Proceedings of the 28th Annual ACM Symposium on Applied Computing 2013
DOI: 10.1145/2480362.2480634
|View full text |Cite
|
Sign up to set email alerts
|

On the exploitation of process mining for security audits

Abstract: This paper reports on the potential of process mining as a basis for security audits of business process and corresponding business process management systems. In particular, it focuses on process discovery as a means to reconstruct process-related structures from event logs, such as the process' control flow, social network and data flows. Based on this information, security analysis to determine the compliance with security and privacy requirements can be automated.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0
2

Year Published

2013
2013
2021
2021

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 36 publications
(27 citation statements)
references
References 44 publications
0
25
0
2
Order By: Relevance
“…1. This model represents a realworld loan application management process, which has been defined and validated through interviews with the managers of a bank [2]. The results discussed in this section can hence be considered, to a certain extent, representative of the outcome that can be obtained in real-world contexts.…”
Section: Methodsmentioning
confidence: 99%
“…1. This model represents a realworld loan application management process, which has been defined and validated through interviews with the managers of a bank [2]. The results discussed in this section can hence be considered, to a certain extent, representative of the outcome that can be obtained in real-world contexts.…”
Section: Methodsmentioning
confidence: 99%
“…Conformance checking is an analytic method seeking to identify differences between the process definition and process execution in reality [23]. The benefits of conformance checking to internal auditing are many, including fraud detection, monitoring required separation of duties, and process improvement [11,3]. The informational perspective of process mining highlights the relationship between the data consumed and produced during execution of business process tasks, but there is scant literature on exploiting this perspective of business process mining [17].…”
Section: Related Workmentioning
confidence: 99%
“…The communication between both systems can be described using a choreography language, like BPEL. Besides, the distribution list can be created automatically according to the optimal distribution formulas mentioned in subsection VI [13] [14].…”
Section: ) the Fourth Pattern Is The Cloud Based Model Where All The mentioning
confidence: 99%