« back to the overview
|
Title: |
Towards forensic data flow analysis of business process logs
|
Publication type: |
Conference papers |
Authors: |
Accorsi R, Wonnemann C, Stocker T
|
Year of publication: |
2011 |
Publisher: |
IEEE Computer Society |
Journal: |
Proceedings of the 6th International Conference on IT Security Incident Management & IT Forensics |
Conference: |
Sixth International Conference on IT Security Incident Management and IT Forensics, IMF 2011, Stuttgart, Germany |
Pages: |
3 - 20 |
Abstract: |
This paper presents RecIF, a forensic technique for the analysis of business process logs to detect illegal data flows. RecIF uses propagation graphs to formally capture the data flow within a process execution. Abstracting away from the concrete traces, propagation graphs are analyzed with extensional data flow policies that denote what -- instead of how -- relevant industrial requirements, e.g. Chinese Wall and separation of duty constraints, are to be achieved. An example and the corresponding runtime figures demonstrate the feasibility of the approach. |
URL/DOI: |
http://doi.ieeecomputerso[...]g/10.1109/IMF.2011.13
|