메뉴 건너뛰기




Volumn 32, Issue 1, 2009, Pages 158-183

The implementation and evaluation of a recovery system for workflows

Author keywords

Attack recovery; Performance evaluation; Quality of information assurance

Indexed keywords

ACCESS CONTROL; INTRUSION DETECTION; MANAGEMENT; RECOVERY; WORK SIMPLIFICATION;

EID: 55949102930     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2008.03.007     Document Type: Article
Times cited : (5)

References (46)
  • 1
    • 0030649084 scopus 로고    scopus 로고
    • Ammann P, Jajodia S, McCollum CD, Blaustein BT. Surviving information warfare attacks on databases. In: Proceedings of the IEEE symposium on security and privacy, Oakland, CA, May 1997. p. 164-74.
    • Ammann P, Jajodia S, McCollum CD, Blaustein BT. Surviving information warfare attacks on databases. In: Proceedings of the IEEE symposium on security and privacy, Oakland, CA, May 1997. p. 164-74.
  • 3
    • 0035750945 scopus 로고    scopus 로고
    • Atluri V, Chun SA, Mazzoleni P. A Chinese wall security model for decentralized workflow systems. In: Proceedings of the 8th ACM conference on computer and communications security. New York: ACM Press; 2001. p. 48-57.
    • Atluri V, Chun SA, Mazzoleni P. A Chinese wall security model for decentralized workflow systems. In: Proceedings of the 8th ACM conference on computer and communications security. New York: ACM Press; 2001. p. 48-57.
  • 4
    • 55949109860 scopus 로고    scopus 로고
    • Barbara D, Goel R, Jajodia S. Using checksums to detect data corruption. In: Proceedings of the 2000 international conference on extending data base technology, March 2000.
    • Barbara D, Goel R, Jajodia S. Using checksums to detect data corruption. In: Proceedings of the 2000 international conference on extending data base technology, March 2000.
  • 5
    • 0030647982 scopus 로고    scopus 로고
    • Chen Q, Dayal U. Failure handling for transaction hierarchies. In: Gray A, Larson P, editors. Proceedings of the 13th international conference on data engineering. Birmingham, UK: IEEE Computer Society; April 7-11, 1997. p. 245-54.
    • Chen Q, Dayal U. Failure handling for transaction hierarchies. In: Gray A, Larson P, editors. Proceedings of the 13th international conference on data engineering. Birmingham, UK: IEEE Computer Society; April 7-11, 1997. p. 245-54.
  • 6
    • 21644459044 scopus 로고    scopus 로고
    • Chiueh T, Pilania D. Design, implementation, and evaluation of a repairable database management system. In: Annual computer security applications conference, 2004. p. 179-88.
    • Chiueh T, Pilania D. Design, implementation, and evaluation of a repairable database management system. In: Annual computer security applications conference, 2004. p. 179-88.
  • 7
    • 28444455187 scopus 로고    scopus 로고
    • Chiueh T, Pilania D. Design, implementation, and evaluation of a repairable database management system. In: International conference on data engineering, 2005. p. 1024-35.
    • Chiueh T, Pilania D. Design, implementation, and evaluation of a repairable database management system. In: International conference on data engineering, 2005. p. 1024-35.
  • 8
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • Denning D.E. An intrusion-detection model. IEEE Trans Software Eng SE-13 (1987) 222-232
    • (1987) IEEE Trans Software Eng , vol.SE-13 , pp. 222-232
    • Denning, D.E.1
  • 9
    • 84992012238 scopus 로고    scopus 로고
    • Eder J, Liebhart W. Workflow recovery. In: Conference on cooperative information systems, 1996. p. 124-34.
    • Eder J, Liebhart W. Workflow recovery. In: Conference on cooperative information systems, 1996. p. 124-34.
  • 11
    • 84964528983 scopus 로고    scopus 로고
    • Ganger GR, Khosla PK, Bakkaloglu M, Bigrigg MW, Goodson GR, Oguz S, et al. Survivable storage systems. In: DARPA information survivability conference and exposition, vol. 2. Anaheim, CA: IEEE; June 12-14, 2001. p. 184-95.
    • Ganger GR, Khosla PK, Bakkaloglu M, Bigrigg MW, Goodson GR, Oguz S, et al. Survivable storage systems. In: DARPA information survivability conference and exposition, vol. 2. Anaheim, CA: IEEE; June 12-14, 2001. p. 184-95.
  • 12
    • 55949132526 scopus 로고    scopus 로고
