Secure communication protocol for real-time business process monitoring

Abdelrahman Almahmoud, Maurizio Colombo, Chan Yeob Yeun, Hassan Al-Muhairi

Research output: Contribution to journalArticlepeer-review

Abstract

The need for real-time information about business process, event monitoring and fault detection has pushed business process monitoring (BPM) tools to be improved for real-time analysis. However, such functionality introduces new challenges in providing both security and optimal performance. Such challenges are mainly due to the nature of the communication between these tools and its users, such as long durations of monitoring and the asynchronous nature of the communication. A standard solution that is used by many vendors is to provide sequential key derivation, or use long encryption keys. But, these solutions have a negative impact on the performance and response time. Furthermore, it is not optimised for these applications, thus wastes resources on key renegotiation and creation. These issues were the motivation behind the development of a security solution aimed to address the inefficiency and to better manage resources in a way that would not heavenly impact performance.

Original languageBritish English
Pages (from-to)223-239
Number of pages17
JournalInternational Journal of Internet Technology and Secured Transactions
Volume5
Issue number3
DOIs
StatePublished - 2014

Keywords

  • Authentication
  • Internet technology
  • Kerberos
  • Key derivation function
  • Real-time business process monitoring
  • RTBPM
  • Secured transactions

Fingerprint

Dive into the research topics of 'Secure communication protocol for real-time business process monitoring'. Together they form a unique fingerprint.

Cite this