International Journal of Education and Management Engineering(IJEME)

ISSN: 2305-3623 (Print), ISSN: 2305-8463 (Online)

Published By: MECS Press

IJEME Vol.2, No.6, Jun. 2012

An Initiative Mechanism of Safe-guarding the Codes of Migrating Instance in Migrating Workflow Based on Danger Theory

Full Text (PDF, 203KB), PP.67-74

Views:49   Downloads:1


Li Baohui,Han Fangxi,Wang Xiaolin

Index Terms

Temporary attacks;perceive changes;perceive dangers;amend damaged codes


The mobility of Migrating Instance(MI) brings many risks to the migrating workflow system. Especially, the codes of MI face the risk of being maliciously manipulated by the hostile working places. This paper presents an initiative mechanism of safe-guarding the codes of MI based on danger theory: for MI consists of several modules in order to complete relative tasks, MI will detect whether the block MI determines to run changed before executing. If there are some changes, MI will then perceive whether the changes dangerous; if dangerous, appropriate measures will be taken to amend the damaged codes and then obfuscate them lest this module will be attacked easily again. This mechanism improves the efficiency of MI compared with other mechanism, and makes MI avoid temporary attacks, which are illustrated with the experimental results at the end of this paper.

Cite This Paper

Li Baohui,Han Fangxi,Wang Xiaolin,"An Initiative Mechanism of Safe-guarding the Codes of Migrating Instance in Migrating Workflow Based on Danger Theory", IJEME, vol.2, no.6, pp.67-74, 2012.


[1] Zeng Guangzhou,Dang Yan.The Study of Migrating Workflow Based on the Mobile Computing Paradigm.Chinese Journal of Computers,2003,26(10):13l3-13l9 (In Chinese).

[2] Guo Jingang,Zeng Guangzhou.Integrity Detection for Migrating Instance Based on Biology Immue.Computer Engineering,2008,34(12): 184-186 (In Chinese).

[3] Xiong Yunping,Zeng Guangzhou.Application of Artificial Immunology in Migrating Instance Integrity Detection.Journal of Computer Applications,2006,26(7):1514-1516 (In Chinese).

[4] Li Tao.Detection of Network Security Risk Based on Immune.Science in China(E Series-Information Science),2005,35(8):798−816 (In Chinese).

[5] Zhou Zhenyu,Zhang Qi,Shen Jianjing.The Danger Theory Inspired Approach to Network Security Assessment.Computer Application and Software,2006,23[11]:111-113 (In Chinese).

[6] Gao Lanning,Han Fangxi.Security Assessment for Work Position Based on Danger Theory.Postgraduate Symposium in Beijing Area in 2007,2007,209-213 (In Chinese).

[7] Li Luyan,Zeng Guangzhou. Study of Itinerary Graph Generation Algorithm Based on Task blocks.Computer Engineering and Application,2008,44(32),41-44 (In Chinese).

[8] Li Yongxiang.Rearsearch on Code Transformation.Dessertation of University of Science and Technology 2002 (In Chinese).

[9] Bali Pulendran. Immune Activation:Death,Danger Dispatch and Dendritic Cells. Current Biology,Vol.14,R30-R32,January 6,2004.

[10] Greensmith J, Aicklin U, Cayzer S. Introducing Dendritic Cells as a Novel Immune-inspired Algorithm for Anomaly Detection.In:JacomC,PilatM,BentleyP, TimmisJ, eds. Artificial Immune Systems. Vol 3627 of Lecture Notes in Computer Science. Berlin,Heidelberg:Springer-Verlag,2005:153–167.