« back to the overview
|
Title: |
On the Exploitation of Process Mining for Security Audits: The Process Discovery Case |
Publication type: |
Conference papers |
Authors: |
Accorsi R, Stocker T, Mueller G
|
Year of publication: |
2013 |
Journal: |
Proceedings of the 28th Annual ACM Symposium on Applied Computing |
Pages: |
1462 - 1468 |
Abstract: |
This paper reports on the potential of process mining as a basis for security audits of business process and correspond- ing business process management systems. In particular, it focuses on process discovery as a means to reconstruct process-related structures from event logs, such as the pro- cess’ control flow, social network and data flows. Based on this information, security analysis to determine the compli- ance with security and privacy requirements can be auto- mated. |
URL/DOI: |
http://doi.acm.org/10.1145/2480362.2480634
|