{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:04:38Z","timestamp":1742936678561,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642221903"},{"type":"electronic","value":"9783642221910"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22191-0_32","type":"book-chapter","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T00:22:53Z","timestamp":1309220573000},"page":"361-375","source":"Crossref","is-referenced-by-count":0,"title":["Analyzing Framework for Alternate Execution of Workflows for Different Types of Intrusion Threats"],"prefix":"10.1007","author":[{"given":"Sohail","family":"Safdar","sequence":"first","affiliation":[]},{"given":"Mohd Fadzil","family":"Hassan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"Safdar, S., Hassan, M.F., Qureshi, M.A., Akbar, R.: Framework for Alternate Execution of workflows under threat. In: 2nd International Conference on Communication Software and Networks ICCSN, Singapore (2010)","DOI":"10.1109\/ICCSN.2010.79"},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Safdar, S., Hassan, M.F.: Moving Towards Two Dimensional Passwords. In: International Symposium on Information Technology ITSIM, Malaysia (2010)","DOI":"10.1109\/ITSIM.2010.5561566"},{"key":"32_CR3","unstructured":"SOPHOS: a to z of Computer Secutity Threats SOPHOS (2006) , http:\/\/security.ucdavis.edu\/sophos_atoz.pdf (retrieved on January 17, 2011)"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Yang, D., Yang, B.: A New Password Authentication Scheme Using Fuzzy Extractor with Smart Card. In: 2009 International Conference on Computational Intelligence and Security, pp. 278\u2013282 (2009)","DOI":"10.1109\/CIS.2009.44"},{"issue":"4","key":"32_CR5","first-page":"17","volume":"10","author":"P.C.V. Oorschot","year":"2008","unstructured":"Oorschot, P.C.V., Thorpe, J.: On Predictive Models and User-Drawn Graphical Passwords. ACM Transactions on Information and System Security\u00a010(4), article 17 (2008)","journal-title":"ACM Transactions on Information and System Security"},{"key":"32_CR6","unstructured":"ChunLei, L., YunHong, W., LiNing, L.: A Biometric Templates Secure Transmission Method Based on Bi-layer Watermarking and PKI. In: 2009 International Conference on Multimedia Information Networking and Security, China (2009)"},{"key":"32_CR7","volume-title":"19th Annual Computer Security Applications Conference ACSAC","author":"Y. Meng","year":"2003","unstructured":"Meng, Y., Peng, L., Wanyu, Z.: Multi-Version Attack Recovery for Workflow Systems. In: 19th Annual Computer Security Applications Conference ACSAC,1063-9527\/03. IEEE, Los Alamitos (2003)"},{"key":"32_CR8","volume-title":"24th International Conference on Distributed Computing Systems ICDCS","author":"Y. Meng","year":"2004","unstructured":"Meng, Y., Peng, L., Wanyu, Z.: Self-Healing Workflow Systems under Attacks. In: 24th International Conference on Distributed Computing Systems ICDCS, 1063-6927\/04. IEEE, Los Alamitos (2004)"},{"key":"32_CR9","volume-title":"Eighth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing ISORC","author":"C.K. Fung","year":"2005","unstructured":"Fung, C.K., Hung, P.C.K.: System Recovery through Dynamic Regeneration of Workflow Specification. In: Eighth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing ISORC, 0-7695-2356-0\/05. IEEE, Los Alamitos (2005)"},{"key":"32_CR10","volume-title":"International Conference on Web Services ICWS","author":"C.K. Fung","year":"2006","unstructured":"Fung, C.K., Hung, P.C.K., Kearns, W.M., Uczekaj, S.A.: Dynamic Regeneration of Workflow Specification with Access Control Requirements in MANET. In: International Conference on Web Services ICWS, 0-7695-2669-1\/06. IEEE, Los Alamitos (2006)"},{"key":"32_CR11","volume-title":"Third International Workshop on Software Engineering for Secure Systems SESS","author":"K. Xiao","year":"2007","unstructured":"Xiao, K., Chen, N., Ren, S., Kwiat, K., Macalik, M.: A Workflow-based Non-intrusive Approach for Enhancing the Survivability of Critical Infrastructures in Cyber Environment. In: Third International Workshop on Software Engineering for Secure Systems SESS, 0-7695-2952-6\/07. IEEE, Los Alamitos (2007)"},{"key":"32_CR12","volume-title":"41st Hawaii International Conference on System Sciences","author":"G. Goluch","year":"2008","unstructured":"Goluch, G., Ekelhart, A., Fenz, S., Jakoubi, S., Tjoa, S., M\u00fcck, T.: Integration of an Ontological Information Security Concept in Risk-Aware Business Process Management. In: 41st Hawaii International Conference on System Sciences. IEEE, Los Alamitos (2008)"},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"Meier, J.D.: Web Application Security Engineering. IEEE Security Magazine,1540-7993\/06, 16\u201324 (2006)","DOI":"10.1109\/MSP.2006.109"},{"key":"32_CR14","unstructured":"Virdell, M.: Business processes and workflow in the Web services world, http:\/\/www.ibm.com\/developerworks\/webservices\/library\/ws-work.html , IBM (2003) (retrieved on January 17, 2011)"},{"key":"32_CR15","unstructured":"Mitchell, S.: Encrypting Sensitive Data in a Database. In: MSDN Spotlight (2005)"},{"key":"32_CR16","unstructured":"Hsueh, S.: Database Encryption in SQL Server 2008. Enterprise Edition SQL Server Technical Article (2008)"},{"key":"32_CR17","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1109\/TKDE.2002.1033782","volume":"14","author":"P. Ammann","year":"2002","unstructured":"Ammann, P., Jajodia, S., Liu, P.: Recovery from malicious transactions. IEEE Transactions on Knowledge and Data Engineering\u00a014, 1167\u20131185 (2002)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"32_CR18","volume-title":"Concurrency Control and Recovery in Database Systems","author":"P.A. Bernstein","year":"1987","unstructured":"Bernstein, P.A., Hadzilacos, V., Goodman, N.: Concurrency Control and Recovery in Database Systems. Addison-Wesley, Reading (1987)"},{"key":"32_CR19","unstructured":"Chrysanthis. P.: A framework for modeling and reasoning out extended transactions. PhD thesis, University of Massachusetts, Amherst, Amherst, Massachusetts (1991)"},{"key":"32_CR20","doi-asserted-by":"crossref","unstructured":"Eder, J., Liebhart, W.: Workflow Recovery. In: Conference on Cooperative Information Systems, pp. 124\u2013134 (1996)","DOI":"10.1109\/COOPIS.1996.555004"},{"key":"32_CR21","doi-asserted-by":"crossref","unstructured":"Gore, M.M., Ghosh, R.K.: Recovery in Distributed Extended Long-lived Transaction Models. In: 6th International Conference DataBase Systems for Advanced Applications, pp. 313\u2013320 (1998)","DOI":"10.1109\/DASFAA.1999.765765"},{"key":"32_CR22","first-page":"555","volume-title":"International Conference on Management of Data","author":"B. Kiepuszewski","year":"1998","unstructured":"Kiepuszewski, B., Muhlberger, R., Orlowska, M.: Flowback: Providing backward recovery for workflow systems. In: International Conference on Management of Data, pp. 555\u2013557. ACM SIGMOD, New York (1998)"},{"issue":"4","key":"32_CR23","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1109\/3468.935047","volume":"31","author":"C. Lala","year":"2001","unstructured":"Lala, C., Panda, B.: Evaluating damage from cyber attacks. IEEE Transactions on Systems, Man and Cybernetics\u00a031(4), 300\u2013303 (2001)","journal-title":"IEEE Transactions on Systems, Man and Cybernetics"},{"key":"32_CR24","unstructured":"Red Kestral, Random Password Strength (2004), http:\/\/www.redkestrel.co.uk\/Articles\/RandomPasswordStrength.html Red Kestral Consulting (retrieved on September14, 2009)"},{"issue":"1","key":"32_CR25","first-page":"47","volume":"6","author":"S. Safdar","year":"2009","unstructured":"Safdar, S., Hassan, M.F., Qureshi, M.A., Akbar, R.: Biologically Inspired Execution Framework for Vulnerable Workflow Systems. International Journal of Computer Science and Information Security IJCSIS\u00a06(1), 47\u201351 (2009)","journal-title":"International Journal of Computer Science and Information Security IJCSIS"},{"key":"32_CR26","doi-asserted-by":"crossref","unstructured":"Safdar, S., Hassan, M.F., Qureshi, M.A., Akbar, R.: Authentication Model Based on Reformation Mapping Method. In: International Conference on Information and Emerging Technologies ICIET IEEE, Pakistan (2010)","DOI":"10.1109\/ICIET.2010.5625708"},{"key":"32_CR27","volume-title":"2011 IEEE Symposium on Computers and Informatics ISCI","author":"S. Safdar","year":"2011","unstructured":"Safdar, S., Hassan, M.F., Qureshi, M.A., Akbar, R.: Data Hibernation Framework for Workflows under Intrusion Threat. In: 2011 IEEE Symposium on Computers and Informatics ISCI. IEEE, Los Alamitos (2011)"}],"container-title":["Communications in Computer and Information Science","Software Engineering and Computer Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22191-0_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T19:23:36Z","timestamp":1741289016000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22191-0_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642221903","9783642221910"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22191-0_32","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}