Tight lower bounds for the Workflow Satisfiability Problem based on the Strong Exponential Time Hypothesis

•The Workflow Satisfiability Problem (WSP) is a problem used in access control.•The WSP is parameterized by the number of steps.•The WSP is considered for regular and user-independent constraints.•Tight lower bounds are proved for WSP algorithms with the two types of constraints. The Workflow Satisf...

Full description

Saved in:
Bibliographic Details
Published inInformation processing letters Vol. 116; no. 3; pp. 223 - 226
Main Authors Gutin, Gregory, Wahlström, Magnus
Format Journal Article
LanguageEnglish
Published Amsterdam Elsevier B.V 01.03.2016
Elsevier Sequoia S.A
Subjects
Online AccessGet full text
ISSN0020-0190
1872-6119
DOI10.1016/j.ipl.2015.11.008

Cover

Loading…
Abstract •The Workflow Satisfiability Problem (WSP) is a problem used in access control.•The WSP is parameterized by the number of steps.•The WSP is considered for regular and user-independent constraints.•Tight lower bounds are proved for WSP algorithms with the two types of constraints. The Workflow Satisfiability Problem (WSP) asks whether there exists an assignment of authorized users to the steps in a workflow specification, subject to certain constraints on the assignment. The problem is NP-hard even when restricted to just not equal constraints. Since the number of steps k is relatively small in practice, Wang and Li (2010) [21] introduced a parametrisation of WSP by k. Wang and Li (2010) [21] showed that, in general, the WSP is W[1]-hard, i.e., it is unlikely that there exists a fixed-parameter tractable (FPT) algorithm for solving the WSP. Crampton et al. (2013) [10] and Cohen et al. (2014) [6] designed FPT algorithms of running time O⁎(2k) and O⁎(2klog2⁡k) for the WSP with so-called regular and user-independent constraints, respectively. In this note, we show that there are no algorithms of running time O⁎(2ck) and O⁎(2cklog2⁡k) for the two restrictions of WSP, respectively, with any c<1, unless the Strong Exponential Time Hypothesis fails.
AbstractList •The Workflow Satisfiability Problem (WSP) is a problem used in access control.•The WSP is parameterized by the number of steps.•The WSP is considered for regular and user-independent constraints.•Tight lower bounds are proved for WSP algorithms with the two types of constraints. The Workflow Satisfiability Problem (WSP) asks whether there exists an assignment of authorized users to the steps in a workflow specification, subject to certain constraints on the assignment. The problem is NP-hard even when restricted to just not equal constraints. Since the number of steps k is relatively small in practice, Wang and Li (2010) [21] introduced a parametrisation of WSP by k. Wang and Li (2010) [21] showed that, in general, the WSP is W[1]-hard, i.e., it is unlikely that there exists a fixed-parameter tractable (FPT) algorithm for solving the WSP. Crampton et al. (2013) [10] and Cohen et al. (2014) [6] designed FPT algorithms of running time O⁎(2k) and O⁎(2klog2⁡k) for the WSP with so-called regular and user-independent constraints, respectively. In this note, we show that there are no algorithms of running time O⁎(2ck) and O⁎(2cklog2⁡k) for the two restrictions of WSP, respectively, with any c<1, unless the Strong Exponential Time Hypothesis fails.
The Workflow Satisfiability Problem (WSP) asks whether there exists an assignment of authorized users to the steps in a workflow specification, subject to certain constraints on the assignment. The problem is NP-hard even when restricted to just not equal constraints. Since the number of steps k is relatively small in practice, Wang and Li (2010) [21] introduced a parametrisation of WSP by k. Wang and Li (2010) [21] showed that, in general, the WSP is W[1]-hard, i.e., it is unlikely that there exists a fixed-parameter tractable (FPT) algorithm for solving the WSP. Crampton et al. (2013) [10] and Cohen et al. (2014) [6] designed FPT algorithms of running time O*(2...) and O*(2...) for the WSP with so-called regular and user-independent constraints, respectively. In this note, we show that there are no algorithms of running time O*(2...) and O*(2...) for the two restrictions of WSP, respectively, with any c<1, unless the Strong Exponential Time Hypothesis fails. (ProQuest: ... denotes formulae/symbols omitted.)
