« zurück zur Übersicht
|
Titel: |
Towards forensic data flow analysis of business process logs
|
Publikationstyp: |
Konferenzbeiträge |
Autoren: |
Accorsi R, Wonnemann C, Stocker T
|
Erscheinungsjahr: |
2011 |
Herausgeber: |
IEEE Computer Society |
Journal: |
Proceedings of the 6th International Conference on IT Security Incident Management & IT Forensics |
Tagung: |
Sixth International Conference on IT Security Incident Management and IT Forensics, IMF 2011, Stuttgart, Germany |
Seiten: |
3 - 20 |
Kurzfassung: |
This paper presents RecIF, a forensic technique for the analysis of business process logs to detect illegal data flows. RecIF uses propagation graphs to formally capture the data flow within a process execution. Abstracting away from the concrete traces, propagation graphs are analyzed with extensional data flow policies that denote what -- instead of how -- relevant industrial requirements, e.g. Chinese Wall and separation of duty constraints, are to be achieved. An example and the corresponding runtime figures demonstrate the feasibility of the approach. |
URL/DOI: |
http://doi.ieeecomputerso[...]g/10.1109/IMF.2011.13
|