{"id":"https://openalex.org/W2113114306","doi":"https://doi.org/10.1109/icdcs.2004.1281607","title":"Self-healing workflow systems under attacks","display_name":"Self-healing workflow systems under attacks","publication_year":2004,"publication_date":"2004-01-01","ids":{"openalex":"https://openalex.org/W2113114306","doi":"https://doi.org/10.1109/icdcs.2004.1281607","mag":"2113114306"},"language":"en","primary_location":{"id":"doi:10.1109/icdcs.2004.1281607","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdcs.2004.1281607","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"24th International Conference on Distributed Computing Systems, 2004. Proceedings.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005699613","display_name":"Mengzhu Yu","orcid":"https://orcid.org/0000-0002-5650-6065"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"M. Yu","raw_affiliation_strings":["School of Information Sciences and Technology, Pennsylvania State University, University Park, USA","Sch. of Inf. Sci. & Technol., Pennsylvania State Univ., University Park, PA, USA"],"affiliations":[{"raw_affiliation_string":"School of Information Sciences and Technology, Pennsylvania State University, University Park, USA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"Sch. of Inf. Sci. & Technol., Pennsylvania State Univ., University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002771534","display_name":"P. Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"P. Liu","raw_affiliation_strings":["School of Information Sciences and Technology, Pennsylvania State University, University Park, USA","Sch. of Inf. Sci. & Technol., Pennsylvania State Univ., University Park, PA, USA"],"affiliations":[{"raw_affiliation_string":"School of Information Sciences and Technology, Pennsylvania State University, University Park, USA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"Sch. of Inf. Sci. & Technol., Pennsylvania State Univ., University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056474248","display_name":"Wanyu Zang","orcid":null},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"W. Zang","raw_affiliation_strings":["School of Information Sciences and Technology, Pennsylvania State University, University Park, USA","Sch. of Inf. Sci. & Technol., Pennsylvania State Univ., University Park, PA, USA"],"affiliations":[{"raw_affiliation_string":"School of Information Sciences and Technology, Pennsylvania State University, University Park, USA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"Sch. of Inf. Sci. & Technol., Pennsylvania State Univ., University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5005699613"],"corresponding_institution_ids":["https://openalex.org/I130769515"],"apc_list":null,"apc_paid":null,"fwci":6.7491,"has_fulltext":false,"cited_by_count":34,"citation_normalized_percentile":{"value":0.96497967,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"418","last_page":"425"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10715","display_name":"Distributed and Parallel Computing Systems","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.6667811870574951},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6418762803077698},{"id":"https://openalex.org/keywords/self-healing","display_name":"Self-healing","score":0.4939878582954407},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35071277618408203},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.15721404552459717},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.10363063216209412}],"concepts":[{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.6667811870574951},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6418762803077698},{"id":"https://openalex.org/C2778210392","wikidata":"https://www.wikidata.org/wiki/Q1412709","display_name":"Self-healing","level":3,"score":0.4939878582954407},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35071277618408203},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.15721404552459717},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.10363063216209412},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icdcs.2004.1281607","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdcs.2004.1281607","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"24th International Conference on Distributed Computing Systems, 2004. Proceedings.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7099999785423279,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1503444820","https://openalex.org/W1587236616","https://openalex.org/W1846888456","https://openalex.org/W1988078107","https://openalex.org/W2085305295","https://openalex.org/W2100970777","https://openalex.org/W2144801589","https://openalex.org/W2149604773","https://openalex.org/W2296513999","https://openalex.org/W2296636214"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W1981780420","https://openalex.org/W2182707996","https://openalex.org/W45233828","https://openalex.org/W2964988449","https://openalex.org/W2397952901","https://openalex.org/W2029380707","https://openalex.org/W4255934811","https://openalex.org/W2465382974"],"abstract_inverted_index":{"Workflow":[0],"systems":[1],"are":[2,151],"popular":[3],"in":[4,45],"daily":[5],"business":[6],"processing.":[7],"Since":[8],"vulnerability":[9],"cannot":[10,58],"be":[11,59],"totally":[12],"removed":[13],"from":[14],"a":[15,79],"workflow":[16,33,117],"management":[17],"system,":[18,47],"successful":[19],"attacks":[20],"always":[21],"happen":[22],"and":[23,72,105,113],"may":[24],"inject":[25],"malicious":[26,97],"tasks":[27,98],"or":[28],"incorrect":[29,38],"data":[30,39,43,112],"into":[31],"the":[32,37,46,50,54,96,100,108,121,130,146,149],"system.":[34,55],"Referring":[35],"to":[36],"further":[40],"corrupt":[41],"more":[42],"objects":[44],"which":[48],"comprises":[49],"integrity":[51],"level":[52],"of":[53,86,123,148],"This":[56],"problem":[57],"efficiently":[60],"solved":[61],"by":[62,95],"existing":[63],"defense":[64],"mechanisms,":[65],"such":[66],"as":[67],"access":[68],"control,":[69],"intrusion":[70,101],"detection,":[71],"checkpoints.":[73],"In":[74],"this":[75],"paper,":[76],"we":[77],"propose":[78],"practical":[80,144],"solution":[81],"for":[82],"online":[83],"attack":[84,125],"recovery":[85,89,126],"workflows.":[87],"The":[88,136],"system":[90,103,127,142,150],"discovers":[91],"all":[92],"damages":[93,109],"caused":[94],"that":[99,140],"detection":[102],"reports":[104],"automatically":[106],"repairs":[107],"based":[110,128],"on":[111,129],"control":[114],"dependencies":[115],"among":[116],"tasks.":[118],"We":[119],"analyze":[120],"behaviors":[122],"our":[124,141],"continuous":[131],"time":[132],"Markov":[133],"chain":[134],"model.":[135],"analytical":[137],"results":[138],"demonstrate":[139],"is":[143],"when":[145],"parameters":[147],"reasonably":[152],"designed.":[153]},"counts_by_year":[{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
