PMSPCR 2016 - Workshop on Process Mining for Security, Privacy, Compliance & Resilience
Topics/Call fo Papers
Security in Business Processes (BP) is an extension to well-known security analysis. Security rules are either defined by regulation, e.g. data protection law, or as guidelines for good conducts, e.g. Basel III or SOX. Business guidelines, e.g. ITIL and COBIT, form a specification of regulation and business conduct, but there are almost no satisfying approaches as far as computer science is concerned. This workshop deals with process mining as a means for security analysis.
Three phases may be identified: process analysis before execution, monitoring, or after execution of the BP. With regard to the latter, logs recording the events executed in BP build the basis for Process Mining (PM), which provides methods and tools to ensure compliance to regulations and guidelines.
This workshop aims to explore the potentials of process mining to bridge the gap between an analysis of workflows and a certification of compliance and security. We invite innovative and previously undisclosed contributions, but also case studies and best practices, which present the analysis of business processes related to security, resilience and privacy aspects “by design”, during runtime, and forensically, based on the analysis of process logs. In this regard, we explicitly invite submission of practical contributions.
Topics of interest
delegation of rights in business processes
agility and resilience of business processes
temporal aspects in business processes
resource impact analysis
forensic log analysis
constraint based obstruction detection and correction/workarounds
interoperability of workflow systems
impacts of interferences on processes
process mining and ex-post analysis of processes
conformance checking
process optimization with external data sources
integration of automated workflows in existing structures
Three phases may be identified: process analysis before execution, monitoring, or after execution of the BP. With regard to the latter, logs recording the events executed in BP build the basis for Process Mining (PM), which provides methods and tools to ensure compliance to regulations and guidelines.
This workshop aims to explore the potentials of process mining to bridge the gap between an analysis of workflows and a certification of compliance and security. We invite innovative and previously undisclosed contributions, but also case studies and best practices, which present the analysis of business processes related to security, resilience and privacy aspects “by design”, during runtime, and forensically, based on the analysis of process logs. In this regard, we explicitly invite submission of practical contributions.
Topics of interest
delegation of rights in business processes
agility and resilience of business processes
temporal aspects in business processes
resource impact analysis
forensic log analysis
constraint based obstruction detection and correction/workarounds
interoperability of workflow systems
impacts of interferences on processes
process mining and ex-post analysis of processes
conformance checking
process optimization with external data sources
integration of automated workflows in existing structures
Other CFPs
- 6th Workshop on Legal Informatics and Legal Information Technology (LIT 2016)
- 1st International Workshop on Integrative Analysis and Computation of Life Data for Smart Ecosystems (INCLuDE 2016)
- 1st International Workshop on Intelligent Data Analysis in Integrated Social CRM (iCRM 2016)
- 4th Workshop on Formal Semantics for the Future Enterprise (FSFE 2016)
- Workshop on big Data and Business AnalyticS Ecosystems (DeBASE 2016)
Last modified: 2016-01-17 19:07:58