Sciweavers

344 search results - page 7 / 69
» Process Modeling as a Basis for Auditing Information Privacy
Sort
View
AEI
2007
119views more  AEI 2007»
13 years 9 months ago
Exploring the CSCW spectrum using process mining
Process mining techniques allow for extracting information from event logs. For example, the audit trails of a workflow management system or the transaction logs of an enterprise ...
Wil M. P. van der Aalst
ESWS
2007
Springer
14 years 3 months ago
Towards an Ontology for Process Monitoring and Mining
Abstract. Business Process Analysis (BPA) aims at monitoring, diagnosing, simulating and mining enacted processes in order to support the analysis and enhancement of process models...
Carlos Pedrinaci, John Domingue
ER
2007
Springer
237views Database» more  ER 2007»
14 years 3 months ago
Business Process and Business Rule Modeling Languages for Compliance Management: A Representational Analysis
Organizations are under increasing scrutiny to document their compliance to regulatory requirements. To this end, they have to formally document their operating procedures to supp...
Michael zur Muehlen, Marta Indulska, Gerrit Kamp
ACSAC
2008
IEEE
14 years 3 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
CSFW
2000
IEEE
14 years 1 months ago
Information Flow Analysis in a Discrete-Time Process Algebra
Some of the non interference properties studied in [4, 6, 18] for information flow analysis in computer systems, notably Æ , are reformulated here in a realtime setting. This is...
Riccardo Focardi, Roberto Gorrieri, Fabio Martinel...