On the exploitation of process mining for security audits: the conformance checking case

@inproceedings{Accorsi2012OnTE,
  title={On the exploitation of process mining for security audits: the conformance checking case},
  author={Rafael Accorsi and Thomas Stocker},
  booktitle={SAC},
  year={2012}
}
Process mining stands for a set of techniques to analyze business process models and logs. However, the extent to which it can be used for security auditing has not been investigated. Focusing on conformance checking and its support in ProM, this paper reports on a case-study in the financial sector applying this technology for the auditing of relevant security requirements. Although the vast majority of requirements could be verified, we notice a large manual effort to carry out the analysis… CONTINUE READING

Figures, Tables, and Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 54 CITATIONS, ESTIMATED 27% COVERAGE

Online and offline classification of traces of event logs on the basis of security risks

  • Journal of Intelligent Information Systems
  • 2017
VIEW 5 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Evolution of Compliance Checking in Process Mining Discipline

  • 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)
  • 2019
VIEW 2 EXCERPTS
CITES BACKGROUND

Comparing and Aligning Process Representations

  • Lecture Notes in Business Information Processing
  • 2018
VIEW 3 EXCERPTS
CITES BACKGROUND

FILTER CITATIONS BY YEAR

2011
2019

CITATION STATISTICS

  • 3 Highly Influenced Citations

  • Averaged 7 Citations per year over the last 3 years

References

Publications referenced by this paper.

Similar Papers

Loading similar papers…