    • Graubart R, Schlipper L, McCollum C. Defending database management systems against information warfare attacks. Technical report, The MITRE Corporation; 1996.
    • Graubart R, Schlipper L, McCollum C. Defending database management systems against information warfare attacks. Technical report, The MITRE Corporation; 1996.
  • 13
    • 0027668428 scopus 로고
    • Statistical foundations of audit trail analysis for the detection of computer misuse
    • Helman P., and Liepins G. Statistical foundations of audit trail analysis for the detection of computer misuse. IEEE Trans Software Eng 19 9 (1993) 886-901
    • (1993) IEEE Trans Software Eng , vol.19 , Issue.9 , pp. 886-901
    • Helman, P.1    Liepins, G.2
  • 14
    • 55949089603 scopus 로고    scopus 로고
    • Jagannathan R, Lunt T. System design document: next generation intrusion detection expert system (nides). Technical report, SRI International, Menlo Park, CA; 1993.
    • Jagannathan R, Lunt T. System design document: next generation intrusion detection expert system (nides). Technical report, SRI International, Menlo Park, CA; 1993.
  • 16
    • 84962309834 scopus 로고    scopus 로고
    • Knight J, Sullivan K, Elder M, Wang C. Survivability architectures: issues and approaches. In: Proceedings of the 2000 DARPA information survivability conference and exposition, CA, June 2000. p. 157-71.
    • Knight J, Sullivan K, Elder M, Wang C. Survivability architectures: issues and approaches. In: Proceedings of the 2000 DARPA information survivability conference and exposition, CA, June 2000. p. 157-71.
  • 17
    • 0032218214 scopus 로고    scopus 로고
    • Lane T, Brodley CE. Temporal sequence learning and data reduction for anomaly detection. In: Proceedings of the 5th ACM conference on computer and communications security, San Francisco, CA, November 1998.
    • Lane T, Brodley CE. Temporal sequence learning and data reduction for anomaly detection. In: Proceedings of the 5th ACM conference on computer and communications security, San Francisco, CA, November 1998.
  • 18
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • Lee W., and Stolfo S.J. A framework for constructing features and models for intrusion detection systems. ACM Trans Inf Syst Security 3 4 (2000) 227-261
    • (2000) ACM Trans Inf Syst Security , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 19
    • 84940104123 scopus 로고    scopus 로고
    • Lee W, Stolfo S, Mok K. A data mining framework for building intrusion detection models. In: Proceedings of the 1999 IEEE symposium on security and privacy, Oakland, CA, May 1999.
    • Lee W, Stolfo S, Mok K. A data mining framework for building intrusion detection models. In: Proceedings of the 1999 IEEE symposium on security and privacy, Oakland, CA, May 1999.
  • 20
    • 0031175735 scopus 로고    scopus 로고
    • A survey of distributed database checkpointing
    • Lin J.-L., and Dunham M.H. A survey of distributed database checkpointing. Distrib Parallel Databases 5 3 (1997) 289-319
    • (1997) Distrib Parallel Databases , vol.5 , Issue.3 , pp. 289-319
    • Lin, J.-L.1    Dunham, M.H.2
  • 21
    • 0035689145 scopus 로고    scopus 로고
    • A low-cost checkpointing technique for distributed databases
    • Lin J.-L., and Dunham M.H. A low-cost checkpointing technique for distributed databases. Distrib Parallel Databases 10 3 (2001) 241-268
    • (2001) Distrib Parallel Databases , vol.10 , Issue.3 , pp. 241-268
    • Lin, J.-L.1    Dunham, M.H.2
  • 23
    • 82955176200 scopus 로고    scopus 로고
    • Liu P. Dais: a real-time data attack isolation system for commercial database applications. In: Proceedings of the 17th annual computer security applications conference, 2001.
    • Liu P. Dais: a real-time data attack isolation system for commercial database applications. In: Proceedings of the 17th annual computer security applications conference, 2001.
  • 24
    • 0034829988 scopus 로고    scopus 로고
    • Liu P, Jajodia S. Multi-phase damage confinement in database systems for intrusion tolerance. In: Proceedings of the 14th IEEE computer security foundations workshop, Nova Scotia, Canada, June 2001.
