Specifying and using intrusion masking models to process distributed operations
Journal of Computer Security
Can-Follow Concurrency Control
IEEE Transactions on Computers
Dynamic data recovery for database systems based on fine grained transaction log
IDEAS '08 Proceedings of the 2008 international symposium on Database engineering & applications
The implementation and evaluation of a recovery system for workflows
Journal of Network and Computer Applications
Optimizing security measures in an intrusion tolerant database system
ISAS'08 Proceedings of the 5th international conference on Service availability
Damage assessment and repair in attack resilient distributed database systems
Computer Standards & Interfaces
Dynamic damage recovery for web databases
Journal of Computer Science and Technology
Availability analysis of an IMS-based VoIP network system
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part IV
Modeling and evaluating the survivability of an intrusion tolerant database system
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
A dead-lock free self-healing algorithm for distributed transactional processes
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Quantitative survivability evaluation of three virtual machine-based server architectures
Journal of Network and Computer Applications
Hi-index | 0.00 |
Workflow systems are popular in daily business processing. Since vulnerability cannot be totally removed from a workflow management system, successful attacks always happen and may inject malicious tasks or incorrect data into the workflow system. Referring to the incorrect data will further corrupt more data objects in the system, which comprises the integrity level of the system. This problem cannot be efficiently solved by existing defense mechanisms, such as access control, intrusion detection, and checkpoints. In this paper, we propose a practical solution for on-line attack recovery of workflows. The recovery system discovers all damages caused by the malicious tasks that the intrusion detection system reports and automatically repairs the damages based on data and control dependencies among workflow tasks. We analyze the behaviors of our attack recovery system based on the Continuous Time Markov Chain model. The analytical results demonstrate that our system is practical when the parameters of the system are reasonably designed.