ACM Transactions on Programming Languages and Systems (TOPLAS)
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
A study of time warp rollback mechanisms
ACM Transactions on Modeling and Computer Simulation (TOMACS)
A survey of intrusion detection techniques
Computers and Security
A Survey of Distributed Database Checkpointing
Distributed and Parallel Databases
Temporal sequence learning and data reduction for anomaly detection
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Rewriting Histories: Recovering from Malicious Transactions
Distributed and Parallel Databases - Security of data and transaction processing
Intrusion confinement by isolation in information systems
Journal of Computer Security - Special issue on database security
A framework for constructing features and models for intrusion detection systems
ACM Transactions on Information and System Security (TISSEC)
A Chinese wall security model for decentralized workflow systems
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Extended data dependency approach: a robust way of rebuilding database
Proceedings of the 2002 ACM symposium on Applied computing
A survey of rollback-recovery protocols in message-passing systems
ACM Computing Surveys (CSUR)
A Low-Cost Checkpointing Technique for Distributed Databases
Distributed and Parallel Databases
Recovery from Malicious Transactions
IEEE Transactions on Knowledge and Data Engineering
Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse
IEEE Transactions on Software Engineering
A Scheme to Specify and Implement Ad-Hoc Recovery in Workflow Systems
EDBT '98 Proceedings of the 6th International Conference on Extending Database Technology: Advances in Database Technology
Failure Handling for Transaction Hierarchies
ICDE '97 Proceedings of the Thirteenth International Conference on Data Engineering
COOPIS '96 Proceedings of the First IFCIS International Conference on Cooperative Information Systems
Towards a model of storage jamming
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
ODAR: an on-the-fly damage assessment and repair system for commercial database applications
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
DAIS: A Real-Time Data Attack Isolation System for Commercial Database Applications
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Surviving information warfare attacks on databases
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Multi-Version Attack Recovery for Workflow Systems
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
Self-Healing Workflow Systems under Attacks
ICDCS '04 Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04)
Design, Implementation, and Evaluation of A Repairable Database Management System
ACSAC '04 Proceedings of the 20th Annual Computer Security Applications Conference
Design, Implementation, and Evaluation of a Repairable Database Management System
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Self-securing storage: protecting data in compromised system
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
Succinct and fast accessible data structures for database damage assessment
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
A Robust Damage Assessment Model for Corrupted Database Systems
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Information and Software Technology
Hi-index | 0.00 |
Workflow systems are popular in daily business processing. Since vulnerability cannot be totally removed from a workflow management system, successful attacks always happen and may inject malicious tasks or incorrect data into the workflow system. Moreover, legitimate tasks referring to the incorrect data will further corrupt more data objects in the system. As a result, the integrity level of the system can be seriously compromised. This problem cannot be efficiently solved by existing defense mechanisms, such as access control, intrusion detection, and checkpoints. In this paper, we propose a practical solution for on-line attack recovery of workflows. The recovery system discovers all damages caused by the malicious tasks and automatically repairs the damages based on data and control dependencies between workflow tasks. We describe fundamental theories for workflow attack recovery system. Based on these theories, we build a prototype system and develop the corresponding recovery algorithms. We evaluate the performance of the recovery system under different attacking densities, intrusion detection delays and arrival rates. The experimental results show that our system is practical.