Smart authentication for real-time business process monitoring

Abdelrahman AlMahmoud, Maurizio Colombo, Chan Yeob Yeun, Hassan Al-Muhairi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Tools that analyse critical business activities such as Business Process Monitoring (BPM) or Business Activity Monitoring (BAM) have been utilised in enterprise operations successfully over the past few years. However, with the increasing demand for more up-to-date information and analysis, real time process and event monitoring are becoming increasingly important. But monitoring business processes in real time introduces new security risks and challenges, due to the fact that monitoring sessions have to be open for very long durations and also due to the unpredictability of when business processes changes and updates take place. While an easy answer to securing such communications would be to increase the encryption key size or regularly updating it with new one, these approaches can have significant downsides. For example, negative performance impacts can occur due to renegotiation delaying important real time monitoring or wasting resources maintaining secure communications and keys through long periods of inactivity. For these reasons, this work proposes a system that would renew the key, without stopping for negotiation, secret information exchanging or the need for timer synchronizations, as well as providing security services necessary for real time BPM and other real time applications.

Original languageBritish English
Title of host publication2012 International Conference for Internet Technology and Secured Transactions, ICITST 2012
Pages253-258
Number of pages6
StatePublished - 2012
Event7th International Conference for Internet Technology and Secured Transactions, ICITST 2012 - London, United Kingdom
Duration: 10 Dec 201212 Dec 2012

Publication series

Name2012 International Conference for Internet Technology and Secured Transactions, ICITST 2012

Conference

Conference7th International Conference for Internet Technology and Secured Transactions, ICITST 2012
Country/TerritoryUnited Kingdom
CityLondon
Period10/12/1212/12/12

Keywords

  • Authentication
  • Kerberos
  • Key Derivation Function
  • Real Time Business Process Monitoring

Fingerprint

Dive into the research topics of 'Smart authentication for real-time business process monitoring'. Together they form a unique fingerprint.

Cite this