Impulse Technologies
                                      Beacons U to World of technology
        044-42133143, 98401 03301,9841091117 ieeeprojects@yahoo.com www.impulse.net.in
           Workflow Signatures for Business Process Compliance
   Abstract—
          Interorganizational workflow systems play a fundamental role in business
   partnerships. We introduce and investigate the concept of workflow signatures.
   Not only can these signatures be used to ensure authenticity and protect integrity of
   workflow data, but also to prove the sequence and logical relationships, such as
   AND-join and AND-split, of a workflow. Hence, workflow signatures can be
   electronic evidence useful for auditing that is proving compliance of business
   processes against some regulatory requirements. Furthermore, signing keys can be
   used to grant permissions to perform tasks. Since the signing keys are issued on-
   the-fly, authorization to execute a task within a workflow can be controlled and
   granted dynamically at runtime. In this paper, we propose a concrete workflow
   signature scheme, which is based on hierarchical identity-based cryptography, to
   meet security properties required by inter organizational workflows.




  Your Own Ideas or Any project from any company can be Implemented
at Better price (All Projects can be done in Java or DotNet whichever the student wants)
                                                                                          1

57

  • 1.
    Impulse Technologies Beacons U to World of technology 044-42133143, 98401 03301,9841091117 ieeeprojects@yahoo.com www.impulse.net.in Workflow Signatures for Business Process Compliance Abstract— Interorganizational workflow systems play a fundamental role in business partnerships. We introduce and investigate the concept of workflow signatures. Not only can these signatures be used to ensure authenticity and protect integrity of workflow data, but also to prove the sequence and logical relationships, such as AND-join and AND-split, of a workflow. Hence, workflow signatures can be electronic evidence useful for auditing that is proving compliance of business processes against some regulatory requirements. Furthermore, signing keys can be used to grant permissions to perform tasks. Since the signing keys are issued on- the-fly, authorization to execute a task within a workflow can be controlled and granted dynamically at runtime. In this paper, we propose a concrete workflow signature scheme, which is based on hierarchical identity-based cryptography, to meet security properties required by inter organizational workflows. Your Own Ideas or Any project from any company can be Implemented at Better price (All Projects can be done in Java or DotNet whichever the student wants) 1