Recovering from malicious attacks in workflow systems

  • Authors:
  • Yajie Zhu;Tai Xin;Indrakshi Ray

  • Affiliations:
  • Department of Computer Science, Colorado State University;Department of Computer Science, Colorado State University;Department of Computer Science, Colorado State University

  • Venue:
  • DEXA'05 Proceedings of the 16th international conference on Database and Expert Systems Applications
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Workflow management systems (WFMS) coordinate execution of logically related multiple tasks in an organization. Such coordination is achieved through dependencies that are specified between the tasks of a workflow. Often times preventive measures are not enough and a workflow may be subjected to malicious attacks. Traditional workflow recovery mechanisms do not address how to recover from malicious attacks. Database survivability techniques do not work for workflow because tasks in a workflow have dependencies that are not present in traditional transaction processing systems. In this paper, we present an algorithm that shows how we can assess and repair the effects of damage caused by malicious tasks. Our algorithm focuses not only on restoring the consistency of data items by removing the effects of malicious tasks but also takes appropriate actions to ensure the satisfaction of task dependencies among all the committed tasks.