Data hibernation framework in workflows under intrusion threat

Safdar, S. and Hassan, M.F. and Qureshi, M.A. and Akbar, R. (2011) Data hibernation framework in workflows under intrusion threat. In: UNSPECIFIED.

Full text not available from this repository.
Official URL: https://www.scopus.com/inward/record.uri?eid=2-s2....

Abstract

The main objective of the research is to define and propose a framework for data hibernation in the workflows under intrusion threat. When the intrusion is detected, the data services need to be discontinued immediately to retain the security and the integrity of the valuable data, till the system is recovered from the threat. By discontinuing data services, the end users may face inconveniences in using the system because of its temporary unavailability. Data hibernation addresses a mechanism of secure transferring of data and providing an access of the data alternatively keeping the data integrity intact. Data hibernation involves three steps i.e. designing an alternate schema for storing data, transferring data to that alternate storage and providing an access to that data. Hence the system can continue to provide data services securely to the end user even in the threat situations. © 2011 IEEE.

Item Type: Conference or Workshop Item (UNSPECIFIED)
Additional Information: cited By 3; Conference of 2011 IEEE Symposium on Computers and Informatics, ISCI 2011 ; Conference Date: 20 March 2011 Through 22 March 2011; Conference Code:86204
Uncontrolled Keywords: Data Hibernation; Data integrity; Data services; Dimensions; End users; IDS(intrusion detection system); System availability; Work-flows, Information science, Intrusion detection
Depositing User: Mr Ahmad Suhairi UTP
Date Deposited: 09 Nov 2023 15:50
Last Modified: 09 Nov 2023 15:50
URI: https://khub.utp.edu.my/scholars/id/eprint/1937

Actions (login required)

View Item
View Item