메뉴 건너뛰기




Volumn , Issue , 2012, Pages 1709-1716

On the exploitation of process mining for security audits: The conformance checking case

Author keywords

business process security audit; conformance checking; information flow analysis; process mining

Indexed keywords

BUSINESS PROCESS; BUSINESS PROCESS MODEL; CONFORMANCE CHECKING; FINANCIAL SECTORS; INFORMATION FLOW ANALYSIS; PROCESS DISCOVERY; PROCESS MINING; SECURITY ANALYSIS; SECURITY AUDIT; SECURITY REQUIREMENTS;

EID: 84863590198     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2245276.2232051     Document Type: Conference Paper
Times cited : (87)

References (27)
  • 1
    • 79959293472 scopus 로고    scopus 로고
    • Strong non-leak guarantees for workflow models
    • ACM
    • R. Accorsi and C. Wonnemann. Strong non-leak guarantees for workflow models. In Symp. on Applied Computing, pages 308-314. ACM, 2011.
    • (2011) Symp. on Applied Computing , pp. 308-314
    • Accorsi, R.1    Wonnemann, C.2
  • 2
    • 80455144533 scopus 로고    scopus 로고
    • SWAT: A security workflow toolkit for reliably secure process-aware information systems
    • IEEE
    • R. Accorsi, C. Wonnemann, and S. Dochow. SWAT: A security workflow toolkit for reliably secure process-aware information systems. In Conf. on Availability, Reliability and Security, pages 692-697. IEEE, 2011.
    • (2011) Conf. on Availability, Reliability and Security , pp. 692-697
    • Accorsi, R.1    Wonnemann, C.2    Dochow, S.3
  • 6
    • 84863594190 scopus 로고    scopus 로고
    • Conformance checking of RBAC policies in process-aware information systems
    • to appear
    • A. Baumgrass, T. Baier, J. Mendling, and M. Strembeck. Conformance checking of RBAC policies in process-aware information systems. In BPM'11 Workshops (to appear).
    • BPM'11 Workshops
    • Baumgrass, A.1    Baier, T.2    Mendling, J.3    Strembeck, M.4
  • 7
    • 0034810791 scopus 로고    scopus 로고
    • Separation of duties for access control enforcement in workflow environments
    • R. Botha and J. Eloff. Separation of duties for access control enforcement in workflow environments. IBM Systems J., 40(3):666-682, 2001. (Pubitemid 32933424)
    • (2001) IBM Systems Journal , vol.40 , Issue.3 , pp. 666-682
    • Botha, R.A.1    Eloff, J.H.P.2
  • 9
    • 34548317524 scopus 로고    scopus 로고
    • IT audit: A critical business process
    • A. Carlin and F. Gallegos. IT audit: A critical business process. IEEE Computer, 40(7):87-89, 2007.
    • (2007) IEEE Computer , vol.40 , Issue.7 , pp. 87-89
    • Carlin, A.1    Gallegos, F.2
  • 11
    • 0039372661 scopus 로고    scopus 로고
    • Viewing business-processes security from different perspectives
    • G. Herrmann and G. Pernul. Viewing business-processes security from different perspectives. Int'l J. of Electronic Commerce, 3(3):89-103, 1999.
    • (1999) Int'l J. of Electronic Commerce , vol.3 , Issue.3 , pp. 89-103
    • Herrmann, G.1    Pernul, G.2
  • 12
    • 79960305817 scopus 로고    scopus 로고
    • Does process mining add to internal auditing?
    • M. Jans, B. Depaire, and K. Vanhoof. Does process mining add to internal auditing?. In BMMDS/EMMSAD '11, pages 31-45, 2011.
    • (2011) BMMDS/EMMSAD '11 , pp. 31-45
    • Jans, M.1    Depaire, B.2    Vanhoof, K.3
  • 14
    • 70349373797 scopus 로고    scopus 로고
    • Petri net transformations for business processes - A survey
    • Trans. on Petri Nets and Other Models of Concurrency, Springer
    • N. Lohmann, E. Verbeek, and R. Dijkman. Petri net transformations for business processes - A survey. In Trans. on Petri Nets and Other Models of Concurrency, volume 5460 of LNCS, pages 46-63. Springer, 2009.
    • (2009) LNCS , vol.5460 , pp. 46-63
    • Lohmann, N.1    Verbeek, E.2    Dijkman, R.3
