Framework for Alternate Execution of Workflows Under Threat

S. Safdar, M. Hassan, M. Qureshi, R. Akbar
{"title":"Framework for Alternate Execution of Workflows Under Threat","authors":"S. Safdar, M. Hassan, M. Qureshi, R. Akbar","doi":"10.1109/ICCSN.2010.79","DOIUrl":null,"url":null,"abstract":"The main objective of the research is to propose an execution framework for workflow systems under threat. When the threat (intrusion) is detected, the workflow system needs to be stopped immediately to avoid any possible loss of enterprise data. The system becomes active again, once it is completely recovered from the threat. This proposed framework overcomes the problem of discontinuity of services as a result of threat detection by enabling the execution of the workflow on an alternate path, keeping the security and integrity of the asset information intact. Hence the system remains available all the time in a secured fashion making it possible for the end user to access the services and data even in the vulnerable state. To achieve the specified goals, the special authentication mechanism has been adopted to authorize the users after threat is detected. Then the data is hibernated that is transferred to the designed dimensions and the connectivity and access to the hibernated data is provided by the chameleon agent. These three core components enable the workflow to execute in a secured and robust manner during system’s unsafe state.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"522 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Second International Conference on Communication Software and Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSN.2010.79","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

Abstract

The main objective of the research is to propose an execution framework for workflow systems under threat. When the threat (intrusion) is detected, the workflow system needs to be stopped immediately to avoid any possible loss of enterprise data. The system becomes active again, once it is completely recovered from the threat. This proposed framework overcomes the problem of discontinuity of services as a result of threat detection by enabling the execution of the workflow on an alternate path, keeping the security and integrity of the asset information intact. Hence the system remains available all the time in a secured fashion making it possible for the end user to access the services and data even in the vulnerable state. To achieve the specified goals, the special authentication mechanism has been adopted to authorize the users after threat is detected. Then the data is hibernated that is transferred to the designed dimensions and the connectivity and access to the hibernated data is provided by the chameleon agent. These three core components enable the workflow to execute in a secured and robust manner during system’s unsafe state.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
威胁下工作流的替代执行框架
本研究的主要目的是提出一个工作流系统在威胁下的执行框架。当检测到威胁(入侵)时,需要立即停止工作流系统,以避免任何可能的企业数据丢失。一旦系统从威胁中完全恢复,它就会再次活跃起来。该框架通过启用在备用路径上执行工作流,从而保持资产信息的安全性和完整性,克服了由于威胁检测而导致的服务不连续的问题。因此,系统始终以安全的方式保持可用,使最终用户即使在易受攻击的状态下也可以访问服务和数据。为了达到指定的目的,在检测到威胁后,采用特殊的认证机制对用户进行授权。然后将数据休眠,并将其传输到设计的维度,并由变色龙代理提供对休眠数据的连接和访问。这三个核心组件使工作流能够在系统不安全状态下以安全和健壮的方式执行。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Implementation of HVAC System Through Wireless Sensor Network IPv6 MANET: An Essential Technology for Future Pervasive Computing Testability Models for Structured Programs Mobile Web Services in Health Care and Sensor Networks Modeling and Simulation of BLDC Motor Using Soft Computing Techniques
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1