Gesellschaft für Informatik e.V.

Lecture Notes in Informatics


Enterprise modelling and information systems architectures (EMISA 2013) P-222, 71-84 (2013).

Gesellschaft für Informatik, Bonn
2013


Copyright © Gesellschaft für Informatik, Bonn

Contents

Secsy: synthesizing process event logs

Rafael Accorsi and Thomas Stocker

Abstract


One difficulty at developing mechanisms for business process security monitoring and auditing is the lack of representative, controllably generated test runs to serve as an evaluation basis. This paper presents an approach and the corresponding tool support for event log synthesis. The novelty is that it considers the activity of an “attacker” able to purposefully infringe security and compliance requirements or simply manipulate the process' control and data flow, thereby creating deviations of the intended process model. The resulting logs can be readily replayed on a reference monitor, or serve as input for auditing tools based upon, e.g., process mining.


Full Text: PDF

Gesellschaft für Informatik, Bonn
ISBN 978-3-88579-616-9


Last changed 12.03.2014 15:22:36