-
2
-
-
30344451681
-
Business alignment: Using process mining as a tool for delta analysis and conformance testing
-
van der Aalst, W.M.P.: Business alignment: using process mining as a tool for delta analysis and conformance testing. Requirements Engineering 10(3), 198-211 (2005)
-
(2005)
Requirements Engineering
, vol.10
, Issue.3
, pp. 198-211
-
-
Van Der Aalst, W.M.P.1
-
3
-
-
84863590198
-
On the exploitation of process mining for security audits: The conformance checking case
-
ACM, New York
-
Accorsi, R., Stocker, T.: On the exploitation of process mining for security audits: the conformance checking case. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC 2012, pp. 1709-1716. ACM, New York (2012)
-
(2012)
Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC 2012
, pp. 1709-1716
-
-
Accorsi, R.1
Stocker, T.2
-
6
-
-
0021022807
-
Inexact graph matching for structural pattern recognition
-
Bunke, H., Allermann, G.: Inexact graph matching for structural pattern recognition. Pattern Recognition Letters 1(4), 245-253 (1983)
-
(1983)
Pattern Recognition Letters
, vol.1
, Issue.4
, pp. 245-253
-
-
Bunke, H.1
Allermann, G.2
-
7
-
-
0032024433
-
A graph distance metric based on the maximal common subgraph
-
Bunke, H., Shearer, K.: A graph distance metric based on the maximal common subgraph. Pattern Recognition Letters 19(3-4), 255-259 (1998)
-
(1998)
Pattern Recognition Letters
, vol.19
, Issue.3-4
, pp. 255-259
-
-
Bunke, H.1
Shearer, K.2
-
8
-
-
3142716665
-
Thirty years of graph matching in pattern recognition
-
Conte, D., Foggia, P., Sansone, C., Vento, M.: Thirty Years of Graph Matching in Pattern Recognition. International Journal of Pattern Recognition and Artificial Intelligence 18(03), 265-298 (2004)
-
(2004)
International Journal of Pattern Recognition and Artificial Intelligence
, vol.18
, Issue.3
, pp. 265-298
-
-
Conte, D.1
Foggia, P.2
Sansone, C.3
Vento, M.4
-
9
-
-
12844275434
-
Matching graphs with unique node labels
-
Dickinson, P.J., Bunke, H., Dadej, A., Kraetzl, M.: Matching graphs with unique node labels. Pattern Analysis and Applications 7(3), 243-254 (2004)
-
(2004)
Pattern Analysis and Applications
, vol.7
, Issue.3
, pp. 243-254
-
-
Dickinson, P.J.1
Bunke, H.2
Dadej, A.3
Kraetzl, M.4
-
10
-
-
78649464425
-
Similarity of business process models: Metrics and evaluation
-
Dijkman, R., Dumas, M., van Dongen, B., Käärik, R., Mendling, J.: Similarity of business process models: Metrics and evaluation. Information Systems 36(2), 498-516 (2011)
-
(2011)
Information Systems
, vol.36
, Issue.2
, pp. 498-516
-
-
Dijkman, R.1
Dumas, M.2
Van Dongen, B.3
Käärik, R.4
Mendling, J.5
-
11
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3), 224-274 (2001)
-
(2001)
ACM Trans. Inf. Syst. Secur
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
12
-
-
73749086870
-
A survey of graph edit distance
-
Gao, X., Xiao, B., Tao, D., Li, X.: A survey of graph edit distance. Pattern Analysis and Applications 13(1), 113-129 (2010)
-
(2010)
Pattern Analysis and Applications
, vol.13
, Issue.1
, pp. 113-129
-
-
Gao, X.1
Xiao, B.2
Tao, D.3
Li, X.4
-
13
-
-
84944075708
-
A formal model for role-based access control using graph transformation
-
Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds. Springer, Heidelberg
-
Koch, M., Mancini, L., Parisi-Presicce, F.: A formal model for role-based access control using graph transformation. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol. 1895, pp. 122-139. Springer, Heidelberg (2000)
-
(2000)
ESORICS 2000. LNCS
, vol.1895
, pp. 122-139
-
-
Koch, M.1
Mancini, L.2
Parisi-Presicce, F.3
-
15
-
-
84873176389
-
A case study on the suitability of process mining to produce current-state RBAC models
-
La Rosa, M., Soffer, P. (eds. Springer, Heidelberg
-
