAC: a temporal role-based access control model publication-title: ACM Trans. Inf. Syst. Secur. – volume: 22 start-page: 661 year: 2014 end-page: 698 ident: br0030 article-title: Obstruction-free authorization enforcement: aligning security and business objectives publication-title: J. Comput. Secur. – start-page: 74 year: 2012 end-page: 84 ident: br0110 article-title: On problems as hard as CNF-SAT publication-title: IEEE Conference on Computational Complexity – start-page: 777 year: 2011 end-page: 789 ident: br0190 article-title: Known algorithms on graphs on bounded treewidth are probably optimal publication-title: SODA '11 – year: 2015 ident: br0070 article-title: Algorithms for the workflow satisfiability problem engineered for counting constraints publication-title: J. Comb. Optim. – reference: ANSI INCITS 359-2004 for role based access control, American National Standards Institute, 2004. – volume: 2 start-page: 65 year: 1999 end-page: 104 ident: br0050 article-title: The specification and enforcement of authorization constraints in workflow management systems publication-title: ACM Trans. Inf. Syst. Secur. – year: 2013 ident: br0140 article-title: Fundamentals of Parameterized Complexity – volume: 63 start-page: 512 year: 2001 end-page: 530 ident: br0160 article-title: Which problems have strongly exponential complexity? publication-title: J. Comput. Syst. Sci. – start-page: 38 year: 2005 end-page: 47 ident: br0080 article-title: A reference monitor for workflow systems with constrained task execution publication-title: SACMAT – volume: vol. 9130 start-page: 138 year: 2015 end-page: 149 ident: br0180 article-title: Pattern backtracking algorithm for the workflow satisfiability problem with user-independent constraints publication-title: 9th International Frontiers of Algorithmics Workshop – year: 2015 ident: br0120 article-title: Parameterized Algorithms – volume: 29 start-page: 38 year: 1996 end-page: 47 ident: br0200 article-title: Role-based access control models publication-title: Computer – volume: 62 start-page: 367 year: 2001 end-page: 375 ident: br0150 article-title: On the complexity of publication-title: J. Comput. Syst. Sci. – start-page: 434 year: 2014 end-page: 443 ident: br0010 article-title: Popular conjectures imply strong lower bounds for dynamic problems publication-title: FOCS '14 – volume: 51 start-page: 555 year: 2014 end-page: 577 ident: br0060 article-title: Iterative plan construction for the workflow satisfiability problem publication-title: J. Artif. Intell. Res. – start-page: 74 year: 2012 ident: 10.1016/j.ipl.2015.11.008_br0110 article-title: On problems as hard as CNF-SAT – volume: vol. 9149 start-page: 85 year: 2015 ident: 10.1016/j.ipl.2015.11.008_br0130 article-title: Assisting the deployment of security-sensitive workflows by finding execution scenarios – volume: vol. 9130 start-page: 138 year: 2015 ident: 10.1016/j.ipl.2015.11.008_br0180 article-title: Pattern backtracking algorithm for the workflow satisfiability problem with user-independent constraints – volume: 2 start-page: 65 issue: 1 year: 1999 ident: 10.1016/j.ipl.2015.11.008_br0050 article-title: The specification and enforcement of authorization constraints in workflow management systems publication-title: ACM Trans. Inf. Syst. Secur. doi: 10.1145/300830.300837 – volume: 62 start-page: 367 issue: 2 year: 2001 ident: 10.1016/j.ipl.2015.11.008_br0150 article-title: On the complexity of k-SAT publication-title: J. Comput. Syst. Sci. doi: 10.1006/jcss.2000.1727 – volume: 22 start-page: 661 year: 2014 ident: 10.1016/j.ipl.2015.11.008_br0030 article-title: Obstruction-free authorization enforcement: aligning security and business objectives publication-title: J. Comput. Secur. doi: 10.3233/JCS-140500 – volume: 51 start-page: 555 year: 2014 ident: 10.1016/j.ipl.2015.11.008_br0060 article-title: Iterative plan construction for the workflow satisfiability problem publication-title: J. Artif. Intell. Res. doi: 10.1613/jair.4435 – start-page: 38 year: 2005 ident: 10.1016/j.ipl.2015.11.008_br0080 article-title: A reference monitor for workflow systems with constrained task execution – start-page: 777 year: 2011 ident: 10.1016/j.ipl.2015.11.008_br0190 article-title: Known algorithms on graphs on bounded treewidth are probably optimal – volume: 17 start-page: 4 issue: 1 year: 2005 ident: 10.1016/j.ipl.2015.11.008_br0170 article-title: A generalized temporal role-based access control model publication-title: IEEE Trans. Knowl. Data Eng. doi: 10.1109/TKDE.2005.1 – volume: 4 start-page: 191 issue: 3 year: 2001 ident: 10.1016/j.ipl.2015.11.008_br0040 