×

METHOD AND APPARATUS FOR SIMULATING A WORKFLOW AND ANALYZING THE BEHAVIOR OF INFORMATION ASSURANCE ATTRIBUTES THROUGH A DATA PROVIDENCE ARCHITECTURE

  • US 20100250932A1
  • Filed: 01/05/2010
  • Published: 09/30/2010
  • Est. Priority Date: 03/24/2009
  • Status: Active Grant
First Claim
Patent Images

1. A method for simulating a workflow and analyzing the behavior of information assurance attributes through a data providence architecture, comprising:

  • injecting one or more faults into a simulated workflow;

    receiving a message in the simulated workflow having a data provenance wrapper, wherein the message may or may not have attachments and the data provenance wrapper contains a data provenance record with data provenance information for the message and each attachment, the one or more injected faults being included in at least one of the received message, the data provenance information, and at least one of the attachments;

    examining each data provenance record of the message and any attachments for discrepancies, wherein the examination of each data provenance record of the message and any attachments includes;

    verifying signatures of senders of the message and any attachments;

    calculating a hash value for the message and any attachments;

    verifying that the hash value for the message and any attachments matches the values in the data provenance record for the message and any attachments;

    verifying the timestamp of the message and any attachments; and

    verifying information assurance attributes of the message and any attachments, the information assurance attributes being at least one of authenticity, confidentiality, integrity, non-repudiation, and availability;

    identifying any discrepancies in the examination of each data provenance record of the message and any attachments;

    calculating a degree of trust based on the security attributes and message identification information included in the message, the data provenance record and any discrepancies identified in the examination of each data provenance record of the message and any attachments;

    analyzing the calculated degree of trust with respect to the one or more injected faults and the information assurance attributes; and

    outputting the analysis to a user.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×