Computer Science ›› 2014, Vol. 41 ›› Issue (1): 230-234.

Previous Articles     Next Articles

Research on Security Technology of Workflow Customization for Collaborative SaaS Platform of Industrial Chains

CAO Shuai and WANG Shu-ying   

  • Online:2018-11-14 Published:2018-11-14

Abstract: A workflow control security model for security risks that may exist in the process of workflow rules choreography,storage/access and execution control in the workflow customization of collaborative SaaS platform of industrial chains with dominant enterprise as core was proposed based on the digital signature and service instance association.According to the research on the XML digital signature alone with its validating procedure and the strategy on storage and executing models,a digital signature which includes methods of validating the identity of users and is related to business operations,way of storing and arithmetic was proposed.The security model and arithmetic were validated in the customization and execution of the after service of vehicle on the collaborative SaaS platform of industrial chains,showing that it can prevent illegal tampering and transferring of workflow in the process of choreography,storage and execution.

Key words: SaaS platform,Security,Workflow customization,Digital signature

[1] 周亮,曹健,陈姣娟.软件即服务流程模型的自动演化[J].计算机集成制造系统,2011,17(8):1603-1608
[2] Thomas K,Thao N,Linh L.A software as a service with multi-tenancy support for an electronic contract management application[C]∥2008IEEE International Conference on Services Computing.Hawaii,2008:179-186
[3] Zhang Kuo,Zhang Xin,Sun Wei,et al.A policy-driven approach for software-as-services customization[C]∥Proceedings of the 9th IEEE International Conference on E-Commerce Technology(CEC) and the 4th IEEE International Conference on Enterprise Computing(EEE).Tokyo,Japan,2007:123-130
[4] Li Ya,Wang Hai-rui,Zhang Zhibin.Multi-Agent Based Workflow Management Systems Design[M].Adv.Scl.Lett.6,2012:727-731
[5] 曹健,李明禄,张申生.基于多Agent协商的服务流程定制[J].计算机学报,2006,29(7):1116-1124
[6] 史玉良,栾帅,李庆忠,等.基于TLA的SaaS业务流程定制及验证机制研究[J].计算机学报,2010,3(11):2055-2066
[7] 高嵩,欧阳昱,刘玉树.工作流模型的有向图表示及基于Petri网的验证方法[J].计算机仿真,2004,21(6):182-184
[8] Stormer H,Knorr K.A model for security in agent-based workflows[J].INFORMATIK/INFORMATI- QUE,(6):24-29
[9] 琚洁慧,吴吉义,章剑林,等.SaaS应用中的多租户与安全技术研究[J].电信科学,2010,10:41-46
[10] 王菽兰,李晓桓,李伟.基于SaaS的物流信息系统安全性机制研究[J].信息安全与技术,2012:36-38
[11] 王凯,张毅坤,杨凯峰,等.面向OA系统的工作流引擎研发[J].计算机工程与设计,2008:4967-4970

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!