Workflow logs that record the execution of business processes offer very valuable data resource for real-time enterprise performance measurement. In this paper, a novel scheme that uses the technology of data warehous...Workflow logs that record the execution of business processes offer very valuable data resource for real-time enterprise performance measurement. In this paper, a novel scheme that uses the technology of data warehouse and OLAP to explore workflow logs and create complex analysis reports for enterprise performance measurement is proposed. Three key points of this scheme are studied: 1) the measure set; 2) the open and flexible architecture for workflow logs analysis system; 3) the data models in WFMS and data warehouse. A case study that shows the validity of the scheme is also provided.展开更多
In order to ensure the security of cloud storage, on the basis of the analysis of cloud storage security requirements, this paper puts forward a kind of" hidden mapping hyper-combined public key management scheme...In order to ensure the security of cloud storage, on the basis of the analysis of cloud storage security requirements, this paper puts forward a kind of" hidden mapping hyper-combined public key management scheme based on the hyperelliptic curve crypto system, which is applicable to the distributed cloud storage. A series of operation processes of the key management are elaborated, including key distribution, key updating and key agreement, etc. Analysis shows that the scheme can solve the problem of large-scale key management and storage issues in cloud storage effectively. The scheme feathers high efficiency and good scalability. It is able to resist collusion attack and ensure safe and reliable service provided by the cloud storaee system展开更多
For business service workflow,QoS-based services selection can't guarantee whether the composite service satisfies user' s requirement after delivery,because once any service interrupts or quality of service(Q...For business service workflow,QoS-based services selection can't guarantee whether the composite service satisfies user' s requirement after delivery,because once any service interrupts or quality of service(QoS) maliciously reduces,the quality of workflow will be reduced.Trustworthy services can provide reliable QoS,so trustworthiness research could improve the efficiency of services selection.This paper investigates trust assessment in the perspective of workflow.Firstly,trust network of business service workflow(TN-BSW) is proposed to analyze trust attributes;then,the trust measurement system of TN-BSW is investigated to assess the trust value quantitatively;and then,a trust-aware service recommendation model(TaSRM) is proposed to enhance the efficiency of QoS-basedservices selection;finally,experiment shows the feasibility of TN-BSWand the performance of TaSRM.展开更多
文摘Workflow logs that record the execution of business processes offer very valuable data resource for real-time enterprise performance measurement. In this paper, a novel scheme that uses the technology of data warehouse and OLAP to explore workflow logs and create complex analysis reports for enterprise performance measurement is proposed. Three key points of this scheme are studied: 1) the measure set; 2) the open and flexible architecture for workflow logs analysis system; 3) the data models in WFMS and data warehouse. A case study that shows the validity of the scheme is also provided.
基金This work was supported in part by the National Science Foundation Project of P.R.China,the Fundamental Research Funds for the Central Universities under Grant No.FRF-TP-14-046A2
文摘In order to ensure the security of cloud storage, on the basis of the analysis of cloud storage security requirements, this paper puts forward a kind of" hidden mapping hyper-combined public key management scheme based on the hyperelliptic curve crypto system, which is applicable to the distributed cloud storage. A series of operation processes of the key management are elaborated, including key distribution, key updating and key agreement, etc. Analysis shows that the scheme can solve the problem of large-scale key management and storage issues in cloud storage effectively. The scheme feathers high efficiency and good scalability. It is able to resist collusion attack and ensure safe and reliable service provided by the cloud storaee system
基金Supported by the Research Fund for the Doctoral Program of Higher Education of China(No.20120002110034)Initiative Scientific Research Program of Tsinghua University(No.20111080998)
文摘For business service workflow,QoS-based services selection can't guarantee whether the composite service satisfies user' s requirement after delivery,because once any service interrupts or quality of service(QoS) maliciously reduces,the quality of workflow will be reduced.Trustworthy services can provide reliable QoS,so trustworthiness research could improve the efficiency of services selection.This paper investigates trust assessment in the perspective of workflow.Firstly,trust network of business service workflow(TN-BSW) is proposed to analyze trust attributes;then,the trust measurement system of TN-BSW is investigated to assess the trust value quantitatively;and then,a trust-aware service recommendation model(TaSRM) is proposed to enhance the efficiency of QoS-basedservices selection;finally,experiment shows the feasibility of TN-BSWand the performance of TaSRM.