Logo des Repositoriums
 

SecSy: Synthesizing Process Event Logs

dc.contributor.authorAccorsi, Rafael
dc.contributor.authorStocker, Thomas
dc.contributor.editorJung, Reinhard
dc.contributor.editorReichert, Manfred
dc.date.accessioned2018-10-11T09:44:43Z
dc.date.available2018-10-11T09:44:43Z
dc.date.issued2013
dc.description.abstractOne difficulty at developing mechanisms for business process security monitoring and auditing is the lack of representative, controllably generated test runs to serve as an evaluation basis. This paper presents an approach and the corresponding tool support for event log synthesis. The novelty is that it considers the activity of an “attacker” able to purposefully infringe security and compliance requirements or simply manipulate the process' control and data flow, thereby creating deviations of the intended process model. The resulting logs can be readily replayed on a reference monitor, or serve as input for auditing tools based upon, e.g., process mining.en
dc.identifier.isbn978-3-88579-616-9
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/17247
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofEnterprise Modelling and Information Systems Architectures (EMISA 2013)
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-222
dc.titleSecSy: Synthesizing Process Event Logsen
dc.typeText/Conference Paper
gi.citation.endPage84
gi.citation.publisherPlaceBonn
gi.citation.startPage71
gi.conference.dateSeptember 5-6, 2017
gi.conference.locationSt. Gallen, Switzerland
gi.conference.sessiontitleRegular Research Papers

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
71.pdf
Größe:
287.72 KB
Format:
Adobe Portable Document Format