TY - GEN
T1 - Data flow incompatible vulnerability analysis and detection for networked collaborative design business process
AU - Yan, Huaizhi
AU - Ye, Wenwen
AU - Zhang, Jihu
N1 - Publisher Copyright:
© Springer India 2014.
PY - 2014
Y1 - 2014
N2 - This paper presents a data flow incompatible vulnerability detection method for networked collaborative design (NCD) business process. First, we analyze the collaborative design network composition and its business process characteristics, while the business process and data flow is discussed. Then, combined with the characteristics of cooperative design workflow, the causes of the data flow incompatible vulnerabilities are analyzed and description method of the activity diagram data flow incompatible vulnerability is given. According to the business process model of active incompatible vulnerability, business process models were constructed for its detection, and vulnerability detection algorithm is proposed based on the description logic, which is used to detect collaborative design business process data flow incompatible vulnerability. Finally, the experiment and conclusion are given here.
AB - This paper presents a data flow incompatible vulnerability detection method for networked collaborative design (NCD) business process. First, we analyze the collaborative design network composition and its business process characteristics, while the business process and data flow is discussed. Then, combined with the characteristics of cooperative design workflow, the causes of the data flow incompatible vulnerabilities are analyzed and description method of the activity diagram data flow incompatible vulnerability is given. According to the business process model of active incompatible vulnerability, business process models were constructed for its detection, and vulnerability detection algorithm is proposed based on the description logic, which is used to detect collaborative design business process data flow incompatible vulnerability. Finally, the experiment and conclusion are given here.
KW - Business process
KW - Incompatible vulnerability detection
KW - Networked collaborative design
UR - http://www.scopus.com/inward/record.url?scp=84927556608&partnerID=8YFLogxK
U2 - 10.1007/978-81-322-1759-6_38
DO - 10.1007/978-81-322-1759-6_38
M3 - Conference contribution
AN - SCOPUS:84927556608
T3 - Advances in Intelligent Systems and Computing
SP - 317
EP - 323
BT - International Conference on Computer Science and Information Technology, CSAIT 2013, Proceedings
A2 - Patnaik, Srikanta
A2 - Li, Xiaolong
PB - Springer Verlag
T2 - International Conference on Computer Science and Information Technology, CSAIT 2013
Y2 - 21 September 2013 through 23 September 2013
ER -