Author Wahlström, Magnus
Gutin, Gregory
Author_xml – sequence: 1
  givenname: Gregory
  surname: Gutin
  fullname: Gutin, Gregory
  email: gutin@cs.rhul.ac.uk
– sequence: 2
  givenname: Magnus
  surname: Wahlström
  fullname: Wahlström, Magnus
BookMark eNp9kE1PxCAURYnRxPHjB7gjcd3Kg6EtcWWMX4mJJo5xSSilSu1ABUadfy86rly4IuTew3ucPbTtvDMIHQEpgUB1MpR2GktKgJcAJSHNFppBU9OiAhDbaEYIJQUBQXbRXowDIaSas3qGhoV9fkl49B8m4NavXBdx7wNOLwY_-fDa5wQ_qGRjb1VrR5vW-D74djRL3KpoOuzdT_khBe-e8cXnlBdzyaoRL-zS4Ov15HMebTxAO70aozn8PffR4-XF4vy6uL27ujk_uy00ozwVoidz0fOqEZS1naZCcVB1TTgYBVRwUc15w1ita9b2ptO66Vilc9blm6CU7aPjzbtT8G8rE5Mc_Cq4PFJCzStO8xiWW7Bp6eBjDKaXU7BLFdYSiPxWKgeZlcpvpRJAZqWZqf8w2qbsxrsUlB3_JU83pMkff7cmyKitcdp0NhidZOftP_QXShmUCw
CODEN IFPLAT
CitedBy_id crossref_primary_10_1109_TDSC_2022_3227241
crossref_primary_10_1177_18479790231224909
crossref_primary_10_1155_2021_3330923
crossref_primary_10_1016_j_artint_2017_01_005
crossref_primary_10_3233_JCS_16849
crossref_primary_10_1145_2988239
Cites_doi 10.1145/300830.300837
10.1006/jcss.2000.1727
10.3233/JCS-140500
10.1613/jair.4435
10.1109/TKDE.2005.1
10.1145/501978.501979
10.1145/1880022.1880034
10.1145/2487222.2487226
10.1006/jcss.2001.1774
10.1109/2.485845
ContentType Journal Article
Copyright 2015 Elsevier B.V.
Copyright Elsevier Sequoia S.A. Mar 2016
Copyright_xml – notice: 2015 Elsevier B.V.
– notice: Copyright Elsevier Sequoia S.A. Mar 2016
DBID AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1016/j.ipl.2015.11.008
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Computer and Information Systems Abstracts
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1872-6119
EndPage 226
ExternalDocumentID 3920741641
10_1016_j_ipl_2015_11_008
S0020019015001921
Genre Feature
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1RT
1~.
1~5
29I
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABEFU
ABFNM
ABFSI
ABJNI
ABMAC
ABTAH
ABXDB
ABYKQ
ACDAQ
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADJOM
ADMUD
AEBSH
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BKOJK
BKOMP
BLXMC
CS3
DU5
E.L
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
G8K
GBLVA
GBOLZ
HLZ
HMJ
HVGLF
HZ~
IHE
J1W
KOM
LG9
M26
M41
MO0
MS~
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
Q38
R2-
RIG
ROL
RPZ
SBC
SDF
SDG
SDP
SES
SEW
SME
SPC
SPCBC
SSV
SSZ
T5K
TN5
UQL
WH7
WUQ
XPP
ZMT
ZY4
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABDPE
ABWVN
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AFXIZ
AGCQF
AGQPQ
AGRNS
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
BNPGV
CITATION
SSH
7SC
8FD
EFKBS
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c325t-9f049f568923bdc29a51a77051ea129596458337c73bfedcc8d36cea1dfed9223
IEDL.DBID .~1
ISSN 0020-0190
IngestDate Fri Jul 25 06:13:35 EDT 2025
Tue Jul 01 02:26:54 EDT 2025
Thu Apr 24 23:10:43 EDT 2025
Fri Feb 23 02:16:27 EST 2024
IsPeerReviewed true
IsScholarly true
Issue 3
Keywords Constraint satisfaction
Fixed-parameter tractable
Workflow Satisfiability Problem
Strong Exponential Time Hypothesis
Computational complexity
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c325t-9f049f568923bdc29a51a77051ea129596458337c73bfedcc8d36cea1dfed9223
Notes SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
PQID 1756523253
PQPubID 45522
PageCount 4
ParticipantIDs proquest_journals_1756523253
crossref_primary_10_1016_j_ipl_2015_11_008
crossref_citationtrail_10_1016_j_ipl_2015_11_008
elsevier_sciencedirect_doi_10_1016_j_ipl_2015_11_008
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate March 2016
2016-03-00
20160301
PublicationDateYYYYMMDD 2016-03-01
PublicationDate_xml – month: 03
  year: 2016
  text: March 2016
PublicationDecade 2010
PublicationPlace Amsterdam
PublicationPlace_xml – name: Amsterdam
PublicationTitle Information processing letters
PublicationYear 2016
Publisher Elsevier B.V
Elsevier Sequoia S.A
Publisher_xml – name: Elsevier B.V
– name: Elsevier Sequoia S.A
References Abboud, Williams (br0010) 2014
Basin, Burri, Karjoth (br0030) 2014; 22
Impagliazzo, Paturi, Zane (br0160) 2001; 63
ANSI INCITS 359-2004 for role based access control, American National Standards Institute, 2004.
