Kirankumar Pulivarthi, A.Sudarsan Reddy


In the existing system, root authority generates business workflow plan and then signature to the business workflow is generated. Each authorized person checks workflow plan activities using signature verification algorithm. Each node verification is not validated in the existing approach. Any one who breaks the signature using exiting rsa approach can change the business workflow. So in order to overcome this part in the proposed work we generate policy to each authorized persons and the each node in the business workflow signature is generated so that this framework provides more security compare to existing approach. This system takes less time when compare to existing approach. In this paper, we propose a concrete workflow signature scheme, which is based on Elliptic curve cryptography; to meet security properties required by inter organizational workflows. After that signature is generated to each node .Time takes to generate signature to each node is linear complexity when compare to exiting quadratic complexity.


Digital signatures; applied cryptography; business processes; security compliance;


S. Eckartz, M. Daneva, R. Wieringa, and J.V. Hillegersberg, “Cross-Organizational ERP Management: How to Create a Successful Business Case?,” Proc. ACM Symp. Applied Computing, S. Shin, and S. Ossowski, eds., pp. 1599-1604, Mar. 2009.

J. Liu, S. Zhang, and J. Hu, “A Case Study of an Inter-Enterprise Workflow-Supported Supply Chain Management System,” Information & Management, vol. 42, no. 3, pp. 441-454, Mar. 2005.

P. Grefen, K. Aberer, H. Ludwig, and Y. Hoffner, “CrossFlow: Cross-Organizational Workflow Management for Service Outsourcing in Dynamic Virtual Enterprises,” IEEE Data Eng. Bull., Elliptic Curve Cryptography.pdf

G. Ahn, R. Sandhu, M. Kang, and J. Park, “Injecting RBAC to Secure aWeb-Based Workflow System,” Proc. Fifth ACM Workshop Role-Based Access Control (RBAC ’00), pp. 1-10, July 2000.

W. Huang and V. Atluri, “SecureFlow: A Secure Web-Enabled Workflow Management System,” Proc. Fifth ACM Workshop Role- Based Access Control (RBAC ’99). pp. 83-94, Oct. 1999.

J. Miller, M. Fan, S. Wu, I. Arpinar, A. Sheth, and K. Kochut, “Security for the METEOR Workflow Management System,” Technical Report UGA-CS-LSDIS-TR-99-010, Univ. of Georgia, June 1999.

F. Montagut and R. Molva, “Traceability and Integrity of Execution in Distributed Workflow Management Systems,” Proc. 12th European Symp. Research in Computer Security (ESORICS ’07), J. Biskup and J. Lopez, eds., pp. 251-266, 2007.

“Workflow Management Coalition, Workflow Security Considerations,” White Paper WFMC-TC-1019, The Workflow Management Coalition Specification, Feb. 1998.

A. Liu, S. Mu¨ ller, and K. Xu, “A Static Compliance-Checking Framework for Business Process Models,” IBM Systems J., vol. 46, no. 2, pp. 335-361, Nov. 2007.

S. Sadiq, G. Governatori, and K. Namiri, “Modeling Control Objectives for Business Process Compliance,” Proc. Fifth Int’l Conf. Business Process Management (BPM ’07), G. Alonso, P. Dadam, and M. Rosemann, eds., pp. 149-164, Sept. 2007.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2021, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at