Data flow incompatible vulnerability analysis and detection for networked collaborative design business process

Huaizhi Yan*, Wenwen Ye, Jihu Zhang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper presents a data flow incompatible vulnerability detection method for networked collaborative design (NCD) business process. First, we analyze the collaborative design network composition and its business process characteristics, while the business process and data flow is discussed. Then, combined with the characteristics of cooperative design workflow, the causes of the data flow incompatible vulnerabilities are analyzed and description method of the activity diagram data flow incompatible vulnerability is given. According to the business process model of active incompatible vulnerability, business process models were constructed for its detection, and vulnerability detection algorithm is proposed based on the description logic, which is used to detect collaborative design business process data flow incompatible vulnerability. Finally, the experiment and conclusion are given here.

Original languageEnglish
Title of host publicationInternational Conference on Computer Science and Information Technology, CSAIT 2013, Proceedings
EditorsSrikanta Patnaik, Xiaolong Li
PublisherSpringer Verlag
Pages317-323
Number of pages7
ISBN (Electronic)9788132217589
DOIs
Publication statusPublished - 2014
Externally publishedYes
EventInternational Conference on Computer Science and Information Technology, CSAIT 2013 - Kunming, China
Duration: 21 Sept 201323 Sept 2013

Publication series

NameAdvances in Intelligent Systems and Computing
Volume255
ISSN (Print)2194-5357

Conference

ConferenceInternational Conference on Computer Science and Information Technology, CSAIT 2013
Country/TerritoryChina
CityKunming
Period21/09/1323/09/13

Keywords

  • Business process
  • Incompatible vulnerability detection
  • Networked collaborative design

Fingerprint

Dive into the research topics of 'Data flow incompatible vulnerability analysis and detection for networked collaborative design business process'. Together they form a unique fingerprint.

Cite this