    • Liu P, Jajodia S. Multi-phase damage confinement in database systems for intrusion tolerance. In: Proceedings of the 14th IEEE computer security foundations workshop, Nova Scotia, Canada, June 2001.
  • 25
    • 55949119756 scopus 로고    scopus 로고
    • Liu P, Wang Y. The design and implementation of a multiphase database damage confinement system. In: Proceedings of the 2002 IFIP WG 11.3 working conference on data and application security, 2002.
    • Liu P, Wang Y. The design and implementation of a multiphase database damage confinement system. In: Proceedings of the 2002 IFIP WG 11.3 working conference on data and application security, 2002.
  • 26
    • 0033871806 scopus 로고    scopus 로고
    • Rewriting histories: recovery from malicious transactions
    • Liu P., Ammann P., and Jajodia S. Rewriting histories: recovery from malicious transactions. Distrib Parallel Databases 8 1 (2000) 7-40
    • (2000) Distrib Parallel Databases , vol.8 , Issue.1 , pp. 7-40
    • Liu, P.1    Ammann, P.2    Jajodia, S.3
  • 27
    • 0034513874 scopus 로고    scopus 로고
    • Intrusion confinement by isolation in information systems
    • Liu P., Jajodia S., and McCollum C.D. Intrusion confinement by isolation in information systems. J Comput Security 8 4 (2000) 243-279
    • (2000) J Comput Security , vol.8 , Issue.4 , pp. 243-279
    • Liu, P.1    Jajodia, S.2    McCollum, C.D.3
  • 28
    • 55949116584 scopus 로고    scopus 로고
    • Luenam P, Liu P. Odar: an on-the-fly damage assessment and repair system for commercial database applications. In: Proceedings of the 2001 IFIP WG 11.3 working conference on database and application security, 2001.
    • Luenam P, Liu P. Odar: an on-the-fly damage assessment and repair system for commercial database applications. In: Proceedings of the 2001 IFIP WG 11.3 working conference on database and application security, 2001.
  • 29
    • 55949094230 scopus 로고    scopus 로고
    • Luenam P, Liu P. The design of an adaptive intrusion tolerant database system. In: Proceedings of the IEEE workshop on intrusion tolerant systems, 2002.
    • Luenam P, Liu P. The design of an adaptive intrusion tolerant database system. In: Proceedings of the IEEE workshop on intrusion tolerant systems, 2002.
  • 30
    • 55949125814 scopus 로고    scopus 로고
    • Lunt T, McCollum C. Intrusion detection and response research at DARPA. Technical report, The MITRE Corporation, McLean, VA; 1998.
    • Lunt T, McCollum C. Intrusion detection and response research at DARPA. Technical report, The MITRE Corporation, McLean, VA; 1998.
  • 31
    • 55949088669 scopus 로고    scopus 로고
    • Lunt T, Tamaru A, Gilham F, Jagannathan R, Jalali C, Javitz HS, et al. A real time intrusion detection expert system (IDES). Technical report, SRI International, Menlo Park, CA; 1992.
    • Lunt T, Tamaru A, Gilham F, Jagannathan R, Jalali C, Javitz HS, et al. A real time intrusion detection expert system (IDES). Technical report, SRI International, Menlo Park, CA; 1992.
  • 32
    • 0027609384 scopus 로고
    • A survey of intrusion detection techniques
    • Lunt T.F. A survey of intrusion detection techniques. Comput Security 12 4 (1993) 405-418
    • (1993) Comput Security , vol.12 , Issue.4 , pp. 405-418
    • Lunt, T.F.1
  • 33
    • 0029718782 scopus 로고    scopus 로고
    • McDermott J, Goldschlag D. Towards a model of storage jamming. In: Proceedings of the IEEE computer security foundations workshop, Kenmare, Ireland, June 1996. p. 176-85.
    • McDermott J, Goldschlag D. Towards a model of storage jamming. In: Proceedings of the IEEE computer security foundations workshop, Kenmare, Ireland, June 1996. p. 176-85.
  • 34
    • 84961726931 scopus 로고    scopus 로고
    • Medhi D, Tipper D. Multi-layered network survivability-models, analysis, architecture, framework and implementation: an overview. In: Proceedings of the 2000 DARPA information survivability conference and exposition, CA, June 2000. p. 173-86.
    • Medhi D, Tipper D. Multi-layered network survivability-models, analysis, architecture, framework and implementation: an overview. In: Proceedings of the 2000 DARPA information survivability conference and exposition, CA, June 2000. p. 173-86.
  • 36
