A case study on the suitability of process mining to produce current-state RBAC models

Maria Leitner, Anne Baumgrass, Sigrid Schefer-Wenzl, Stefanie Rinderle-Ma, Mark Strembeck

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

Role-based access control (RBAC) is commonly used to implement authorization procedures in Process-aware information systems (PAIS). Process mining refers to a bundle of algorithms that typically discover process models from event log data produced during the execution of real-world processes. Beyond pure control flow mining, some techniques focus on the discovery of organizational information from event logs. However, a systematic analysis and comparison of these approaches with respect to their suitability for mining RBAC models is still missing. This paper works towards filling this gap and provides a first guidance for applying mining techniques for deriving RBAC models.

Original languageEnglish
Title of host publicationBusiness Process Management Workshops - BPM 2012 International Workshops, Revised Papers
PublisherSpringer Verlag
Pages719-724
Number of pages6
ISBN (Print)9783642362842
DOIs
StatePublished - 2013
Externally publishedYes
EventInternational Workshop on Business Process Management, BPM 2012 - Tallinn, Estonia
Duration: 3 Sep 20123 Sep 2012

Publication series

NameLecture Notes in Business Information Processing
Volume132 LNBIP
ISSN (Print)1865-1348

Conference

ConferenceInternational Workshop on Business Process Management, BPM 2012
Country/TerritoryEstonia
CityTallinn
Period3/09/123/09/12

Keywords

  • Process Mining
  • RBAC
  • Security in Business Processes

Fingerprint

Dive into the research topics of 'A case study on the suitability of process mining to produce current-state RBAC models'. Together they form a unique fingerprint.

Cite this