2011 Sixth International Conference on IT Security Incident Management and IT Forensics 2011
DOI: 10.1109/imf.2011.13
|View full text |Cite
|
Sign up to set email alerts
|

Towards Forensic Data Flow Analysis of Business Process Logs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 26 publications
0
7
0
Order By: Relevance
“…In order to find appropriate meta-models for efficient data-and information flow analysis, the starting point of this research was to analyze propagation graphs capturing data flows within a process execution with extensional data flow properties, that denote what -instead of how -relevant industrial requirements are to be achieved [5]. Providing a sufficient basis for data flow analysis, propagation graphs do not reflect the control flow of process executions.…”
Section: Preliminary Resultsmentioning
confidence: 99%
“…In order to find appropriate meta-models for efficient data-and information flow analysis, the starting point of this research was to analyze propagation graphs capturing data flows within a process execution with extensional data flow properties, that denote what -instead of how -relevant industrial requirements are to be achieved [5]. Providing a sufficient basis for data flow analysis, propagation graphs do not reflect the control flow of process executions.…”
Section: Preliminary Resultsmentioning
confidence: 99%
“…Accorsi et al [1,2] present an approach for detecting illegal data flow execution in business processes. These works propose a forensic analysis tool called RecIF that constructs a graph of data flow among subjects (propagation graph) in a process.…”
Section: Anomaly Detection In Process Logsmentioning
confidence: 99%
“…Although the work in [1,2] has similarities with our anomaly detection approaches (e.g. model construction and conformance test), there exists one important difference.…”
Section: Anomaly Detection In Process Logsmentioning
confidence: 99%
“…Focusing solely on the flow of data along activities throughout process execution, Accorsi et al [8] proposed an analysis method based on propagation graphs and a constraint language able to express multi-level security requirements. Propagation graphs are build on basis of process logs, whereas nodes stand for process activities and arcs model data flows.…”
Section: Case and Data Perspectivementioning
confidence: 99%