Wang, Li (br0210) 2010; 13
Cohen, Crampton, Gagarin, Gutin, Jones (br0070) 2015
Cygan, Dell, Lokshtanov, Marx, Nederlof, Okamoto, Paturi, Saurabh, Wahlström (br0110) 2012
Joshi, Bertino, Latif, Ghafoor (br0170) 2005; 17
Sandhu, Coyne, Feinstein, Youman (br0200) 1996; 29
Cygan, Fomin, Kowalik, Lokshtanov, Marx, Pilipczuk, Pilipczuk, Saurabh (br0120) 2015
Bertino, Bonatti, Ferrari (br0040) 2001; 4
Crampton, Gutin, Yeo (br0100) 2013; 16
Crampton (br0080) 2005
dos Santos, Ranise, Compagna, Ponta (br0130) 2015; vol. 9149
Downey, Fellows (br0140) 2013
Impagliazzo, Paturi (br0150) 2001; 62
Crampton, Gutin, Karapetyan (br0090) 2015
Karapetyan, Gagarin, Gutin (br0180) 2015; vol. 9130
Cohen, Crampton, Gagarin, Gutin, Jones (br0060) 2014; 51
Lokshtanov, Marx, Saurabh (br0190) 2011
Bertino, Ferrari, Atluri (br0050) 1999; 2
Impagliazzo (10.1016/j.ipl.2015.11.008_br0160) 2001; 63
Bertino (10.1016/j.ipl.2015.11.008_br0040) 2001; 4
Abboud (10.1016/j.ipl.2015.11.008_br0010) 2014
Cygan (10.1016/j.ipl.2015.11.008_br0110) 2012
Joshi (10.1016/j.ipl.2015.11.008_br0170) 2005; 17
Cohen (10.1016/j.ipl.2015.11.008_br0060) 2014; 51
Basin (10.1016/j.ipl.2015.11.008_br0030) 2014; 22
Karapetyan (10.1016/j.ipl.2015.11.008_br0180) 2015; vol. 9130
Bertino (10.1016/j.ipl.2015.11.008_br0050) 1999; 2
Crampton (10.1016/j.ipl.2015.11.008_br0100) 2013; 16
10.1016/j.ipl.2015.11.008_br0020
Impagliazzo (10.1016/j.ipl.2015.11.008_br0150) 2001; 62
Downey (10.1016/j.ipl.2015.11.008_br0140) 2013
Cohen (10.1016/j.ipl.2015.11.008_br0070) 2015
Crampton (10.1016/j.ipl.2015.11.008_br0080) 2005
Lokshtanov (10.1016/j.ipl.2015.11.008_br0190) 2011
Cygan (10.1016/j.ipl.2015.11.008_br0120) 2015
dos Santos (10.1016/j.ipl.2015.11.008_br0130) 2015; vol. 9149
Crampton (10.1016/j.ipl.2015.11.008_br0090) 2015
Sandhu (10.1016/j.ipl.2015.11.008_br0200) 1996; 29
Wang (10.1016/j.ipl.2015.11.008_br0210) 2010; 13
References_xml – volume: vol. 9149
  start-page: 85
  year: 2015
  end-page: 100
  ident: br0130
  article-title: Assisting the deployment of security-sensitive workflows by finding execution scenarios
  publication-title: Data and Applications Security and Privacy XXIX
– volume: 17
  start-page: 4
  year: 2005
  end-page: 23
  ident: br0170
  article-title: A generalized temporal role-based access control model
  publication-title: IEEE Trans. Knowl. Data Eng.
