Framework for Alternate Execution of Workflows Under Threat
The main objective of the research is to propose an execution framework for workflow systems under threat. When the threat (intrusion) is detected, the workflow system needs to be stopped immediately to avoid any possible loss of enterprise data. The system becomes active again, once it is completel...
| Main Authors: | Safdar, S., Hassan, M.F., Qureshi, MA., Akhbar, R. |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
2010
|
| Subjects: | |
| Online Access: | http://scholars.utp.edu.my/id/eprint/1690/ |
Similar Items
Biologically Inspired Execution Framework for
Vulnerable Workflow Systems
by: Safdar, S., et al.
Published: (2009)
by: Safdar, S., et al.
Published: (2009)
Two Phase Shortest Path Algorithm for Non-Negative Undirected Graphs
by: Qureshi, MA., et al.
Published: (2010)
by: Qureshi, MA., et al.
Published: (2010)
A O(|E|) Time Shortest Path Algorithm for Non-Negative Weighted Undirected Graphs
by: Qureshi, M.A., et al.
Published: (2010)
by: Qureshi, M.A., et al.
Published: (2010)
Authentication Model Based on Reformation Mapping Method
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
Client’s Perspective: Realization as a New Generation Process for Software Project Development and Management
by: Akbar, R., et al.
Published: (2010)
by: Akbar, R., et al.
Published: (2010)
An Edge-Wise Linear Shortest Path Algorithm for Non-Negative Weighted Undirected Graphs
by: Qureshi, M.A., et al.
Published: (2010)
by: Qureshi, M.A., et al.
Published: (2010)
Limitations and Measures in Outsourcing Projects to Geographically Distributed Offshore Teams
by: Akhbar, R., et al.
Published: (2010)
by: Akhbar, R., et al.
Published: (2010)
Moving Towards Two Dimensional Passwords
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
Model for the evaluation of usability of scientific workflows
by: Amelia, Abd Rahman
Published: (2019)
by: Amelia, Abd Rahman
Published: (2019)
Improvements Over Two Phase Shortest Path Algorithm
by: Qureshi, M.A., et al.
Published: (2010)
by: Qureshi, M.A., et al.
Published: (2010)
Agent based Monitoring Framework for SOA Applications Quality
by: Balfagih, Z., et al.
Published: (2010)
by: Balfagih, Z., et al.
Published: (2010)
Tackling the threats of Internet worms
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
A Survey on Different Interoperability Frameworks of SOA Systems Towards Seamless Interoperability
by: M. Ibrahim, N., et al.
Published: (2010)
by: M. Ibrahim, N., et al.
Published: (2010)
Theoretical Framework of the Effect of Extrinsic Rewards and Individual's Intrinsic Attributes on Knowledge Sharing Behavior
by: Amin, A., et al.
Published: (2009)
by: Amin, A., et al.
Published: (2009)
IPTV network security: threats and countermeasures
by: M. S. A., Noman Ranak, et al.
Published: (2018)
by: M. S. A., Noman Ranak, et al.
Published: (2018)
Framework of Intrinsic and Extrinsic Motivators of Knowledge Sharing: A case of Training Institutes of an Oil and Gas Company in Malaysia
by: Amin, A., et al.
Published: (2010)
by: Amin, A., et al.
Published: (2010)
Decision Support System Framework for Implementation of Enterprise Resource Planning (ERP) System
by: Khalil, M.A.T., et al.
Published: (2010)
by: Khalil, M.A.T., et al.
Published: (2010)
Completion time driven hyper-heuristic approach for optimisation of scientific workflow scheduling in cloud environment / Ehab Nabiel Mohammad
by: Ehab Nabiel , Mohammad
Published: (2018)
by: Ehab Nabiel , Mohammad
Published: (2018)
Theoretical Framework of the Effect of Extrinsic Rewards on Individual’s Attitude Towards Knowledge Sharing and the Role of Intrinsic Attributes
by: Amin, A., et al.
Published: (2009)
by: Amin, A., et al.
Published: (2009)
Automated Notification and Document Downloading in E-Learning –
Development of an Agent-Based Framework Utilizing the Push-Pull
Technology Interaction Policy
by: Latif, N.A., et al.
Published: (2008)
by: Latif, N.A., et al.
Published: (2008)
Learning-based conceptual framework for threat assessment of multiple vehicle collision in autonomous driving
by: Muzahid, Abu Jafar Md, et al.
