Research on the Security of BPEL Based Manufacturing Service Workflow Management System

Abstract:

Article Preview

The security of BPEL (Business Process Execution Language) based manufacturing service workflow management system is researched in this paper, in order to achieve the efficient and secure integration and sharing of dispersed and heterogeneous design/manufacturing resources, and to realize the reuse of the complex distributed Design/Manufacturing process models. By integrating the secure BPEL engine, proxy credential server and authentication trust level, the security framework of the BPEL based manufacturing service workflow management system is built up, and the security mechanism of integrating BPEL and WSRF (Web Service Resource Framework) is analyzed. In addition, the system implementation technologies are analyzed and a distributed injection mould Design/Manufacturing application scenario is described. The research results provide the basis for developing a secure BPEL based distributed Design/Manufacturing prototype system.

Info:

Periodical:

Advanced Materials Research (Volumes 139-141)

Edited by:

Liangchi Zhang, Chunliang Zhang and Tielin Shi

Pages:

1518-1524

DOI:

10.4028/www.scientific.net/AMR.139-141.1518

Citation:

W. Wang and L. Chen, "Research on the Security of BPEL Based Manufacturing Service Workflow Management System", Advanced Materials Research, Vols. 139-141, pp. 1518-1524, 2010

Online since:

October 2010

Authors:

Export:

Price:

$35.00

[1] B.A. Wujek, P.N. Koch, M. McMillan and W. S. Chiang: 9th AIAA/ISSMO Symposium on Multidisciplinary Analysis and Optimization (Atlanta, GA, September 4-6, 2002). AIAA 20025476, pp.1-8.

DOI: 10.2514/6.2002-5476

[2] A. Schreiber: Concurr. Concurrency and Computation: Practice and Experience, Vol. 14 (2003) No. 13-15, pp.1553-1568.

[3] M. Baker, R. Buyya and D. Laforenza: Software: Practice and Experience, Vol. 32(2002)No. 15, pp.1437-1466.

[4] K.M. Chao, M. Younas and N. Griffiths: Computers in Industry, Vol. 57(2006)No. 8-9, p.778786.

[5] R. Mahon, K.M. Chao, M. Younas and N. Griffiths: Proceedings of the Eighth International Conference on Computer Supported Cooperative Work in Design (CSCWD 2004)(Xiamen, China, May 26-28, 2004), pp.406-412.

[6] K. Tan and K. Tuner: Proceedings of 7th Annual PostGraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting(PGNET 2006)(Liverpool, UK, June 2627, 2006), pp.31-36.

[7] T. Dörnemann, T. Friese, S. Herdt, E. Juhnke and B. Freisleben: German e-Science Conference (Baden-Baden, Germay, May 2-4, 2007), pp.1-9.

[8] T. Dörnemann, M. Smith and B. Freisleben: 2008 Eighth IEEE International Symposium on Cluster Computing and the Grid (ccgrid 2008) (Lyon, France, May 19-22, 2008), pp.122-129.

DOI: 10.1109/ccgrid.2008.74

[9] J. Novotny, S. Tuecke and V. Welch: Proceedings of the 10th International Symposium on High Performance Distributed Computing (HPDC-10) (San Francisco, CA, August 7-9, 2001), pp.104-111.

[10] J. Hu and A.C. Weaver: First Workshop on Pervasive Security, Privacy and Trust (PSPT2004)( Boston, MA, August 26, 2004), pp.1-8.

In order to see related information, you need to Login.