A Study of Work Flow Domain Authentication

نویسندگان

  • Anu Aravind
  • Anitha Sandeep
چکیده

The workflow scheme plays a vital role in the development of business partnerships. Different organizations are included in this cross-organizational work flow. The workflow structure uses the business cases which enables the business integration. To carry out the processes, different security measures have to be imparted which set off workflow signature throughout each task. It provide commercial work flow management platform and provide more importance to the ERP management. Keywords— Cross organizational; Digital Signature; Cryptography; Authentication; Cloud Computing

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose

FPGA platforms have been widely used in many modern digital applications due to their low prototyping cost, short time-to-market and flexibility. Field-programmability of FPGA bitstream has made it as a flexible and easy-to-use platform. However, access to bitstream degraded the security of FPGA IPs because there is no efficient method to authenticate the originality of bitstream by the FPGA pr...

متن کامل

Numerical Study of Coupled Fluid Flow and Heat Transfer in a Rectangular Domain at Moderate Reynolds Numbers using the Control Volume ‎Method

In this paper, we have used a control volume method to investigate the problem of a fully coupled fluid flow with heat transfer in a rectangular domain with slip wall boundary conditions. We have used this method to solve the governing equations and thereby to compute the convective and diffusive fluxes at the cell faces of the control volumes considered around the grid points of computational ...

متن کامل

Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns

The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...

متن کامل

Numerical Investigation of Island Effects on Depth Averaged Fluctuating Flow in the Persian Gulf

In the present paper simulation of tidal currents on three-dimensional geometry of the Persian Gulf is performed by the solution of the depth averaged hydrodynamics equations. The numerical solution was applied on two types of discritized simulation domain (Persian Gulf); with and without major islands. The hydrodynamic model utilized in this work is formed by equations of continuity and motion...

متن کامل

Rational Chebyshev Collocation approach in the solution of the axisymmetric stagnation flow on a circular cylinder

In this paper, a spectral collocation approach based on the rational Chebyshev functions for solving the axisymmetric stagnation point flow on an infinite stationary circular cylinder is suggested. The Navier-Stokes equations which govern the flow, are changed to a boundary value problem with a semi-infinite domain and a third-order nonlinear ordinary differential equation by applying proper si...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014