Framework for alternate execution of workflows under threat

Sohail Safdar*, Mohd Fadzil Hassan, Muhammad Aasim Qureshi, Rehan Akbar

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The main objective of the research is to propose an execution framework for workflow systems under threat. When the threat (intrusion) is detected, the workflow system needs to be stopped immediately to avoid any possible loss of enterprise data. The system becomes active again, once it is completely recovered from the threat. This proposed framework overcomes the problem of discontinuity of services as a result of threat detection by enabling the execution of the workflow on an alternate path, keeping the security and integrity of the asset information intact. Hence the system remains available all the time in a secured fashion making it possible for the end user to access the services and data even in the vulnerable state. To achieve the specified goals, the special authentication mechanism has been adopted to authorize the users after threat is detected. Then the data is hibernated that is transferred to the designed dimensions and the connectivity and access to the hibernated data is provided by the chameleon agent. These three core components enable the workflow to execute in a secured and robust manner during system's unsafe state.

Original languageEnglish
Title of host publicationProceedings of the 2010 Second International Conference on Communication Software and Networks
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages218-222
Number of pages5
ISBN (Electronic)9781424457274
ISBN (Print)9781424457267
DOIs
Publication statusPublished - 25 Mar 2010
Event2nd International Conference on Communication Software and Networks, ICCSN 2010 - Singapore, Singapore
Duration: 26 Feb 201028 Feb 2010

Conference

Conference2nd International Conference on Communication Software and Networks, ICCSN 2010
Country/TerritorySingapore
CitySingapore
Period26/02/1028/02/10

Keywords

  • chameleon
  • hibernation
  • IDS (Intrusion Detection System)
  • WFMS (Workflow Management Systems)

Fingerprint

Dive into the research topics of 'Framework for alternate execution of workflows under threat'. Together they form a unique fingerprint.

Cite this