article-title: TRBAC: a temporal role-based access control model publication-title: ACM Trans. Inf. Syst. Secur. doi: 10.1145/501978.501979 – start-page: 3 year: 2015 ident: 10.1016/j.ipl.2015.11.008_br0090 article-title: Valued workflow satisfiability problem – year: 2013 ident: 10.1016/j.ipl.2015.11.008_br0140 – year: 2015 ident: 10.1016/j.ipl.2015.11.008_br0120 – volume: 13 start-page: 40 issue: 4 year: 2010 ident: 10.1016/j.ipl.2015.11.008_br0210 article-title: Satisfiability and resiliency in workflow authorization systems publication-title: ACM Trans. Inf. Syst. Secur. doi: 10.1145/1880022.1880034 – volume: 16 start-page: 4 issue: 1 year: 2013 ident: 10.1016/j.ipl.2015.11.008_br0100 article-title: On the parameterized complexity and kernelization of the workflow satisfiability problem publication-title: ACM Trans. Inf. Syst. Secur. doi: 10.1145/2487222.2487226 – volume: 63 start-page: 512 issue: 4 year: 2001 ident: 10.1016/j.ipl.2015.11.008_br0160 article-title: Which problems have strongly exponential complexity? publication-title: J. Comput. Syst. Sci. doi: 10.1006/jcss.2001.1774 – start-page: 434 year: 2014 ident: 10.1016/j.ipl.2015.11.008_br0010 article-title: Popular conjectures imply strong lower bounds for dynamic problems – year: 2015 ident: 10.1016/j.ipl.2015.11.008_br0070 article-title: Algorithms for the workflow satisfiability problem engineered for counting constraints publication-title: J. Comb. Optim. – ident: 10.1016/j.ipl.2015.11.008_br0020 – volume: 29 start-page: 38 issue: 2 year: 1996 ident: 10.1016/j.ipl.2015.11.008_br0200 article-title: Role-based access control models publication-title: Computer doi: 10.1109/2.485845 |
SSID | ssj0006437 |
Score | 2.1765616 |
Snippet | •The Workflow Satisfiability Problem (WSP) is a problem used in access control.•The WSP is parameterized by the number of steps.•The WSP is considered for... The Workflow Satisfiability Problem (WSP) asks whether there exists an assignment of authorized users to the steps in a workflow specification, subject to... |
SourceID | proquest crossref elsevier |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 223 |
SubjectTerms | Algorithms Computational complexity Computer science Constraint satisfaction Fixed-parameter tractable Hypotheses Strong Exponential Time Hypothesis Studies Workflow Satisfiability Problem Workflow software |
Title | Tight lower bounds for the Workflow Satisfiability Problem based on the Strong Exponential Time Hypothesis |
URI | https://dx.doi.org/10.1016/j.ipl.2015.11.008 https://www.proquest.com/docview/1756523253 |
Volume | 116 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NS8MwFA9jXrz4LU7nyMGT0G1t-nkcY6MqDmEb7BaappGO0RU7wV38232vTSeK7OCxTdKUl4_3e8nvvUfIXYJRzhJAbixiYKCYpjSE6yDJMbGktJQtBBqKzxM3nNuPC2fRIMPaFwZplXrvr_b0crfWb3pamr08TdHHF_lApcmOOKX0YLc9jJ_f_fymeeDFVEXzQAJWsLvZLDleaY63D6bTxUCemGHyb930a5cuVc_4hBxpzEgH1W-dkkaSnZHjOh8D1cvznCxnaGnTFSY-owLzJRUUMCkFjEfxUFxBCZ2W7gxpFZ57S1-qhDIUtZmk66ysPMXz8Vc6-sjXGbKJoHN0FaHhNkeHrSItLsh8PJoNQ0PnUjBiZjkbI1BgCijH9QHQCRlbQeSYkefBkkwiUPlO4OIFKvNijwmVyDj2JXNjKJPwFACGuCTNDPq8ItS1EhHZygRLLbY9Zft9xYQnJWA3n0WBapF-LUUe60DjmO9ixWtG2ZKD4DkKHgwQDoJvkftdk7yKsrGvsl0PDf8xVThogX3N2vUwcr1OCw7gCWYmSIhd_--rN-QQntyKldYmzc3be3ILMGUjOuU87JCDwcNTOPkCZILnJQ |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELaqMsDCG1Eo4IEJKW0T5zmiqlWAtkJqK3WzYjtGqao0okWiC7-duzyKQIiBMbEdR-fHfWd_d0fIbYxRzmJAbixiYKCYpjKE6yDJMbaUsrQtBBqKw5EbTu3HmTOrkW7lC4O0ynLvL_b0fLcu37RLabazJEEfX-QD5SY74hQwgXZsh3k4tVsfXzwPvJkqeB7IwAq2V5s5ySvJ8PrBdFoYyRNTTP6unH5s07nu6R-S_RI00vviv45ILU6PyUGVkIGW6_OEzCdoatMFZj6jAhMmrSiAUgogj-KpuIYSOs79GZIiPveGPhcZZSiqM0WXaV55jAfkL7T3ni1TpBNB5-grQsNNhh5bq2R1Sqb93qQbGmUyBUMyy1kbgQZbQDuuD4hOKGkFkWNGngdrMo5A5zuBizeozJMeEzpWUvqKuRLKFDwFACLOSD2FPs8Jda1YRLY2wVSTtqdtv6OZ8JQC8OazKNAN0qmkyGUZaRwTXix4RSmbcxA8R8GDBcJB8A1yt22SFWE2_qpsV0PDv80VDmrgr2bNahh5uVBXHNATTE2QELv431dvyG44GQ744GH0dEn2oMQtKGpNUl-_vsVXgFnW4jqfk5_Rlei7 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Tight+lower+bounds+for+the+Workflow+Satisfiability+Problem+based+on+the+Strong+Exponential+Time+Hypothesis&rft.jtitle=Information+processing+letters&rft.au=Gutin%2C+Gregory&rft.au=Wahlstr%C3%B6m%2C+Magnus&rft.date=2016-03-01&rft.issn=0020-0190&rft.volume=116&rft.issue=3&rft.spage=223&rft.epage=226&rft_id=info:doi/10.1016%2Fj.ipl.2015.11.008&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_ipl_2015_11_008 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0020-0190&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0020-0190&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0020-0190&client=summon |