Security in PKI/PMI-Based Workflow Security Model
Zhiqi Xu, Chaohui Jiang
Available Online December 2013.
- https://doi.org/10.2991/wiet-13.2013.28How to use a DOI?
- component: Workflow; Security Model; PKI; PMI; Audit.
- In consideration of simple workflow security model, there are some defects such as simple authentication, inflexible authorization and absent of audit, etc. However, based on the intensive research of security needs of WfMS, and by involving PKI/PMI technology, an enhanced workflow security model can be a viable choice. This model introduces strong factor authentication by utilizing PKI, T&RBAC access control by utilizing PMI and by utilizing digital signature and DTS to provide non-repudiation and existing services. The requirements of security audit also can be satisfied well. Comparing with simple workflow security model, theory study shows this PKI/PMI-based model improves the safety and flexibility significantly. A convenient and reliable solution for Data Privacy, Data Integrity, data Availability and Non Repudiation is adjusted to the requirements of workflow. The risks from illegal and unauthorized operations are reduced to minimum.
- Open Access
- This is an open access article distributed under the CC BY-NC license.
Cite this article
TY - CONF AU - Zhiqi Xu AU - Chaohui Jiang PY - 2013/12 DA - 2013/12 TI - Security in PKI/PMI-Based Workflow Security Model BT - AASRI Winter International Conference on Engineering and Technology (AASRI-WIET 2013) PB - Atlantis Press SN - 1951-6851 UR - https://doi.org/10.2991/wiet-13.2013.28 DO - https://doi.org/10.2991/wiet-13.2013.28 ID - Xu2013/12 ER -