TY - GEN
T1 - Smart authentication for real-time business process monitoring
AU - AlMahmoud, Abdelrahman
AU - Colombo, Maurizio
AU - Yeun, Chan Yeob
AU - Al-Muhairi, Hassan
PY - 2012
Y1 - 2012
N2 - Tools that analyse critical business activities such as Business Process Monitoring (BPM) or Business Activity Monitoring (BAM) have been utilised in enterprise operations successfully over the past few years. However, with the increasing demand for more up-to-date information and analysis, real time process and event monitoring are becoming increasingly important. But monitoring business processes in real time introduces new security risks and challenges, due to the fact that monitoring sessions have to be open for very long durations and also due to the unpredictability of when business processes changes and updates take place. While an easy answer to securing such communications would be to increase the encryption key size or regularly updating it with new one, these approaches can have significant downsides. For example, negative performance impacts can occur due to renegotiation delaying important real time monitoring or wasting resources maintaining secure communications and keys through long periods of inactivity. For these reasons, this work proposes a system that would renew the key, without stopping for negotiation, secret information exchanging or the need for timer synchronizations, as well as providing security services necessary for real time BPM and other real time applications.
AB - Tools that analyse critical business activities such as Business Process Monitoring (BPM) or Business Activity Monitoring (BAM) have been utilised in enterprise operations successfully over the past few years. However, with the increasing demand for more up-to-date information and analysis, real time process and event monitoring are becoming increasingly important. But monitoring business processes in real time introduces new security risks and challenges, due to the fact that monitoring sessions have to be open for very long durations and also due to the unpredictability of when business processes changes and updates take place. While an easy answer to securing such communications would be to increase the encryption key size or regularly updating it with new one, these approaches can have significant downsides. For example, negative performance impacts can occur due to renegotiation delaying important real time monitoring or wasting resources maintaining secure communications and keys through long periods of inactivity. For these reasons, this work proposes a system that would renew the key, without stopping for negotiation, secret information exchanging or the need for timer synchronizations, as well as providing security services necessary for real time BPM and other real time applications.
KW - Authentication
KW - Kerberos
KW - Key Derivation Function
KW - Real Time Business Process Monitoring
UR - https://www.scopus.com/pages/publications/84876169819
M3 - Conference contribution
AN - SCOPUS:84876169819
SN - 9781908320087
T3 - 2012 International Conference for Internet Technology and Secured Transactions, ICITST 2012
SP - 253
EP - 258
BT - 2012 International Conference for Internet Technology and Secured Transactions, ICITST 2012
T2 - 7th International Conference for Internet Technology and Secured Transactions, ICITST 2012
Y2 - 10 December 2012 through 12 December 2012
ER -