A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
On the exploitation of process mining for security audits
2013
Proceedings of the 28th Annual ACM Symposium on Applied Computing - SAC '13
This paper reports on the potential of process mining as a basis for security audits of business process and corresponding business process management systems. In particular, it focuses on process discovery as a means to reconstruct process-related structures from event logs, such as the process' control flow, social network and data flows. Based on this information, security analysis to determine the compliance with security and privacy requirements can be automated.
doi:10.1145/2480362.2480634
dblp:conf/sac/AccorsiSM13
fatcat:kvrhzb2z25evjbltmtx75g276y