Abstract
The need for real-time information about business process, event monitoring and fault detection has pushed business process monitoring (BPM) tools to be improved for real-time analysis. However, such functionality introduces new challenges in providing both security and optimal performance. Such challenges are mainly due to the nature of the communication between these tools and its users, such as long durations of monitoring and the asynchronous nature of the communication. A standard solution that is used by many vendors is to provide sequential key derivation, or use long encryption keys. But, these solutions have a negative impact on the performance and response time. Furthermore, it is not optimised for these applications, thus wastes resources on key renegotiation and creation. These issues were the motivation behind the development of a security solution aimed to address the inefficiency and to better manage resources in a way that would not heavenly impact performance.
Original language | British English |
---|---|
Pages (from-to) | 223-239 |
Number of pages | 17 |
Journal | International Journal of Internet Technology and Secured Transactions |
Volume | 5 |
Issue number | 3 |
DOIs | |
State | Published - 2014 |
Keywords
- Authentication
- Internet technology
- Kerberos
- Key derivation function
- Real-time business process monitoring
- RTBPM
- Secured transactions