Mining association rules between sets of items in large databases
SIGMOD '93 Proceedings of the 1993 ACM SIGMOD international conference on Management of data
Understanding Quality in Conceptual Modeling
IEEE Software
A role-based access control model and reference implementation within a corporate intranet
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
The specification and enforcement of authorization constraints in workflow management systems
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
Refinement of actions and equivalence notions for concurrent systems
Acta Informatica
Role-based authorization constraints specification
ACM Transactions on Information and System Security (TISSEC)
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
Behavior-consistent specialization of object life cycles
ACM Transactions on Software Engineering and Methodology (TOSEM)
Atomicity and isolation for transactional processes
ACM Transactions on Database Systems (TODS)
Mining Process Models from Workflow Logs
EDBT '98 Proceedings of the 6th International Conference on Extending Database Technology: Advances in Database Technology
Fast Algorithms for Mining Association Rules in Large Databases
VLDB '94 Proceedings of the 20th International Conference on Very Large Data Bases
The Linear Time - Branching Time Spectrum II
CONCUR '93 Proceedings of the 4th International Conference on Concurrency Theory
Lectures on Petri Nets I: Basic Models, Advances in Petri Nets, the volumes are based on the Advanced Course on Petri Nets
Workflow Verification: Finding Control-Flow Errors Using Petri-Net-Based Techniques
Business Process Management, Models, Techniques, and Empirical Studies
Automating the Discovery of As-Is Business Process Models: Probabilistic and Algorithmic Approaches
Information Systems Research
Role mining - revealing business roles for security administration using data mining technology
Proceedings of the eighth ACM symposium on Access control models and technologies
Algorithmic aspects of vertex elimination
STOC '75 Proceedings of seventh annual ACM symposium on Theory of computing
The Consistency of Task-Based Authorization Constraints in Workflow Systems
CSFW '04 Proceedings of the 17th IEEE workshop on Computer Security Foundations
An integrated approach to engineer and enforce context constraints in RBAC environments
ACM Transactions on Information and System Security (TISSEC)
Workflow Mining: Discovering Process Models from Event Logs
IEEE Transactions on Knowledge and Data Engineering
When are two workflows the same?
CATS '05 Proceedings of the 2005 Australasian symposium on Theory of computing - Volume 41
An effective role administration model using organization structure
ACM Transactions on Information and System Security (TISSEC)
Discovering Expressive Process Models by Clustering Log Traces
IEEE Transactions on Knowledge and Data Engineering
On mutually exclusive roles and separation-of-duty
ACM Transactions on Information and System Security (TISSEC)
Business process mining: An industrial application
Information Systems
A posteriori compliance control
Proceedings of the 12th ACM symposium on Access control models and technologies
Rediscovering workflow models from event-based data using little thumb
Integrated Computer-Aided Engineering
Conformance checking of processes based on monitoring real behavior
Information Systems
Quantifying process equivalence based on observed behavior
Data & Knowledge Engineering
Delegation and satisfiability in workflow systems
Proceedings of the 13th ACM symposium on Access control models and technologies
Measuring Similarity between Business Process Models
CAiSE '08 Proceedings of the 20th international conference on Advanced Information Systems Engineering
Detecting and Resolving Process Model Differences in the Absence of a Change Log
BPM '08 Proceedings of the 6th International Conference on Business Process Management
Diagnosing Differences between Business Process Models
BPM '08 Proceedings of the 6th International Conference on Business Process Management
On Measuring Process Model Similarity Based on High-Level Change Operations
ER '08 Proceedings of the 27th International Conference on Conceptual Modeling
Automatic Workflow Graph Refactoring and Completion
ICSOC '08 Proceedings of the 6th International Conference on Service-Oriented Computing
Authorization and Obligation Policies in Dynamic Systems
ICLP '08 Proceedings of the 24th International Conference on Logic Programming
Petri Net Transformations for Business Processes --- A Survey
Transactions on Petri Nets and Other Models of Concurrency II
Evaluating role mining algorithms
Proceedings of the 14th ACM symposium on Access control models and technologies
Robust Process Discovery with Artificial Negative Events
The Journal of Machine Learning Research
Measuring the Compliance of Processes with Reference Models
OTM '09 Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems: Part I
Modeling of task-based authorization constraints in BPMN
BPM'07 Proceedings of the 5th international conference on Business process management
The need for a process mining evaluation framework in research and practice: position paper
BPM'07 Proceedings of the 2007 international conference on Business process management
Trace alignment in process mining: opportunities for process diagnostics
BPM'10 Proceedings of the 8th international conference on Business process management
Process compliance measurement based on behavioural profiles
CAiSE'10 Proceedings of the 22nd international conference on Advanced information systems engineering
Generalised computation of behavioural profiles based on petri-net unfoldings
WS-FM'10 Proceedings of the 7th international conference on Web services and formal methods
Efficient Consistency Measurement Based on Behavioral Profiles of Process Models
IEEE Transactions on Software Engineering
Evaluation of technical measures for workflow similarity based on a pilot study
ODBASE'06/OTM'06 Proceedings of the 2006 Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, DOA, GADA, and ODBASE - Volume Part I
Efficient computation of causal behavioural profiles using structural decomposition
PETRI NETS'10 Proceedings of the 31st international conference on Applications and Theory of Petri Nets
Event-based monitoring of process execution violations
BPM'11 Proceedings of the 9th international conference on Business process management
Replaying history on process models for conformance checking and performance analysis
Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery
Causal Behavioural Profiles - Efficient Computation, Applications, and Evaluation
Fundamenta Informaticae - Applications and Theory of Petri Nets and Other Models of Concurrency, 2010
On profiles and footprints --- relational semantics for petri nets
PETRI NETS'12 Proceedings of the 33rd international conference on Application and Theory of Petri Nets
An optimized derivation of event queries to monitor choreography violations
ICSOC'12 Proceedings of the 10th international conference on Service-Oriented Computing
Business process regulatory compliance management solution frameworks: a comparative evaluation
APCCM '12 Proceedings of the Eighth Asia-Pacific Conference on Conceptual Modelling - Volume 130
Bridging abstraction layers in process mining by automated matching of events and activities
BPM'13 Proceedings of the 11th international conference on Business Process Management
Hi-index | 0.01 |
Process compliance measurement is getting increasing attention in companies due to stricter legal requirements and market pressure for operational excellence. In order to judge on compliance of the business processing, the degree of behavioural deviation of a case, i.e., an observed execution sequence, is quantified with respect to a process model (referred to as fitness, or recall). Recently, different compliance measures have been proposed. Still, nearly all of them are grounded on state-based techniques and the trace equivalence criterion, in particular. As a consequence, these approaches have to deal with the state explosion problem. In this paper, we argue that a behavioural abstraction may be leveraged to measure the compliance of a process log - a collection of cases. To this end, we utilise causal behavioural profiles that capture the behavioural characteristics of process models and cases, and can be computed efficiently. We propose different compliance measures based on these profiles, discuss the impact of noise in process logs on our measures, and show how diagnostic information on non-compliance is derived. As a validation, we report on findings of applying our approach in a case study with an international service provider.