Detecting Privacy, Data and Control-Flow Deviations in Business Processes

7Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Existing access control mechanisms are not sufficient for data protection. They are only preventive and cannot guarantee that data is accessed for the intended purpose. This paper proposes a novel approach for multi-perspective conformance checking which considers the control-flow, data and privacy perspectives of a business process simultaneously to find the context in which data is processed. In addition to detecting deviations in each perspective, the approach is able to detect hidden deviations where non-conformity relates to either a combination of two or all three aspects of a business process. The approach has been implemented in the open source ProM framework and was evaluated through controlled experiments using synthetic logs of a simulated real-life process.

Cite

CITATION STYLE

APA

Mozafari Mehr, A. S., de Carvalho, R. M., & van Dongen, B. (2021). Detecting Privacy, Data and Control-Flow Deviations in Business Processes. In Lecture Notes in Business Information Processing (Vol. 424 LNBIP, pp. 82–91). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-79108-7_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free