2015 International Carnahan Conference on Security Technology (ICCST) 2015
DOI: 10.1109/ccst.2015.7389656
|View full text |Cite
|
Sign up to set email alerts
|

Providing online operational support for distributed, security sensitive electronic business processes

Abstract: Online process mining techniques are increasingly used to provide operational support. In this work we describe tools to support distributed business processes which handle sensitive data and require a high level of security together with real-time validation. The techniques presented here have been specifically developed for real-time compliance checking of distributed processes in choreographies of heterogeneous entities. Challenges include the fast aggregation, analysis and validation of process logs that a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(12 citation statements)
references
References 27 publications
0
12
0
Order By: Relevance
“…Also, the patients’ waiting times could be reduced, which led to higher patient satisfaction. Talamo et al. (2015), in contrast, evaluated their approach to a distributed process involving 400,000 daily executions and a service desk or support.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Also, the patients’ waiting times could be reduced, which led to higher patient satisfaction. Talamo et al. (2015), in contrast, evaluated their approach to a distributed process involving 400,000 daily executions and a service desk or support.…”
Section: Resultsmentioning
confidence: 99%
“…To minimize execution time, the remaining tasks of running process instances are allocated to different servers. Based on the concept of validation trees (see Section 4.2.5.3), Talamo et al (2015) explore running service tickets and present a solution, where a validation authority automatically resolves issues, recommends actions or notifies a service agent. Furthermore, three articles apply prediction techniques: Ho et al (2009) use artificial neural networks to predict the quality of currently produced workpieces based on a real-time analysis of quality characteristics.…”
Section: Business Process Management Journalmentioning
confidence: 99%
“…A novel system for the provision of efficient operational support for distributed and security sensitive business processes in which automated process validation and extensive troubleshooting functionality is closely integrated with IT Service Desk (SD) operations has been presented [41]. That system's capabilities enable the efficient and automated detection and resolution of anomalies in distributed business processes [41]. The system improves Service Desk (SD) performance and increases process security through real time compliance checking [41].…”
Section: Research Resultsmentioning
confidence: 99%
“…That system's capabilities enable the efficient and automated detection and resolution of anomalies in distributed business processes [41]. The system improves Service Desk (SD) performance and increases process security through real time compliance checking [41]. The system further reduces security risks associated with SD operations and SD staff-user interactions including social engineering attacks as it allows SD staff to cross-reference user provided information with system reports [41].…”
Section: Research Resultsmentioning
confidence: 99%
See 1 more Smart Citation