Modeling and Analysis of Workflows Using Petri Nets
Journal of Intelligent Information Systems - Special issue on workflow management systems
Workflow Mining: Discovering Process Models from Event Logs
IEEE Transactions on Knowledge and Data Engineering
Discovering Expressive Process Models by Clustering Log Traces
IEEE Transactions on Knowledge and Data Engineering
Business Provenance --- A Technology to Increase Traceability of End-to-End Operations
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part I on On the Move to Meaningful Internet Systems:
Business process management: a survey
BPM'03 Proceedings of the 2003 international conference on Business process management
Process mining based on clustering: a quest for precision
BPM'07 Proceedings of the 2007 international conference on Business process management
Service-Oriented Computing and Cloud Computing: Challenges and Opportunities
IEEE Internet Computing
Strong non-leak guarantees for workflow models
Proceedings of the 2011 ACM Symposium on Applied Computing
Towards Forensic Data Flow Analysis of Business Process Logs
IMF '11 Proceedings of the 2011 Sixth International Conference on IT Security Incident Management and IT Forensics
InDico: information flow analysis of business processes for confidentiality requirements
STM'10 Proceedings of the 6th international conference on Security and trust management
Vulnerability Analysis in SOA-Based Business Processes
IEEE Transactions on Services Computing
Business Process as a Service: Chances for Remote Auditing
COMPSACW '11 Proceedings of the 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops
Hi-index | 0.00 |
The automated execution of dynamically-evolving business processes in service-oriented architectures requires audit methods to assert that they fulfill required security properties. Process mining techniques can provide models for the actual process behavior, but mostly disregard the dynamics of processes running in highly flexible environments and neglect the data flow perspective. This research plan is on novel data-oriented mining techniques to tackle these shortcomings in order to support effective security audits.