2021
DOI: 10.1007/978-3-030-79108-7_10
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Privacy, Data and Control-Flow Deviations in Business Processes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…To comprehensively check the conformance of an event log from the viewpoint of the control flow, the data-access and resource authorization, a more recent approach has been developed by Mozafari et al [5]. In their paper, the combination of an event log, a data access log and a resource model is used to construct a large synchronous product.…”
Section: Relating Observed and Modelled Behaviour: Advanced Techniquesmentioning
confidence: 99%
“…To comprehensively check the conformance of an event log from the viewpoint of the control flow, the data-access and resource authorization, a more recent approach has been developed by Mozafari et al [5]. In their paper, the combination of an event log, a data access log and a resource model is used to construct a large synchronous product.…”
Section: Relating Observed and Modelled Behaviour: Advanced Techniquesmentioning
confidence: 99%
“…Besides the presented contribution on compliance checking, other efforts have taken place in the BPR4GDPR context. To be able to detect more complex non-compliance, [34] and [35] propose a technique to represent control-flow, data, and privacy aspects all together as reference model. Such technique, implemented as a plug-in to the presented tool [36], is able to find non-compliance in one of these perspectives or resulting from a combination of them.…”
Section: Ex-post Compliance Assessmentmentioning
confidence: 99%
“…Previously, we presented a balanced multi-perspective approach for conformance checking and anomaly detection which considered control-flow, data and privacy perspectives all together and simultaneously without giving priority to one perspective [9]. In this paper, we extend our previous approach by considering the type of data operations (mandatory or optional) and their execution constraints in the calculation of alignments.…”
Section: Introductionmentioning
confidence: 99%