– start-page: 3
  year: 2015
  end-page: 13
  ident: br0090
  article-title: Valued workflow satisfiability problem
  publication-title: Proceedings of the 20th ACM Symposium on Access Control Models and Technologies
– volume: 13
  start-page: 40
  year: 2010
  ident: br0210
  article-title: Satisfiability and resiliency in workflow authorization systems
  publication-title: ACM Trans. Inf. Syst. Secur.
– volume: 16
  start-page: 4
  year: 2013
  ident: br0100
  article-title: On the parameterized complexity and kernelization of the workflow satisfiability problem
  publication-title: ACM Trans. Inf. Syst. Secur.
– volume: 4
  start-page: 191
  year: 2001
  end-page: 233
  ident: br0040
  article-title: TRBAC: a temporal role-based access control model
  publication-title: ACM Trans. Inf. Syst. Secur.
– volume: 22
  start-page: 661
  year: 2014
  end-page: 698
  ident: br0030
  article-title: Obstruction-free authorization enforcement: aligning security and business objectives
  publication-title: J. Comput. Secur.
– start-page: 74
  year: 2012
  end-page: 84
  ident: br0110
  article-title: On problems as hard as CNF-SAT
  publication-title: IEEE Conference on Computational Complexity
– start-page: 777
  year: 2011
  end-page: 789
  ident: br0190
  article-title: Known algorithms on graphs on bounded treewidth are probably optimal
  publication-title: SODA '11
– year: 2015
  ident: br0070
  article-title: Algorithms for the workflow satisfiability problem engineered for counting constraints
  publication-title: J. Comb. Optim.
– reference: ANSI INCITS 359-2004 for role based access control, American National Standards Institute, 2004.
– volume: 2
  start-page: 65
  year: 1999
  end-page: 104
  ident: br0050
  article-title: The specification and enforcement of authorization constraints in workflow management systems
  publication-title: ACM Trans. Inf. Syst. Secur.
– year: 2013
  ident: br0140
  article-title: Fundamentals of Parameterized Complexity
– volume: 63
  start-page: 512
  year: 2001
  end-page: 530
  ident: br0160
  article-title: Which problems have strongly exponential complexity?
  publication-title: J. Comput. Syst. Sci.
– start-page: 38
  year: 2005
  end-page: 47
  ident: br0080
  article-title: A reference monitor for workflow systems with constrained task execution
  publication-title: SACMAT
– volume: vol. 9130
  start-page: 138
  year: 2015
  end-page: 149
  ident: br0180
  article-title: Pattern backtracking algorithm for the workflow satisfiability problem with user-independent constraints
  publication-title: 9th International Frontiers of Algorithmics Workshop
– year: 2015
  ident: br0120
  article-title: Parameterized Algorithms
– volume: 29
  start-page: 38
  year: 1996
  end-page: 47
  ident: br0200
  article-title: Role-based access control models
  publication-title: Computer
– volume: 62
  start-page: 367
  year: 2001
  end-page: 375
  ident: br0150
  article-title: On the complexity of
  publication-title: J. Comput. Syst. Sci.
– start-page: 434
  year: 2014
  end-page: 443
  ident: br0010
  article-title: Popular conjectures imply strong lower bounds for dynamic problems
  publication-title: FOCS '14
– volume: 51
  start-page: 555
  year: 2014
  end-page: 577
  ident: br0060
  article-title: Iterative plan construction for the workflow satisfiability problem
  publication-title: J. Artif. Intell. Res.
