Workflow Signatures for Secure e-Business Process

Download Now
Provided by: Creative Commons
Topic: Big Data
Format: PDF
In the existing system, root authority generates business workflow plan and then signature to the business workflow is generated. Each authorized person checks workflow plan activities using signature verification algorithm. Each node verification is not validated in the existing approach. Anyone who breaks the signature using exiting rsa approach can change the business workflow. So in order to overcome this part in the proposed paper the authors generate policy to each authorized persons and the each node in the business workflow signature is generated so that this framework provides more security compare to existing approach.
Download Now

Find By Topic