Research on the Security of BPEL Based Manufacturing Service Workflow Management System

Article Preview

Abstract:

The security of BPEL (Business Process Execution Language) based manufacturing service workflow management system is researched in this paper, in order to achieve the efficient and secure integration and sharing of dispersed and heterogeneous design/manufacturing resources, and to realize the reuse of the complex distributed Design/Manufacturing process models. By integrating the secure BPEL engine, proxy credential server and authentication trust level, the security framework of the BPEL based manufacturing service workflow management system is built up, and the security mechanism of integrating BPEL and WSRF (Web Service Resource Framework) is analyzed. In addition, the system implementation technologies are analyzed and a distributed injection mould Design/Manufacturing application scenario is described. The research results provide the basis for developing a secure BPEL based distributed Design/Manufacturing prototype system.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 139-141)

Pages:

1518-1524

Citation:

Online since:

October 2010

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2010 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] B.A. Wujek, P.N. Koch, M. McMillan and W. S. Chiang: 9th AIAA/ISSMO Symposium on Multidisciplinary Analysis and Optimization (Atlanta, GA, September 4-6, 2002). AIAA 20025476, pp.1-8.

DOI: 10.2514/6.2002-5476

Google Scholar

[2] A. Schreiber: Concurr. Concurrency and Computation: Practice and Experience, Vol. 14 (2003) No. 13-15, pp.1553-1568.

Google Scholar

[3] M. Baker, R. Buyya and D. Laforenza: Software: Practice and Experience, Vol. 32(2002)No. 15, pp.1437-1466.

Google Scholar

[4] K.M. Chao, M. Younas and N. Griffiths: Computers in Industry, Vol. 57(2006)No. 8-9, p.778786.

Google Scholar

[5] R. Mahon, K.M. Chao, M. Younas and N. Griffiths: Proceedings of the Eighth International Conference on Computer Supported Cooperative Work in Design (CSCWD 2004)(Xiamen, China, May 26-28, 2004), pp.406-412.

DOI: 10.1109/cacwd.2004.1349223

Google Scholar

[6] K. Tan and K. Tuner: Proceedings of 7th Annual PostGraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting(PGNET 2006)(Liverpool, UK, June 2627, 2006), pp.31-36.

Google Scholar

[7] T. Dörnemann, T. Friese, S. Herdt, E. Juhnke and B. Freisleben: German e-Science Conference (Baden-Baden, Germay, May 2-4, 2007), pp.1-9.

Google Scholar

[8] T. Dörnemann, M. Smith and B. Freisleben: 2008 Eighth IEEE International Symposium on Cluster Computing and the Grid (ccgrid 2008) (Lyon, France, May 19-22, 2008), pp.122-129.

DOI: 10.1109/ccgrid.2008.74

Google Scholar

[9] J. Novotny, S. Tuecke and V. Welch: Proceedings of the 10th International Symposium on High Performance Distributed Computing (HPDC-10) (San Francisco, CA, August 7-9, 2001), pp.104-111.

Google Scholar

[10] J. Hu and A.C. Weaver: First Workshop on Pervasive Security, Privacy and Trust (PSPT2004)( Boston, MA, August 26, 2004), pp.1-8.

Google Scholar