– start-page: 74
  year: 2012
  ident: 10.1016/j.ipl.2015.11.008_br0110
  article-title: On problems as hard as CNF-SAT
– volume: vol. 9149
  start-page: 85
  year: 2015
  ident: 10.1016/j.ipl.2015.11.008_br0130
  article-title: Assisting the deployment of security-sensitive workflows by finding execution scenarios
– volume: vol. 9130
  start-page: 138
  year: 2015
  ident: 10.1016/j.ipl.2015.11.008_br0180
  article-title: Pattern backtracking algorithm for the workflow satisfiability problem with user-independent constraints
– volume: 2
  start-page: 65
  issue: 1
  year: 1999
  ident: 10.1016/j.ipl.2015.11.008_br0050
  article-title: The specification and enforcement of authorization constraints in workflow management systems
  publication-title: ACM Trans. Inf. Syst. Secur.
  doi: 10.1145/300830.300837
– volume: 62
  start-page: 367
  issue: 2
  year: 2001
  ident: 10.1016/j.ipl.2015.11.008_br0150
  article-title: On the complexity of k-SAT
  publication-title: J. Comput. Syst. Sci.
  doi: 10.1006/jcss.2000.1727
– volume: 22
  start-page: 661
  year: 2014
  ident: 10.1016/j.ipl.2015.11.008_br0030
  article-title: Obstruction-free authorization enforcement: aligning security and business objectives
  publication-title: J. Comput. Secur.
  doi: 10.3233/JCS-140500
– volume: 51
  start-page: 555
  year: 2014
  ident: 10.1016/j.ipl.2015.11.008_br0060
  article-title: Iterative plan construction for the workflow satisfiability problem
  publication-title: J. Artif. Intell. Res.
  doi: 10.1613/jair.4435
– start-page: 38
  year: 2005
  ident: 10.1016/j.ipl.2015.11.008_br0080
  article-title: A reference monitor for workflow systems with constrained task execution
– start-page: 777
  year: 2011
  ident: 10.1016/j.ipl.2015.11.008_br0190
  article-title: Known algorithms on graphs on bounded treewidth are probably optimal
– volume: 17
  start-page: 4
  issue: 1
  year: 2005
  ident: 10.1016/j.ipl.2015.11.008_br0170
  article-title: A generalized temporal role-based access control model
  publication-title: IEEE Trans. Knowl. Data Eng.
  doi: 10.1109/TKDE.2005.1
– volume: 4
  start-page: 191
  issue: 3
  year: 2001
  ident: 10.1016/j.ipl.2015.11.008_br0040
  article-title: TRBAC: a temporal role-based access control model
  publication-title: ACM Trans. Inf. Syst. Secur.
  doi: 10.1145/501978.501979
– start-page: 3
  year: 2015
  ident: 10.1016/j.ipl.2015.11.008_br0090
  article-title: Valued workflow satisfiability problem
– year: 2013
  ident: 10.1016/j.ipl.2015.11.008_br0140
– year: 2015
  ident: 10.1016/j.ipl.2015.11.008_br0120
– volume: 13
  start-page: 40
  issue: 4
  year: 2010
  ident: 10.1016/j.ipl.2015.11.008_br0210
  article-title: Satisfiability and resiliency in workflow authorization systems
  publication-title: ACM Trans. Inf. Syst. Secur.
  doi: 10.1145/1880022.1880034
– volume: 16
  start-page: 4
  issue: 1
  year: 2013
  ident: 10.1016/j.ipl.2015.11.008_br0100
  article-title: On the parameterized complexity and kernelization of the workflow satisfiability problem
  publication-title: ACM Trans. Inf. Syst. Secur.
  doi: 10.1145/2487222.2487226
– volume: 63
  start-page: 512
  issue: 4
  year: 2001
  ident: 10.1016/j.ipl.2015.11.008_br0160
  article-title: Which problems have strongly exponential complexity?
  publication-title: J. Comput. Syst. Sci.
  doi: 10.1006/jcss.2001.1774
– start-page: 434
  year: 2014
  ident: 10.1016/j.ipl.2015.11.008_br0010
  article-title: Popular conjectures imply strong lower bounds for dynamic problems
– year: 2015
  ident: 10.1016/j.ipl.2015.11.008_br0070
  article-title: Algorithms for the workflow satisfiability problem engineered for counting constraints
  publication-title: J. Comb. Optim.
– ident: 10.1016/j.ipl.2015.11.008_br0020
– volume: 29
  start-page: 38
  issue: 2
  year: 1996
  ident: 10.1016/j.ipl.2015.11.008_br0200
  article-title: Role-based access control models
  publication-title: Computer
  doi: 10.1109/2.485845
SSID ssj0006437
Score 2.1765616
Snippet •The Workflow Satisfiability Problem (WSP) is a problem used in access control.•The WSP is parameterized by the number of steps.•The WSP is considered for...
