METHOD AND APPARATUS FOR SIMULATING A WORKFLOW AND ANALYZING THE BEHAVIOR OF INFORMATION ASSURANCE ATTRIBUTES THROUGH A DATA PROVIDENCE ARCHITECTURE
First Claim
1. A method for simulating a workflow and analyzing the behavior of information assurance attributes through a data providence architecture, comprising:
- injecting one or more faults into a simulated workflow;
receiving a message in the simulated workflow having a data provenance wrapper, wherein the message may or may not have attachments and the data provenance wrapper contains a data provenance record with data provenance information for the message and each attachment, the one or more injected faults being included in at least one of the received message, the data provenance information, and at least one of the attachments;
examining each data provenance record of the message and any attachments for discrepancies, wherein the examination of each data provenance record of the message and any attachments includes;
verifying signatures of senders of the message and any attachments;
calculating a hash value for the message and any attachments;
verifying that the hash value for the message and any attachments matches the values in the data provenance record for the message and any attachments;
verifying the timestamp of the message and any attachments; and
verifying information assurance attributes of the message and any attachments, the information assurance attributes being at least one of authenticity, confidentiality, integrity, non-repudiation, and availability;
identifying any discrepancies in the examination of each data provenance record of the message and any attachments;
calculating a degree of trust based on the security attributes and message identification information included in the message, the data provenance record and any discrepancies identified in the examination of each data provenance record of the message and any attachments;
analyzing the calculated degree of trust with respect to the one or more injected faults and the information assurance attributes; and
outputting the analysis to a user.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus that simulates a workflow and analyzes the behavior of information assurance attributes through a data providence architecture is disclosed. The method may include injecting one or more faults into a simulated workflow, receiving a message in the simulated workflow having a data provenance wrapper, examining each data provenance record of the message and any attachments for discrepancies, identifying any discrepancies in the examination of each data provenance record of the message and any attachments; calculating a degree of trust based on any discrepancies identified in the examination of each data provenance record of the message and any attachments, analyzing the calculated degree of trust with respect to the one or more injected faults and the information assurance attributes, and outputting the analysis to a user.
-
Citations
21 Claims
-
1. A method for simulating a workflow and analyzing the behavior of information assurance attributes through a data providence architecture, comprising:
-
injecting one or more faults into a simulated workflow; receiving a message in the simulated workflow having a data provenance wrapper, wherein the message may or may not have attachments and the data provenance wrapper contains a data provenance record with data provenance information for the message and each attachment, the one or more injected faults being included in at least one of the received message, the data provenance information, and at least one of the attachments; examining each data provenance record of the message and any attachments for discrepancies, wherein the examination of each data provenance record of the message and any attachments includes; verifying signatures of senders of the message and any attachments; calculating a hash value for the message and any attachments; verifying that the hash value for the message and any attachments matches the values in the data provenance record for the message and any attachments; verifying the timestamp of the message and any attachments; and verifying information assurance attributes of the message and any attachments, the information assurance attributes being at least one of authenticity, confidentiality, integrity, non-repudiation, and availability; identifying any discrepancies in the examination of each data provenance record of the message and any attachments; calculating a degree of trust based on the security attributes and message identification information included in the message, the data provenance record and any discrepancies identified in the examination of each data provenance record of the message and any attachments; analyzing the calculated degree of trust with respect to the one or more injected faults and the information assurance attributes; and outputting the analysis to a user. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus that simulates a workflow and analyzes the behavior of information assurance attributes through a data providence architecture, comprising:
-
a communication interface that facilitates the sending and receiving of messages; a data provenance information analysis unit that injects one or more faults into a simulated workflow, receives a message in the simulated workflow having a data provenance wrapper, examines each data provenance record of the message and any attachments for discrepancies, identifies any discrepancies in the examination of each data provenance record of the message and any attachments, calculates a degree of trust based on the security attributes and message identification information included in the message, the data provenance record and any discrepancies identified in the examination of each data provenance record of the message and any attachments, analyzes the calculated degree of trust with respect to the one or more injected faults and the information assurance attributes, and outputs the analysis to a user, wherein the message may or may not have attachments and the data provenance wrapper contains a data provenance record with data provenance information for the message and each attachment, the one or more injected faults being included in at least one of the received message, the data provenance information, and at least one of the attachments; and wherein in the examination of each data provenance record of the message and any attachments, the data provenance information analysis unit verifies signatures of senders of the message and any attachments, calculates a hash value for the message and any attachments, verifies that the hash value for the message and any attachments matches the values in the data provenance record for the message and any attachments, verifies the timestamp of the message and any attachments, and verifies information assurance attributes of the message and any attachments, the information assurance attributes being at least one of authenticity, confidentiality, integrity, non-repudiation, and availability. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-readable medium storing instructions for simulating a workflow and analyzing the behavior of information assurance attributes through a data providence architecture, the instructions comprising:
-
injecting one or more faults into a simulated workflow; receiving a message in the simulated workflow having a data provenance wrapper, wherein the message may or may not have attachments and the data provenance wrapper contains a data provenance record with data provenance information for the message and each attachment, the one or more injected faults being included in at least one of the received message, the data provenance information, and at least one of the attachments; examining each data provenance record of the message and any attachments for discrepancies, wherein the examination of each data provenance record of the message and any attachments includes; verifying signatures of senders of the message and any attachments; calculating a hash value for the message and any attachments; verifying that the hash value for the message and any attachments matches the values in the data provenance record for the message and any attachments; verifying the timestamp of the message and any attachments; and verifying information assurance attributes of the message and any attachments, the information assurance attributes being at least one of authenticity, confidentiality, integrity, non-repudiation, and availability; identifying any discrepancies in the examination of each data provenance record of the message and any attachments; calculating a degree of trust based on the security attributes and message identification information included in the message, the data provenance record and any discrepancies identified in the examination of each data provenance record of the message and any attachments; analyzing the calculated degree of trust with respect to the one or more injected faults and the information assurance attributes; and outputting the analysis to a user. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification