Design Security for Internet-Based Workflow Management Systems Adopting Security Agents

نویسنده

  • Myeonggil Choi
چکیده

With the expansion of WFMS(workflow management systems) across the Internet, collaboration among enterprises increase. The security problems of Intranet-based WFMS, which is operated on Intranet, are critical, and the effectiveness of Internet-Based WFMSs is deeply influenced by security. For the security of Internet-Based WFMSs, this study introduces the Login Agent, the Security Agent, and Task Agents and presents the flexible security policy and security mechanisms. This paper analyzes security requirements for the Internet-Based WFMSs. Based on the security requirements, this study suggests the security architecture and security mechanisms for the Internet-Based WFMSs. Key-Words: Internet-based workflow management system, Security, Agent, Security requirements, Architecture, Security Mechanisms

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Internet Based Virtual Trading Communities

Today, we face a growing interest in distributed businessto-business applications using the Internet as communication media. However, the involved security threats are often neglected in the design of such systems. In this paper, we present our security architecture for an Internet based virtual trading community. Our solution has been designed for an heterogeneous, distributed workflow managem...

متن کامل

A Model for Security in Agent-based Workflows

Introduction Workflow environments have hugely benefited from the technical advancements made available by the Internet over the last years. Many workflow environments today are implemented over public networks such as the Internet. Because workflow environments in most situations represent the “bread-andbutter” of a company, the implementation thereof has raised serious information security pr...

متن کامل

On Secure Workflow Decentralisation on the Internet

Decentralised workflow management systems are a new research area, where most work to-date has focused on the system’s overall architecture. As little attention has been given to the security aspects in such systems, we follow a security driven approach, and consider, from the perspective of available security building blocks, how security can be implemented and what new opportunities are prese...

متن کامل

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

Internet Security: A Novel Role/Object-Based Access Control for Digital Libraries

Internet-based, real-world applications require appropriate security mechanisms, because potentially millions of users and their agents (or subjects) will access billions of objects of information content in complex workflow processes (e.g., commerce, learning, and healthcare). Security is one of the strategic technologies that will increase the value and utility of the Internet and Internet-ba...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004