Dynamic workflow generation with interoperable security alerts in MANET

被引:0
|
作者
Fung, Casey K. [1 ]
Hung, Patrick C. K.
Kearns, William M.
Uczekaj, Stephen A. [1 ]
机构
[1] Boeing Phantom Works, Network Centr Operat, Seal Beach, CA 90740 USA
关键词
survivability; MANET; attack tree; security threats; web services; WSBPEL; RSS; exceptional handling;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Distributed software systems are the basis for innovative applications. Agility is the key for achieving survivable and maintainable distributed systems because the non-deterministic nature of distribution would otherwise leave the system uncontrollable, especially in emerging mobile ad-hoc networks. A mobile ad-hoc network (MANET) is based on a self-organizing and rapidly deployed network of mobile services that collaborate without using any preexisting fixed network infrastructure. Survivability is defined as the capability of a service to fulfill its mission in a timely manner, even in the presence of attacks, threats, or failures. Any failure of a single system may affect a business process; however, the monitoring of many mobile services simultaneously is not an easy task. This paper bridges the analyses of business processes and security threats with an alert mechanism. We propose an integrated approach to engineer a survivable distributed system through dynamic workflow generation in the context of Web Services Business Process Execution Language (WSBPEL), and Really Simple Syndication (RSS).
引用
收藏
页码:418 / +
页数:3
相关论文
共 50 条
  • [1] Workflow for building interoperable food and nutrition security (FNS) data platforms
    Emara, Yasmine
    Seljak, Barbara Korousic
    Gibney, Eileen R.
    Popovski, Gorjan
    Pravst, Igor
    Fantke, Peter
    [J]. TRENDS IN FOOD SCIENCE & TECHNOLOGY, 2022, 123 : 310 - 321
  • [2] Optimal Key Generation Policies for MANET Security
    Al-Zubaidy, Hussein
    Lambadaris, Ioannis
    Viniotis, Yannis
    Huang, Changcheng
    Hwang, Ren-Hung
    [J]. 2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [3] Dynamic regeneration of workflow specification with access control requirements in MANET
    Fung, Casey K.
    Hung, Patrick C. K.
    Kearns, William M.
    Uczekaj, Stephen A.
    [J]. ICWS 2006: IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS, 2006, : 761 - 769
  • [4] Dynamic Workflow Adjustment with Security Constraints
    Lu, Haibing
    Hong, Yuan
    Yang, Yanjiang
    Fang, Yi
    Duan, Lian
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 211 - 226
  • [5] A hybrid cryptography model for managing security in dynamic topology of MANET
    Razi, Maqsood
    Quamar, Jawaid
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, 2008, : 229 - 235
  • [6] Dynamic anomaly detection using cross layer security in MANET
    Usha, G.
    Babu, M. Rajesh
    Kumar, S. Saravana
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 : 231 - 241
  • [7] Advancing security and efficiency in MANET using dynamic algorithm switching
    Anand, M. Vijay
    Krishnamurthy, Anand
    Subramanian, Karuppiah
    Raju, Saravanan
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024,
  • [8] Making Canonical Workflow Building Blocks Interoperable across Workflow Languages
    Soiland-Reyes, Stian
    Bayarri, Genis
    Andrio, Pau
    Long, Robin
    Lowe, Douglas
    Niewielska, Ania
    Hospital, Adam
    Groth, Paul
    [J]. DATA INTELLIGENCE, 2022, 4 (02) : 342 - 357
  • [9] Making Canonical Workflow Building Blocks Interoperable across Workflow Languages
    Stian Soiland-Reyes
    Genís Bayarri
    Pau Andrio
    Robin Long
    Douglas Lowe
    Ania Niewielska
    Adam Hospital
    Paul Groth
    [J]. Data Intelligence, 2022, 4 (02) : 342 - 357
  • [10] Distributed, interoperable workflow support for electronic commerce
    Papazoglou, MP
    Jeusfeld, MA
    Weigand, H
    Jarke, M
    [J]. TRENDS IN DISTRIBUTED SYSTEMS FOR ELECTRONIC COMMERCE, 1998, 1402 : 192 - 204