On the exploitation of process mining for security audits: the process discovery case

@inproceedings{Accorsi2013OnTE,
  title={On the exploitation of process mining for security audits: the process discovery case},
  author={Rafael Accorsi and Thomas Stocker and G{\"u}nter M{\"u}ller},
  booktitle={SAC},
  year={2013}
}
This paper reports on the potential of process mining as a basis for security audits of business process and corresponding business process management systems. In particular, it focuses on process discovery as a means to reconstruct process-related structures from event logs, such as the process' control flow, social network and data flows. Based on this information, security analysis to determine the compliance with security and privacy requirements can be automated. 

Figures and Topics from this paper.

Explore Further: Topics Discussed in This Paper

Citations

Publications citing this paper.
SHOWING 1-10 OF 20 CITATIONS

References

Publications referenced by this paper.

Similar Papers

Loading similar papers…