2010
DOI: 10.1007/978-3-642-12814-1_18
|View full text |Cite
|
Sign up to set email alerts
|

Auditing Workflow Executions against Dataflow Policies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2010
2010
2013
2013

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 11 publications
0
9
0
Order By: Relevance
“…The major share of research in this area has focussed on the specification and verification of RBAC policies [48][49][50], among others on consistency and satisfiability of constraint sets [51,52], as well as on engineering and enforcement by design [53]. Log files have been used for mining roles in this area [54,55], while an a posteriori compliance control has only been considered recently [56][57][58]. The approach reported in this paper informs this stream of research.…”
Section: Related Workmentioning
confidence: 81%
“…The major share of research in this area has focussed on the specification and verification of RBAC policies [48][49][50], among others on consistency and satisfiability of constraint sets [51,52], as well as on engineering and enforcement by design [53]. Log files have been used for mining roles in this area [54,55], while an a posteriori compliance control has only been considered recently [56][57][58]. The approach reported in this paper informs this stream of research.…”
Section: Related Workmentioning
confidence: 81%
“…Accorsi et al [1,2] present an approach for detecting illegal data flow execution in business processes. These works propose a forensic analysis tool called RecIF that constructs a graph of data flow among subjects (propagation graph) in a process.…”
Section: Anomaly Detection In Process Logsmentioning
confidence: 99%
“…With regard to the business layer, techniques have been developed to analyze the structural properties of business processes [1,23], but little, if any, work has focused on obtaining evidence on isolation properties. Accorsi and Wonnemann [2] have described a forensic approach for log analysis based on propagation graphs that model how data items spread in a system. Sun, et al [20] have developed a technique for reasoning about data flows and business processes, but they do not relate it to security.…”
Section: Related Workmentioning
confidence: 99%