The Workflow Satisfiability Problem (WSP) asks whether there exists an assignment of authorized users to the steps in a workflow specification, subject to...
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 223
SubjectTerms Algorithms
Computational complexity
Computer science
Constraint satisfaction
Fixed-parameter tractable
Hypotheses
Strong Exponential Time Hypothesis
Studies
Workflow Satisfiability Problem
Workflow software
Title Tight lower bounds for the Workflow Satisfiability Problem based on the Strong Exponential Time Hypothesis
URI https://dx.doi.org/10.1016/j.ipl.2015.11.008
https://www.proquest.com/docview/1756523253
Volume 116
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NS8MwFA9jXrz4LU7nyMGT0G1t-nkcY6MqDmEb7BaappGO0RU7wV38232vTSeK7OCxTdKUl4_3e8nvvUfIXYJRzhJAbixiYKCYpjSE6yDJMbGktJQtBBqKzxM3nNuPC2fRIMPaFwZplXrvr_b0crfWb3pamr08TdHHF_lApcmOOKX0YLc9jJ_f_fymeeDFVEXzQAJWsLvZLDleaY63D6bTxUCemGHyb930a5cuVc_4hBxpzEgH1W-dkkaSnZHjOh8D1cvznCxnaGnTFSY-owLzJRUUMCkFjEfxUFxBCZ2W7gxpFZ57S1-qhDIUtZmk66ysPMXz8Vc6-sjXGbKJoHN0FaHhNkeHrSItLsh8PJoNQ0PnUjBiZjkbI1BgCijH9QHQCRlbQeSYkefBkkwiUPlO4OIFKvNijwmVyDj2JXNjKJPwFACGuCTNDPq8ItS1EhHZygRLLbY9Zft9xYQnJWA3n0WBapF-LUUe60DjmO9ixWtG2ZKD4DkKHgwQDoJvkftdk7yKsrGvsl0PDf8xVThogX3N2vUwcr1OCw7gCWYmSIhd_--rN-QQntyKldYmzc3be3ILMGUjOuU87JCDwcNTOPkCZILnJQ
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELaqMsDCG1Eo4IEJKW0T5zmiqlWAtkJqK3WzYjtGqao0okWiC7-duzyKQIiBMbEdR-fHfWd_d0fIbYxRzmJAbixiYKCYpjKE6yDJMbaUsrQtBBqKw5EbTu3HmTOrkW7lC4O0ynLvL_b0fLcu37RLabazJEEfX-QD5SY74hQwgXZsh3k4tVsfXzwPvJkqeB7IwAq2V5s5ySvJ8PrBdFoYyRNTTP6unH5s07nu6R-S_RI00vviv45ILU6PyUGVkIGW6_OEzCdoatMFZj6jAhMmrSiAUgogj-KpuIYSOs79GZIiPveGPhcZZSiqM0WXaV55jAfkL7T3ni1TpBNB5-grQsNNhh5bq2R1Sqb93qQbGmUyBUMyy1kbgQZbQDuuD4hOKGkFkWNGngdrMo5A5zuBizeozJMeEzpWUvqKuRLKFDwFACLOSD2FPs8Jda1YRLY2wVSTtqdtv6OZ8JQC8OazKNAN0qmkyGUZaRwTXix4RSmbcxA8R8GDBcJB8A1yt22SFWE2_qpsV0PDv80VDmrgr2bNahh5uVBXHNATTE2QELv431dvyG44GQ744GH0dEn2oMQtKGpNUl-_vsVXgFnW4jqfk5_Rlei7
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Tight+lower+bounds+for+the+Workflow+Satisfiability+Problem+based+on+the+Strong+Exponential+Time+Hypothesis&rft.jtitle=Information+processing+letters&rft.au=Gutin%2C+Gregory&rft.au=Wahlstr%C3%B6m%2C+Magnus&rft.date=2016-03-01&rft.issn=0020-0190&rft.volume=116&rft.issue=3&rft.spage=223&rft.epage=226&rft_id=info:doi/10.1016%2Fj.ipl.2015.11.008&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_ipl_2015_11_008
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0020-0190&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0020-0190&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0020-0190&client=summon