2011 Third International Workshop on Security Measurements and Metrics 2011
DOI: 10.1109/metrisec.2011.10
|View full text |Cite
|
Sign up to set email alerts
|

Measuring Privacy Compliance with Process Specifications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2012
2012
2015
2015

Publication Types

Select...
3
3
1

Relationship

5
2

Authors

Journals

citations
Cited by 12 publications
(12 citation statements)
references
References 23 publications
0
12
0
Order By: Relevance
“…Many existing precision metrics (e.g., [25,30,34]) do not explicitly take into account possible deviations between the behavior observed in the event log with the behavior modeled in the models, while many case studies show that such deviations often occur in practice (e.g., [11,16,19,20,23,31,35,36]). Thus, these metrics might be biased due to unfitting logs and models.…”
Section: Introductionmentioning
confidence: 99%
“…Many existing precision metrics (e.g., [25,30,34]) do not explicitly take into account possible deviations between the behavior observed in the event log with the behavior modeled in the models, while many case studies show that such deviations often occur in practice (e.g., [11,16,19,20,23,31,35,36]). Thus, these metrics might be biased due to unfitting logs and models.…”
Section: Introductionmentioning
confidence: 99%
“…The process for the identification of replacements and estimation of their costs can be supported by the use of metrics for assessing the similarity degree between activities. For instance, the work in [17] uses the Latent Semantic Analysis (LSA) [18], a semantic relatedness metric, to assess the similarity between two activities based on their name. Ontology alignment techniques [19,20] can be also employed to assess the similarity degree between two activities.…”
Section: Guidelines For Setting Cost Functionmentioning
confidence: 99%
“…In particular, edit distance metrics are used to map "almost valid" traces into the predictable (closest valid) trace. In [17] edit distance metrics have been enhanced to measure the privacy distance between expected and actual user behavior. The problem of these metrics is that they cannot be applied to analyze logs against complex process models, for instance including loops.…”
Section: Related Workmentioning
confidence: 99%
“…The role by the user who executed the task is another factor for characterizing privacy [5]. A role describes job Privacy Analysis of User Behavior Using Alignments functions and responsibilities within an organization and is usually associated with the access rights necessary to achieve assigned duties.…”
Section: Quantifying Privacymentioning
confidence: 99%