A Verification Mechanism for Secured Message Processing in Business Collaboration

نویسندگان

  • Haiyang Sun
  • Jian Yang
  • Xin Wang
  • Yanchun Zhang
چکیده

Message processing can become unsecured resulting in unreliable business collaboration in terms of authorization policy conflicts, for example, when (1) incorrect role assignment or modification occurs in a partner’s services or (2) messages transferred from one organization are processed by unqualified roles in other collaborating business participants. Therefore, verification mechanism based on access policies is critical for managing secured message processing in business collaboration. In this paper, we exploit a role authorization model, Role-Net, which is developed based on Hierarchical Colored Petri Nets (HCPNs) to specify and manage role authorization in business collaboration. A property named Role Authorization Based Dead Marking Freeness is defined based on Role-Net to verify business collaboration reliability according to partners’ authorization policies. An algebraic verification method for secured message processing is introduced as well.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

University-Industry Collaboration (UIC) for Developing Highly Skilled and Productive Business Graduates in Bangladesh

University-Industry Collaboration (UIC) creates highly skilled and productive business graduates for meeting demand of industry, globalization, knowledge economy, and job market at home and abroad. In coping with ongoing acute competitive pressures of the information edge, higher education curricula of business needs to be intellectually planned, through collaboration between university and ind...

متن کامل

Exponentiated Multiple Message Communication using Certificateless Signcryption for Mobile Network Security

The rapid progress in the internet requires multiple message communication over the wider area to improve the mobile network security. Due to the multiple message communication, the security is a most important concern in mobile network. The bilinear Certificate less Aggregate Signcryption Scheme guarantees the security under several attacks, and therefore provides security and non-repudiation....

متن کامل

A Temporal-Rule Based Verification System for Business Collaboration Reliability

Based on the temporal rules defined for the business processe participating in a business collaboration, we present an implementation for a system called TiCoBTS to verify the reliability of the business collaboration.

متن کامل

From Process Models to Business Process Architectures: Connecting the Layers

Business process management has become a standard commodity to manage and improve business operations in organisations. Large process model collections emerged. Managing, and maintaining them has become a major area of research. Business process architectures (BPAs) have been introduced to support this task focusing on interdependencies between processes. Both the process and BPA layer are ofte...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009