Published: (2020)
by: Muzahid, Abu Jafar Md, et al.
Published: (2020)
Model driven security frameworks for addressing security problems of Service Oriented Architecture
by: Saleem, M. Q., et al.
Published: (2010)
by: Saleem, M. Q., et al.
Published: (2010)
Coordinated Constraint Relaxation Using a
Distributed Agent Protocol
by: Hassan, M.F.
Published: (2007)
by: Hassan, M.F.
Published: (2007)
A Collaborative-Interaction Model of Software Project Development: An Extension to Agile Based Methodologies
by: Akbar, R., et al.
Published: (2010)
by: Akbar, R., et al.
Published: (2010)
Constraint relaxation to reduce brittleness of distributed agent
protocols
by: Hassan, M.F., et al.
Published: (2004)
by: Hassan, M.F., et al.
Published: (2004)
Quality model for web services from multi-stakeholders' perspective
by: Balfagih, Z., et al.
Published: (2009)
by: Balfagih, Z., et al.
Published: (2009)
Addressing the Brittleness of Agent Interaction
by: Hassan, M.F., et al.
Published: (2008)
by: Hassan, M.F., et al.
Published: (2008)
Constraint Relaxation Approach for Over-Constrained Agent Interaction
by: Hassan, M.F., et al.
Published: (2008)
by: Hassan, M.F., et al.
Published: (2008)
Single and Replicated Simulations for Colored Petri Nets Nondeterministic Network
by: Adhipta, D., et al.
Published: (2010)
by: Adhipta, D., et al.
Published: (2010)
The design of an FPGA-based processor with reconfigurable processor execution structure for internet of things (IoT) applications
by: Kiat, Wei Pau
Published: (2018)
by: Kiat, Wei Pau
Published: (2018)
User requirement validation: challenge exploration in pre-project execution
by: Muhamad Idaham, Umar Ong, et al.
Published: (2020)
by: Muhamad Idaham, Umar Ong, et al.
Published: (2020)
Development of Simulation Environment for Agent Interaction Protocol
by: Latif, N.A., et al.
Published: (2010)
by: Latif, N.A., et al.
Published: (2010)
Adoption Of Open Source Software In Malaysia: A Study Of Perceptions Of IT Executives
by: Lee, Yee Tak
Published: (2005)
by: Lee, Yee Tak
Published: (2005)
A hybrid approach to semi-supervised named entity recognition in health, safety and environment reports
by: Sari, Y., et al.
Published: (2009)
by: Sari, Y., et al.
Published: (2009)
Addressing Constraint Failures in Agent Interaction Protocol
by: Hassan, M.F., et al.
Published: (2009)
by: Hassan, M.F., et al.
Published: (2009)
Creating Extraction Pattern by Combining Part
of Speech Tagger and Grammatical Parser
by: Sari, Y., et al.
Published: (2009)
by: Sari, Y., et al.
Published: (2009)
Rule-based Pattern Extractor and Named Entity Recognition: A Hybrid Approach
by: Sari, Y., et al.
Published: (2010)
by: Sari, Y., et al.
Published: (2010)
A Survey on Adaptive Qualitative Assessment and Dynamic Questions Generation Approaches
by: Rozali, D.S., et al.
Published: (2010)
by: Rozali, D.S., et al.
Published: (2010)
Establishing Effective Workflow Interoperability Framework In The Case Of Domino Workflow And Microsoft Exchange 2000 Server
by: Juliana, Wahid
Published: (2002)
by: Juliana, Wahid
Published: (2002)
P2R - A Pairwise Testing Strategy Supporting Execution Resumption
by: Helal, Mohammed H.S., et al.
Published: (2012)
by: Helal, Mohammed H.S., et al.
Published: (2012)
Similar Items
-
Biologically Inspired Execution Framework for
Vulnerable Workflow Systems
by: Safdar, S., et al.
Published: (2009) -
Two Phase Shortest Path Algorithm for Non-Negative Undirected Graphs
by: Qureshi, MA., et al.
Published: (2010) -
A O(|E|) Time Shortest Path Algorithm for Non-Negative Weighted Undirected Graphs
by: Qureshi, M.A., et al.
Published: (2010) -
Authentication Model Based on Reformation Mapping Method
by: Safdar, S., et al.
Published: (2010) -
Client’s Perspective: Realization as a New Generation Process for Software Project Development and Management
by: Akbar, R., et al.
Published: (2010)