  • 15
    • 77955723244 scopus 로고    scopus 로고
    • Specification and Verification of Declarative Open Interaction Models
    • Springer
    • M. Montali. Specification and Verification of Declarative Open Interaction Models, volume 56 of LNBIP. Springer, 2010.
    • (2010) LNBIP , vol.56
    • Montali, M.1
  • 16
    • 33748543201 scopus 로고    scopus 로고
    • Distributed usage control
    • DOI 10.1145/1151030.1151053, Privacy and Security in Highly Dynamic Systems
    • A. Pretschner, M. Hilty, and D. Basin. Distributed usage control. Comm. of the ACM, 49(9):39-44, 2006. (Pubitemid 44371759)
    • (2006) Communications of the ACM , vol.49 , Issue.9 , pp. 39-44
    • Pretschner, A.1    Hilty, M.2    Basin, D.3
  • 17
    • 35748949584 scopus 로고    scopus 로고
    • Conformance checking of processes based on monitoring real behavior
    • DOI 10.1016/j.is.2007.07.001, PII S030643790700049X
    • A. Rozinat and W. M. P. van der Aalst. Conformance checking of processes based on monitoring real behavior. Inf. Systems J., 33(1):64-95, 2008. (Pubitemid 350051578)
    • (2008) Information Systems , vol.33 , Issue.1 , pp. 64-95
    • Rozinat, A.1    Van Der Aalst, W.M.P.2
  • 18
    • 61849169018 scopus 로고    scopus 로고
    • Guidelines for conducting and reporting case study research in software engineering
    • P. Runeson and M. Höst. Guidelines for conducting and reporting case study research in software engineering. Empirical Soft. Eng., 14(2):131-164, 2009.
    • (2009) Empirical Soft. Eng. , vol.14 , Issue.2 , pp. 131-164
    • Runeson, P.1    Höst, M.2
  • 19
    • 0028513932 scopus 로고
    • Access control: Principles and practice
    • R. Sandhu and P. Samarati. Access control: Principles and practice. IEEE Comm. Mag., 32(9):40-48, 1994.
    • (1994) IEEE Comm. Mag. , vol.32 , Issue.9 , pp. 40-48
    • Sandhu, R.1    Samarati, P.2
  • 20
    • 79952504609 scopus 로고    scopus 로고
    • Using CAATs to support is audit
    • A. Sayana. Using CAATs to support is audit. Inf. Systems Control J., 1, 2003.
    • (2003) Inf. Systems Control J. , pp. 1
    • Sayana, A.1
  • 22
    • 77949692487 scopus 로고    scopus 로고
    • Auditing 2.0: Using process mining to support tomorrow's auditor
    • W. van der Aalst, K. van Hee, J. van der Werf, and M. Verdonk. Auditing 2.0: Using process mining to support tomorrow's auditor. IEEE Computer, 43(3):90-93, 2010.
    • (2010) IEEE Computer , vol.43 , Issue.3 , pp. 90-93
    • Van Der Aalst, W.1    Van Hee, K.2    Van Der Werf, J.3    Verdonk, M.4
  • 23
  • 24
    • 33646698687 scopus 로고    scopus 로고
    • Process mining and verification of properties: An approach based on temporal logic
    • OTM Conferences, Springer
    • W. M. P. van der Aalst, H. T. de Beer, and B. F. van Dongen. Process mining and verification of properties: An approach based on temporal logic. In OTM Conferences, volume 3760 of LNCS, pages 130-147. Springer, 2005.
    • (2005) LNCS , vol.3760 , pp. 130-147
    • Van Der Aalst, W.M.P.1    De Beer, H.T.2    Van Dongen, B.F.3
  • 25
    • 26444580289 scopus 로고    scopus 로고
    • The ProM framework: A new era in process mining tool support
    • Applications and Theory of Petri Nets 2005: 26th International Conference, ICATPN 2005. Proceedings
    • B. van Dongen, A. de Medeiros, H. Verbeek, A. Weijters, and W. van der Aalst. The ProM framework: A new era in process mining tool support. In Conf. on Applications and Theory of Petri Nets, volume 3536 of LNCS, pages 444-454. Springer, 2005. (Pubitemid 41422025)
    • (2005) Lecture Notes in Computer Science , vol.3536 , pp. 444-454
    • Van Dongen, B.F.1    De Medeiros, A.K.A.2    Verbeek, H.M.W.3    Weijters, A.J.M.M.4    Van Der, A.W.M.P.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.