eprintid: 1259 rev_number: 2 eprint_status: archive userid: 1 dir: disk0/00/00/12/59 datestamp: 2023-11-09 15:49:25 lastmod: 2023-11-09 15:49:25 status_changed: 2023-11-09 15:39:20 type: conference_item metadata_visibility: show creators_name: Safdar, S. creators_name: Hassan, M.F. creators_name: Qureshi, M.A. creators_name: Akbar, R. title: Framework for alternate execution of workflows under threat ispublished: pub keywords: Alternate path; Authentication mechanisms; Core components; End users; Enterprise data; Execution framework; IDS(intrusion detection system); Threat detection; Work-flow systems; Work-flows; Workflow Management Systems, Computer crime; Computer software; Management; Work simplification, Intrusion detection note: cited By 12; Conference of 2nd International Conference on Communication Software and Networks, ICCSN 2010 ; Conference Date: 26 February 2010 Through 28 February 2010; Conference Code:80255 abstract: The main objective of the research is to propose an execution framework for workflow systems under threat. When the threat (intrusion) is detected, the workflow system needs to be stopped immediately to avoid any possible loss of enterprise data. The system becomes active again, once it is completely recovered from the threat. This proposed framework overcomes the problem of discontinuity of services as a result of threat detection by enabling the execution of the workflow on an alternate path, keeping the security and integrity of the asset information intact. Hence the system remains available all the time in a secured fashion making it possible for the end user to access the services and data even in the vulnerable state. To achieve the specified goals, the special authentication mechanism has been adopted to authorize the users after threat is detected. Then the data is hibernated that is transferred to the designed dimensions and the connectivity and access to the hibernated data is provided by the chameleon agent. These three core components enable the workflow to execute in a secured and robust manner during system's unsafe state. © 2010 IEEE. date: 2010 official_url: https://www.scopus.com/inward/record.uri?eid=2-s2.0-77952362622&doi=10.1109%2fICCSN.2010.79&partnerID=40&md5=bf2dc08dcb99fe56f0a08380fd0ed45d id_number: 10.1109/ICCSN.2010.79 full_text_status: none publication: 2nd International Conference on Communication Software and Networks, ICCSN 2010 place_of_pub: Singapore pagerange: 218-222 refereed: TRUE isbn: 9780769539614 citation: Safdar, S. and Hassan, M.F. and Qureshi, M.A. and Akbar, R. (2010) Framework for alternate execution of workflows under threat. In: UNSPECIFIED.