Leitner, M., Baumgrass, A., Schefer-Wenzl, S., Rinderle-Ma, S., Strembeck, M.: A case study on the suitability of process mining to produce current-state RBAC models. In: La Rosa, M., Soffer, P. (eds.) BPM 2012 Workshops. LNBIP, vol. 132, pp. 719-724. Springer, Heidelberg (2013)
-
(2013)
BPM 2012 Workshops. LNBIP
, vol.132
, pp. 719-724
-
-
Leitner, M.1
Baumgrass, A.2
Schefer-Wenzl, S.3
Rinderle-Ma, S.4
Strembeck, M.5
-
16
-
-
84874423015
-
SPRINT-Responsibilities: Design and development of security policies in process-Aware information systems
-
Leitner, M., Mangler, J., Rinderle-Ma, S.: SPRINT-Responsibilities: design and development of security policies in process-Aware information systems. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) 2(4), 4-26 (2011)
-
(2011)
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)
, vol.2
, Issue.4
, pp. 4-26
-
-
Leitner, M.1
Mangler, J.2
Rinderle-Ma, S.3
-
17
-
-
80455140452
-
AW-RBAC: Access control in adaptive workflow systems
-
IEEE
-
Leitner, M., Rinderle-Ma, S., Mangler, J.: AW-RBAC: access control in adaptive workflow systems. In: 2011 Sixth International Conference on Availability, Reliability and Security (ARES), pp. 27-34. IEEE (2011)
-
(2011)
2011 Sixth International Conference on Availability Reliability and Security (ARES)
, pp. 27-34
-
-
Leitner, M.1
Rinderle-Ma, S.2
Mangler, J.3
-
18
-
-
0035790675
-
The role-based access control system of a European bank: A case study and discussion
-
ACM, New York
-
Schaad, A., Moffett, J., Jacob, J.: The role-based access control system of a European bank: a case study and discussion. In: Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies, SACMAT 2001, pp. 3-9. ACM, New York (2001)
-
(2001)
Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies S ACMAT 2001
, pp. 3-9
-
-
Schaad, A.1
Moffett, J.2
Jacob, J.3
-
19
-
-
56049101373
-
Towards comprehensive support for organizational mining
-
Song, M., van der Aalst, W.M.P.: Towards comprehensive support for organizational mining. Decision Support Systems 46(1), 300-317 (2008)
-
(2008)
Decision Support Systems
, vol.46
, Issue.1
, pp. 300-317
-
-
Song, M.1
Van Der Aalst, W.M.P.2
-
20
-
-
34548052480
-
The role mining problem: Finding a minimal descriptive set of roles
-
ACM, New York
-
Vaidya, J., Atluri, V., Guo, Q.: The role mining problem: finding a minimal descriptive set of roles. In: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, pp. 175-184. ACM, New York (2007)
-
(2007)
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies SACMAT 2007
, pp. 175-184
-
-
Vaidya, J.1
Atluri, V.2
Guo, Q.3
-
21
-
-
0348209180
-
W-RBAC - A workflow security model incorporating controlled overriding of constraints
-
Wainer, J., Barthelmess, P., Kumar, A.: W-RBAC - a workflow security model incorporating controlled overriding of constraints. International Journal of Cooperative Information Systems 12(4), 455-485 (2003)
-
(2003)
International Journal of Cooperative Information Systems
, vol.12
, Issue.4
, pp. 455-485
-
-
Wainer, J.1
Barthelmess, P.2
Kumar, A.3
-
22
-
-
33646676768
-
Balancing flexibility and security in adaptive process management systems
-
Meersman, R., Tari, Z. (eds.) Springer, Heidelberg
-
Weber, B., Reichert, M., Wild, W., Rinderle, S.: Balancing flexibility and security in adaptive process management systems. In: Meersman, R., Tari, Z. (eds.) CoopIS/DOA/ODBASE 2005. LNCS, vol. 3760, pp. 59-76. Springer, Heidelberg (2005)
-
(2005)
CoopIS/DOA/ODBASE 2005. LNCS
, vol.3760
, pp. 59-76
-
-
Weber, B.1
Reichert, M.2
Wild, W.3
Rinderle, S.4
-
24
-
-
34548033731
-
Role engineering using graph optimization
-
ACM, New York
-
Zhang, D., Ramamohanarao, K., Ebringer, T.: Role engineering using graph optimisation. In: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, pp. 139-144. ACM, New York (2007)
-
(2007)
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies SACMAT 2007
, pp. 139-144
-
-
Zhang, D.1
Ramamohanarao, K.2
Ebringer, T.3
|