DocumentCode :
1923431
Title :
Towards Forensic Data Flow Analysis of Business Process Logs
Author :
Accorsi, Rafael ; Wonnemann, Claus ; Stocker, Thomas
Author_Institution :
Dept. of Telematics, Univ. of Freiburg, Freiburg, Germany
fYear :
2011
fDate :
10-12 May 2011
Firstpage :
3
Lastpage :
20
Abstract :
This paper presents RecIF, a forensic technique for the analysis of business process logs to detect illegal data flows. RecIF uses propagation graphs to formally capture the data flow within a process execution. Abstracting away from the concrete traces, propagation graphs are analyzed with extensional data flow policies that denote what - instead of how - relevant industrial requirements, e.g. Chinese Wall and separation of duty constraints, are to be achieved. An example and the corresponding runtime figures demonstrate the feasibility of the approach.
Keywords :
business process re-engineering; computer forensics; data flow analysis; public domain software; workflow management software; RecIF; business process logs; extensional data flow policies; forensic data flow analysis; illegal data flows; process execution; propagation graphs; Access control; Business; Data mining; Data models; Forensics; Web services; Business process forensics; Data flow policies; data flow reconstruction;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
IT Security Incident Management and IT Forensics (IMF), 2011 Sixth International Conference on
Conference_Location :
Stuttgart
Print_ISBN :
978-1-4577-0146-7
Type :
conf
DOI :
10.1109/IMF.2011.13
Filename :
5931109
Link To Document :
بازگشت