A Chameleon Hash-based Method for Proving Execution of Business Processes
نویسندگان
چکیده
Remote work is becoming common for many companies due to the impact of COVID-19 pandemic. Companies need be able operate every business process with high reliability, even in circumstances where lack direct conversation or cross-checking makes it difficult confirm verify works have been done correctly. In recent years, cloud-based electronic contract services emerged, and by executing processes accordance workflows cloud, possible prove execution a remote environment. However, when person uses service that signs digitally without his/her own signature key, there problem associated reliability; nobody can really executed based on person's intention. One way solve apply principal-signing client-side trivial digital scheme. these do not provide proof pre-assigned members. this paper we propose chameleon hash-based method proving processes. This very easy verifier series workflow, including identity authentication, document edits approval, “the principals who are designated advance”. addition, since principal has intention editing document, show authenticity interpretation Act Electronic Signatures Certification Business. We developed prototype system implemented method. confirmed compute proposed at speed burdening PC during documents our daily works, easily
منابع مشابه
Identity-Based Chameleon Hash and Applications
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chameleon signatures is that their are non-transferable, with only the designated recipient capable of asserting its validity. In this paper, we introduce the first identity-based chameleon hash function. The general advanta...
متن کاملAn Execution Engine for Semantic Business Processes
In this paper we present the architecture and design of an extended BPEL engine that implements the operational semantics of BPEL4SWS. BPEL4SWS is an extension of the BPEL language with support for Semantic Web Service concepts like mediation and semantic descriptions of activity implementations. We describe the basic communication scenarios of processes with services and the interaction betwee...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
A Development Method for Ontology Based Business Processes
In this paper we show our development method for executable ontology based business processes. The main goal is the reusable, automatic generation of workflows based on ontologies derived from business process models. In our methodology the focus is given to the mapping the conceptual models to ontology models by using meta-modeling approach. In our proposed approach we establish the links betw...
متن کاملOptimized Execution of Business Processes on Blockchain
Blockchain technology enables the execution of collaborative business processes involving untrusted parties without requiring a central authority. Speci cally, a process model comprising tasks performed by multiple parties can be coordinated via smart contracts operating on the blockchain. The consensus mechanism governing the blockchain thereby guarantees that the process model is followed by ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of information processing
سال: 2022
ISSN: ['0387-6101']
DOI: https://doi.org/10.2197/ipsjjip.30.613