Framework for Alternate Execution of Workflows Under Threat

The main objective of the research is to propose an execution framework for workflow systems under threat. When the threat (intrusion) is detected, the workflow system needs to be stopped immediately to avoid any possible loss of enterprise data. The system becomes active again, once it is completel...

Full description

Bibliographic Details
Main Authors: Safdar, S., Hassan, M.F., Qureshi, MA., Akhbar, R.
Format: Conference or Workshop Item
Published: 2010
Subjects:
Online Access:http://scholars.utp.edu.my/id/eprint/1690/
_version_ 1848659155844333568
author Safdar, S.
Hassan, M.F.
Qureshi, MA.
Akhbar, R.
author_facet Safdar, S.
Hassan, M.F.
Qureshi, MA.
Akhbar, R.
author_sort Safdar, S.
building UTP Institutional Repository
collection Online Access
description The main objective of the research is to propose an execution framework for workflow systems under threat. When the threat (intrusion) is detected, the workflow system needs to be stopped immediately to avoid any possible loss of enterprise data. The system becomes active again, once it is completely recovered from the threat. This proposed framework overcomes the problem of discontinuity of services as a result of threat detection by enabling the execution of the workflow on an alternate path, keeping the security and integrity of the asset information intact. Hence the system remains available all the time in a secured fashion making it possible for the end user to access the services and data even in the vulnerable state. To achieve the specified goals, the special authentication mechanism has been adopted to authorize the users after threat is detected. Then the data is hibernated that is transferred to the designed dimensions and the connectivity and access to the hibernated data is provided by the chameleon agent. These three core components enable the workflow to execute in a secured and robust manner during system’s unsafe state.
first_indexed 2025-11-13T07:25:56Z
format Conference or Workshop Item
id oai:scholars.utp.edu.my:1690
institution Universiti Teknologi Petronas
institution_category Local University
last_indexed 2025-11-13T07:25:56Z
publishDate 2010
recordtype eprints
repository_type Digital Repository
spelling oai:scholars.utp.edu.my:16902010-05-09T16:58:07Z http://scholars.utp.edu.my/id/eprint/1690/ Framework for Alternate Execution of Workflows Under Threat Safdar, S. Hassan, M.F. Qureshi, MA. Akhbar, R. QA75 Electronic computers. Computer science QA76 Computer software The main objective of the research is to propose an execution framework for workflow systems under threat. When the threat (intrusion) is detected, the workflow system needs to be stopped immediately to avoid any possible loss of enterprise data. The system becomes active again, once it is completely recovered from the threat. This proposed framework overcomes the problem of discontinuity of services as a result of threat detection by enabling the execution of the workflow on an alternate path, keeping the security and integrity of the asset information intact. Hence the system remains available all the time in a secured fashion making it possible for the end user to access the services and data even in the vulnerable state. To achieve the specified goals, the special authentication mechanism has been adopted to authorize the users after threat is detected. Then the data is hibernated that is transferred to the designed dimensions and the connectivity and access to the hibernated data is provided by the chameleon agent. These three core components enable the workflow to execute in a secured and robust manner during system’s unsafe state. 2010-02 Conference or Workshop Item PeerReviewed Safdar, S. and Hassan, M.F. and Qureshi, MA. and Akhbar, R. (2010) Framework for Alternate Execution of Workflows Under Threat. In: IEEE. International Conference of Communication Software and Networks (ICCSN 2010), 28-26 Feb 2010, Singapore. http://doi.ieeecomputersociety.org/10.1109/ICCSN.2010.79
spellingShingle QA75 Electronic computers. Computer science
QA76 Computer software
Safdar, S.
Hassan, M.F.
Qureshi, MA.
Akhbar, R.
Framework for Alternate Execution of Workflows Under Threat
title Framework for Alternate Execution of Workflows Under Threat
title_full Framework for Alternate Execution of Workflows Under Threat
title_fullStr Framework for Alternate Execution of Workflows Under Threat
title_full_unstemmed Framework for Alternate Execution of Workflows Under Threat
title_short Framework for Alternate Execution of Workflows Under Threat
title_sort framework for alternate execution of workflows under threat
topic QA75 Electronic computers. Computer science
QA76 Computer software
url http://scholars.utp.edu.my/id/eprint/1690/
http://scholars.utp.edu.my/id/eprint/1690/