2012
DOI: 10.1007/978-3-642-31875-7_18
|View full text |Cite
|
Sign up to set email alerts
|

Data Flow-Oriented Process Mining to Support Security Audits

Abstract: Abstract. The automated execution of dynamically-evolving business processes in service-oriented architectures requires audit methods to assert that they fulfill required security properties. Process mining techniques can provide models for the actual process behavior, but mostly disregard the dynamics of processes running in highly flexible environments and neglect the data flow perspective. This research plan is on novel data-oriented mining techniques to tackle these shortcomings in order to support effecti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…The lion's share of process mining research deals with the discovery of the control flow whereas the integration of the data perspective in process mining has generally not been investigated extensively in the academic community yet, apart from very few scientific publications. This observation is supported by Stocker [35] and de Leoni and van der Aalst [15]. De Leoni and van der Aalst use the data flow perspective to discover rules that explain why instances of the same process follow different execution paths.…”
Section: Related Workmentioning
confidence: 63%
“…The lion's share of process mining research deals with the discovery of the control flow whereas the integration of the data perspective in process mining has generally not been investigated extensively in the academic community yet, apart from very few scientific publications. This observation is supported by Stocker [35] and de Leoni and van der Aalst [15]. De Leoni and van der Aalst use the data flow perspective to discover rules that explain why instances of the same process follow different execution paths.…”
Section: Related Workmentioning
confidence: 63%