Font Size: a A A

Research And Implementation Of Security Audit Based On Workflow Mining In Workflow Management Systems

Posted on:2008-03-02Degree:MasterType:Thesis
Country:ChinaCandidate:W X ZhangFull Text:PDF
GTID:2178360242966638Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development and largely application of workflow technique,the security problem of workflow system have become an important researching area.So Workflow Management Coalition(WfMC) defines eight securities in its white paper including security audit which can improve reliability and security besides other security protection techniques such as identifiy,access control,data integrality,encryption technique and so on.However,it lacks of research on security audit in workflow management system.Moreover current security tenique method (security audit method based on machine and network) can not be applied into the workflow management system simply,because workflow have its own logic relationship ,such as casuality ,sequence,repetition among tasks.If using the normal securit audit techniques, it will lose the important logic information which leads to lower the veracity and validity.So,it is a worthful research object to find a better security audit method to solve the above problems.Researchers have got some wokflow mining technique which can effectively find the execution sequence-ship and tasks' relationship of workflow instances from the workflow log.And with the development of workflow model theory and the strict mathematic basis , Petri net has become the main tools to present and analyze the workflow model .Currently,the flow mining algorithm for Petri net workflow model is mainly a algorithm and the extended algorithms proposed by Aalst.But these algorithms ignore the context of tasks.This paper try to add the context anlysis for security audit.As mentioned above,this paper focus on the research and improvement the security of workflow system. We expand the mining algorithm based on analysis of flow mining technique , propose a variable conformance analysis method ,then give a security audit model ,which will implement the security audit function effectively.The research results on this paper are as following:1. Expand workflow-net for security audit and give the relatived mining algorithm,2. Give a flow and variable conformace analysis solution for workflow system.3. Give a security audit architecture on workflow system4. Give a detailed design of key elements in the workflow system and implement this prototype system...
Keywords/Search Tags:workflow, information security, security audit, data mining, algorithism, Petri net, workflow net
PDF Full Text Request
Related items