• DocumentCode
    599422
  • Title

    Smart authentication for real-time business process monitoring

  • Author

    AlMahmoud, A. ; Colombo, Maurizio ; Chan Yeob Yeun ; Al-Muhairi, H.

  • Author_Institution
    ETISALAT BT Innovation Center (EBTIC), Khalifa Univ., Sharjah, United Arab Emirates
  • fYear
    2012
  • fDate
    10-12 Dec. 2012
  • Firstpage
    253
  • Lastpage
    258
  • Abstract
    Tools that analyse critical business activities such as Business Process Monitoring (BPM) or Business Activity Monitoring (BAM) have been utilised in enterprise operations successfully over the past few years. However, with the increasing demand for more up-to-date information and analysis, real time process and event monitoring are becoming increasingly important. But monitoring business processes in real time introduces new security risks and challenges, due to the fact that monitoring sessions have to be open for very long durations and also due to the unpredictability of when business processes changes and updates take place. While an easy answer to securing such communications would be to increase the encryption key size or regularly updating it with new one, these approaches can have significant downsides. For example, negative performance impacts can occur due to renegotiation delaying important real time monitoring or wasting resources maintaining secure communications and keys through long periods of inactivity. For these reasons, this work proposes a system that would renew the key, without stopping for negotiation, secret information exchanging or the need for timer synchronizations, as well as providing security services necessary for real time BPM and other real time applications.
  • Keywords
    business process re-engineering; cryptography; message authentication; process monitoring; risk management; BAM; BPM; business activity monitoring; critical business activities; encryption key size; enterprise operations; event monitoring; real-time business process monitoring; security risks; security services; smart authentication; Authentication; Business; Cryptography; Monitoring; Real-time systems; Servers; Authentication; Kerberos; Key Derivation Function; Real Time Business Process Monitoring;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Internet Technology And Secured Transactions, 2012 International Conference for
  • Conference_Location
    London
  • Print_ISBN
    978-1-4673-5325-0
  • Type

    conf

  • Filename
    6470954