DocumentCode :
599422
Title :
Smart authentication for real-time business process monitoring
Author :
AlMahmoud, A. ; Colombo, Maurizio ; Chan Yeob Yeun ; Al-Muhairi, H.
Author_Institution :
ETISALAT BT Innovation Center (EBTIC), Khalifa Univ., Sharjah, United Arab Emirates
fYear :
2012
fDate :
10-12 Dec. 2012
Firstpage :
253
Lastpage :
258
Abstract :
Tools that analyse critical business activities such as Business Process Monitoring (BPM) or Business Activity Monitoring (BAM) have been utilised in enterprise operations successfully over the past few years. However, with the increasing demand for more up-to-date information and analysis, real time process and event monitoring are becoming increasingly important. But monitoring business processes in real time introduces new security risks and challenges, due to the fact that monitoring sessions have to be open for very long durations and also due to the unpredictability of when business processes changes and updates take place. While an easy answer to securing such communications would be to increase the encryption key size or regularly updating it with new one, these approaches can have significant downsides. For example, negative performance impacts can occur due to renegotiation delaying important real time monitoring or wasting resources maintaining secure communications and keys through long periods of inactivity. For these reasons, this work proposes a system that would renew the key, without stopping for negotiation, secret information exchanging or the need for timer synchronizations, as well as providing security services necessary for real time BPM and other real time applications.
Keywords :
business process re-engineering; cryptography; message authentication; process monitoring; risk management; BAM; BPM; business activity monitoring; critical business activities; encryption key size; enterprise operations; event monitoring; real-time business process monitoring; security risks; security services; smart authentication; Authentication; Business; Cryptography; Monitoring; Real-time systems; Servers; Authentication; Kerberos; Key Derivation Function; Real Time Business Process Monitoring;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Internet Technology And Secured Transactions, 2012 International Conference for
Conference_Location :
London
Print_ISBN :
978-1-4673-5325-0
Type :
conf
Filename :
6470954
Link To Document :
بازگشت