    • 0036037097 scopus 로고    scopus 로고
    • Panda B, Haque KA. Extended data dependency approach: a robust way of rebuilding database. In: SAC '02: proceedings of the 2002 ACM symposium on applied computing. New York, NY, USA: ACM Press; 2002. p. 446-52.
    • Panda B, Haque KA. Extended data dependency approach: a robust way of rebuilding database. In: SAC '02: proceedings of the 2002 ACM symposium on applied computing. New York, NY, USA: ACM Press; 2002. p. 446-52.
  • 37
    • 84964546164 scopus 로고    scopus 로고
    • Stavridou V. Intrusion tolerant software architectures. In: Proceedings of the 2001 DARPA information survivability conference and exposition, CA, June 2001.
    • Stavridou V. Intrusion tolerant software architectures. In: Proceedings of the 2001 DARPA information survivability conference and exposition, CA, June 2001.
  • 38
    • 84978374045 scopus 로고    scopus 로고
    • Strunk JD, Goodson GR, Scheinholtz ML, Soules CAN, Ganger GR. Self-securing storage: protecting data in compromised systems. In: Operating systems design and implementation. USENIX Association: San Diego, CA; October 23-25, 2000. p. 165-80.
    • Strunk JD, Goodson GR, Scheinholtz ML, Soules CAN, Ganger GR. Self-securing storage: protecting data in compromised systems. In: Operating systems design and implementation. USENIX Association: San Diego, CA; October 23-25, 2000. p. 165-80.
  • 39
    • 21944450970 scopus 로고    scopus 로고
    • Tang J, Hwang S-Y. A scheme to specify and implement ad-hoc recovery in workflow systems. Lecture notes in computer science, vol. 1377. Berlin: Springer; 1998. p. 484-98.
    • Tang J, Hwang S-Y. A scheme to specify and implement ad-hoc recovery in workflow systems. Lecture notes in computer science, vol. 1377. Berlin: Springer; 1998. p. 484-98.
  • 40
    • 55949117741 scopus 로고    scopus 로고
    • Workflow Management Coalition Workflow Standard. Process definition interface-xml process definition language, 2005 〈http://www.wfmc.org/standards/docs/TC-1025_xpdl_2_2005-10-03.pdf〉.
    • Workflow Management Coalition Workflow Standard. Process definition interface-xml process definition language, 2005 〈http://www.wfmc.org/standards/docs/TC-1025_xpdl_2_2005-10-03.pdf〉.
  • 42
    • 55949093649 scopus 로고    scopus 로고
    • Wylie JJ, Bakkaloglu M, Pandurangan V, Bigrigg MW, Oguz S, Tew K, et al. Selecting the right data distribution scheme for a survivable storage system. Technical Report CMU-CS-01-120, Carnegie Mellon University; 2001.
    • Wylie JJ, Bakkaloglu M, Pandurangan V, Bigrigg MW, Oguz S, Tew K, et al. Selecting the right data distribution scheme for a survivable storage system. Technical Report CMU-CS-01-120, Carnegie Mellon University; 2001.
  • 43
    • 84944718313 scopus 로고    scopus 로고
    • Yu M, Liu P, Zang W. Multi-version based attack recovery of workflow. In: The 19th annual computer security applications conference, December 2003. p. 142-51.
    • Yu M, Liu P, Zang W. Multi-version based attack recovery of workflow. In: The 19th annual computer security applications conference, December 2003. p. 142-51.
  • 44
    • 2442492179 scopus 로고    scopus 로고
    • Yu M, Liu P, Zang W. Self-healing workflow systems under attacks. In: The 24th international conference on distributed computing systems (ICDCS'04), 2004. p. 418-25.
    • Yu M, Liu P, Zang W. Self-healing workflow systems under attacks. In: The 24th international conference on distributed computing systems (ICDCS'04), 2004. p. 418-25.
  • 45
    • 35048875281 scopus 로고    scopus 로고
    • Zhou J, Panda B, Hu Y. Succinct and fast accessible data structures for database damage assessment. In: Distributed computing and internet technology, 2004. p. 420-9.
    • Zhou J, Panda B, Hu Y. Succinct and fast accessible data structures for database damage assessment. In: Distributed computing and internet technology, 2004. p. 420-9.
  • 46
    • 75549088530 scopus 로고    scopus 로고
    • Zuo Y, Panda B. Damage discovery in distributed database systems. In: Database security, 2004. p. 111-23.
    • Zuo Y, Panda B. Damage discovery in distributed database systems. In: Database security, 2004. p. 111-23.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.