Modeling and Analysis of Workflows Using Petri Nets
Journal of Intelligent Information Systems - Special issue on workflow management systems
Lectures on Petri Nets I: Basic Models, Advances in Petri Nets, the volumes are based on the Advanced Course on Petri Nets
Making Work Flow: On the Application of Petri Nets to Business Process Management
ICATPN '02 Proceedings of the 23rd International Conference on Applications and Theory of Petri Nets
Workflow Mining: Discovering Process Models from Event Logs
IEEE Transactions on Knowledge and Data Engineering
Genetic process mining: an experimental evaluation
Data Mining and Knowledge Discovery
Business process mining: An industrial application
Information Systems
Rediscovering workflow models from event-based data using little thumb
Integrated Computer-Aided Engineering
Mining process models with non-free-choice constructs
Data Mining and Knowledge Discovery
How to synthesize nets from languages: a survey
Proceedings of the 39th conference on Winter simulation: 40 years! The best is yet to come
Security Lessons Learned from Société Générale
IEEE Security and Privacy
The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies
ACSAC '08 Proceedings of the 2008 Annual Computer Security Applications Conference
Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance
Electronic Notes in Theoretical Computer Science (ENTCS)
New Region-Based Algorithms for Deriving Bounded Petri Nets
IEEE Transactions on Computers
Structural non-interference in elementary and trace nets
Mathematical Structures in Computer Science
Fuzzy mining: adaptive process simplification based on multi-perspective metrics
BPM'07 Proceedings of the 5th international conference on Business process management
Process mining based on regions of languages
BPM'07 Proceedings of the 5th international conference on Business process management
Information flow analysis of scientific workflows
Journal of Computer and System Sciences
Applying process mining in SOA environments
ICSOC/ServiceWave'09 Proceedings of the 2009 international conference on Service-oriented computing
Strong non-leak guarantees for workflow models
Proceedings of the 2011 ACM Symposium on Applied Computing
Towards Forensic Data Flow Analysis of Business Process Logs
IMF '11 Proceedings of the 2011 Sixth International Conference on IT Security Incident Management and IT Forensics
Vulnerability Analysis in SOA-Based Business Processes
IEEE Transactions on Services Computing
Business Process as a Service: Chances for Remote Auditing
COMPSACW '11 Proceedings of the 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops
Deriving Current State RBAC Models from Event Logs
ARES '11 Proceedings of the 2011 Sixth International Conference on Availability, Reliability and Security
BPM'06 Proceedings of the 4th international conference on Business Process Management
The prom framework: a new era in process mining tool support
ICATPN'05 Proceedings of the 26th international conference on Applications and Theory of Petri Nets
Process mining from a basis of state regions
PETRI NETS'10 Proceedings of the 31st international conference on Applications and Theory of Petri Nets
On the exploitation of process mining for security audits: the conformance checking case
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Automatic information flow analysis of business process models
BPM'12 Proceedings of the 10th international conference on Business Process Management
Hi-index | 0.00 |
This paper reports on the potential of process mining as a basis for security audits of business process and corresponding business process management systems. In particular, it focuses on process discovery as a means to reconstruct process-related structures from event logs, such as the process' control flow, social network and data flows. Based on this information, security analysis to determine the compliance with security and privacy requirements can be automated.