Professional Documents
Culture Documents
ABSTRACT: Decentralized access control is one of important schemes for secure data storage in clouds that supports
anonymous authentication. In the proposed scheme, the cloud verifies the authenticity of the series without knowing the
users identity before storing data. We have designed the complete enterprise resource planning using a SaaS based
Technology Workday. We have addressed the Core HR transactions from Hire to terminate using this SaaS technology.
Tailored the Business Process rules, Security and Compensation package as per the client requirement used this SaaS,
as Upgrade will not be a hassle for the client and it will be owned by the Software vendor. We can access the
application through mobile from wherever you are.
www.ijircee.com
ISSN(Online): 2395-xxxx
Copyright to IJIRCEE
www.ijircee.com
ISSN(Online): 2395-xxxx
Copyright to IJIRCEE
www.ijircee.com
ISSN(Online): 2395-xxxx
D: Security Group
The context type of each security group is determined automatically by the security group type with which it is
associated, and cant be changed. The name of the security group type indicates different types of row-level access to
secured items. Example: A user-based security group is automatically unconstrained, but a role-based security group
(constrained) is constrained by organization access.
Unconstrained: All users in the security group have access to all data instances secured by the security group, similar to
having access to all rows in systems based on traditional relational database architecture.
Constrained: All users in the security group have contextual access to a subset of data instances (rows) which the
security group can access. Users' access to individual instances is governed by either:
Individual Role
Organization
Mixed: Users in the security group don't have uniform access to data instances. This applies to these security group
types:
Intersection security groups (a subset of 2 or more security groups).
Aggregation security groups (a superset of 2 or more security groups).
E: Business Process Setups
A business process in Workday is a set of tasks that people initiate, act upon, and complete in order to
accomplish a desired business objective. When a business process is initiated, Workday routes the tasks to the
responsible roles (users who are capable of completing the tasks based on their membership in security groups) and
enforces security and business rules throughout the business process.
Any user with the appropriate role can initiate a business process. Once initiated, the business process notifies
users in the responsible roles as it processes each step and receives feedback when each step is complete, so it can
move on to the next step.
All business processes are based on a business process definition; you can't create a business process in
Workday without first defining it. Workday's default business processes are delivered definitions and can be
customized to meet your needs. You can copy the business process to any supervisory organization and tailor it as
necessary, creating different versions of the same business process for different organizations. The business process
logic is inherited, so a subordinate organization uses the business process definition of the superior organization unless
you specify a custom definition for the subordinate organization.
V. CONCLUSION AND FUTURE WORK
We have designed the complete enterprise resource planning using a SaaS based Technology Workday. We
have addressed the Core HR transactions from Hire to terminate using this SaaS technology. Tailored the Business
Process rules, Security and Compensation package as per the requirement. Used this SaaS, as Upgrade will not be a
hassle for the client and it will be owned by the Software vendor. We can access the application through mobile from
wherever you are.
Future Enhancement We can establish the HCM complete setup for multiple Countries
REFERENCES.
1
2
3
4
A. Sahai and B. Waters, Fuzzy Identity-Based Encryption, in Proceedings of Advances in Cryptology - EUROCRYPT
05, ser. LNCS, vol. 3494. Springer, 2005, pp. 457473.
B. Wang, S. S. M. Chow, M. Li, and H. Li, Storing Shared Data on the Cloud via Security-Mediator, in International
Conference on Distributed Computing Systems - ICDCS 2013. IEEE, 2013.
B. Alomair and R. Poovendran, Information Theoretically Secure Encryption with Almost Free Authentication, J. UCS,
vol. 15, no. 15, pp. 29372956, 2009.
C.-K. Chu and W.-G. Tzeng, Identity-Based Proxy Re-encryption Without Random Oracles, in Information Security
Conference (ISC 07), ser. LNCS, vol. 4779. Springer, 2007, pp. 189202.
Copyright to IJIRCEE
www.ijircee.com
ISSN(Online): 2395-xxxx
6
7
8
9
10
11
12
13
14
C.-K. Chu, J. Weng, S. S. M. Chow, J. Zhou, and R. H. Deng, Conditional Proxy Broadcast Re-Encryption, in
Australasian Conference on Information Security and Privacy (ACISP 09), ser. LNCS, vol. 5594. Springer, 2009, pp.
327342.
C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, Privacy- Preserving Public Auditing for Secure Cloud Storage,
IEEE Trans. Computers, vol. 62, no. 2, pp. 362375, 2013.
D. Boneh, X. Boyen, and E.-J. Goh, Hierarchical Identity Based Encryption with Constant Size Ciphertext, in
Proceedings of Ad- vances in Cryptology - EUROCRYPT 05, ser. LNCS, vol. 3494. Springer, 2005, pp. 440456.
D. Boneh, R. Canetti, S. Halevi, and J. Katz, Chosen-Ciphertext Security from Identity-Based Encryption, SIAM Journal
on Com- puting (SIAMCOMP), vol. 36, no. 5, pp. 13011328, 2007.
D. Naor, M. Naor, and J. Lotspiech, Revocation and Tracing Schemes for Stateless Receivers, in Proceedings of
Advances in Cryptology - CRYPTO 01, ser. LNCS. Springer, 2001, pp. 4162.
D. Boneh, C. Gentry, and B. Waters, Collusion Resistant Broad- cast Encryption with Short Ciphertexts and Private
Keys, in Proceedings of Advances in Cryptology - CRYPTO 05, ser. LNCS, vol. 3621. Springer, 2005, pp. 258275.
D. Boneh and M. K. Franklin, Identity-Based Encryption from the Weil Pairing, in Proceedings of Advances in
Cryptology - CRYPTO 01, ser. LNCS, vol. 2139. Springer, 2001, pp. 213229.
D. Boneh, C. Gentry, B. Lynn, and H. Shacham, Aggregate and Veriably Encrypted Signatures from Bilinear Maps, in
Proceedings of Advances in Cryptology - EUROCRYPT 03, ser. LNCS, vol. 2656. Springer, 2003, pp. 416432.
F. Guo, Y. Mu, and Z. Chen, Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single
Decryption Key, in Proceedings of Pairing-Based Cryptography (Pairing 07), ser. LNCS, vol. 4575. Springer, 2007, pp.
392406.
F. Guo, Y. Mu, Z. Chen, and L. Xu, Multi-Identity Single-Key Decryption without Random Oracles, in Proceedings of
Informa- tion Security and Cryptology (Inscrypt 07), ser. LNCS, vol. 4990. Springer, 2007, pp. 384398.
Copyright to IJIRCEE
www.ijircee.com
10