A Flexible Method Using Identity Based Message Key Distribution for Securing Workflow Signatures

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5

Abstract

 Abstract: The increase in advancement of information technology led the migration of workflows from paper based to electronic workflow systems. Basically a workflow consists of a number of tasks and each of these tasks should be authenticated by using any of the cryptographic techniques. To provide more security within workflow systems, signing keys are used. In addition to data authenticity and integrity, logical relationships such as AND-join and AND-split are to be provided in a workflow signature scheme. Such a scheme was experimentally proven which is based on hierarchical identity-based cryptography to meet security properties required by inter-organizational workflows. Due its high complexity, a new mechanism, IB-MKD (Identity Based Message Key Distribution) is proposed as an alternative to HIBS, which is achieved with conventional RSA without any additional assumptions and limitations and it is believed to have less overhead.

Authors and Affiliations

Roshin Sharo Eapen

Keywords

Related Articles

 Lip Recognition for Authentication and Security

 Abstract: Lip is used as an identifier from person to person as the size of the upper and lower lips, furrows, grooves, the distances between the lines and the edges vary individualistically. These unique parameter...

Integration of PDM and ERP systems within a unified information space of an enterprise

This article focuses on the research on the complex processes of joint integration of PDM and ERP systems. The relevance of introducing an integrated system within a single information space is justified. The main challe...

A Non Conventional Energy Based Mobile Charger towards Green Computing

Conventional energy are tapped and used abundantly at present. Keeping in observance a way of precaution is taken to upturn the use of non-conventional energy. Decreasing the use of conventional energy, a two way (or twi...

 CEET: A Compressed Encrypted & Embedded Technique for Digital Image Steganography

 Abstract: In this information era, digital information sharing and transfer plays a vital role and their use has increased exponentially with the development of technology. Thus providing security of data is a topi...

 A Review of DOS Attacks in Cloud Computing

Abstract: Cloud computing is an emerging trend in the field of IT providing scalable and flexible services to the end users on demand. Cloud offers services in three levels namely infrastructure, platform and software to...

Download PDF file
  • EP ID EP94584
  • DOI -
  • Views 128
  • Downloads 0

How To Cite

Roshin Sharo Eapen (2014).  A Flexible Method Using Identity Based Message Key Distribution for Securing Workflow Signatures. IOSR Journals (IOSR Journal of Computer Engineering), 16(5), 1-7. https://europub.co.uk/articles/-A-94584