Towards employing process mining for role based access control analysis: a systematic literature review

R Alrahili - Proceedings of the Future Technologies Conference …, 2022 - Springer
In recent years, process mining has been used quite extensively for security analysis. Yet,
we have limited understanding of the use of process mining for Role Based Access Control …

[PDF][PDF] Process Mining Approaches to Detect Organizational Properties in Cyber-Physical Systems.

M Matzner, H Scholta - ECIS, 2014 - researchgate.net
Cyber-physical systems (CPS) are service systems that connect physical and cyber
elements through global networks. CPS put upon sensors and actuators as well as …

Resource classification from version control system logs

K Agrawal, M Aschauer, T Thonhofer… - 2016 IEEE 20th …, 2016 - ieeexplore.ieee.org
Collaboration in business processes and projects requires a division of responsibilities
among the participants. Version control systems allow us to collect profiles of the participants …

Bridging the gap between role mining and role engineering via migration guides

A Baumgrass, M Strembeck - information security technical report, 2013 - Elsevier
In the context of role-based access control (RBAC), mining approaches, such as role mining
or organizational mining, can be applied to derive permissions and roles from a system's …

A case study on the suitability of process mining to produce current-state RBAC models

M Leitner, A Baumgrass, S Schefer-Wenzl… - … Workshops: BPM 2012 …, 2013 - Springer
Role-based access control (RBAC) is commonly used to implement authorization
procedures in Process-aware information systems (PAIS). Process mining refers to a bundle …

Advanced identity and access policy management using contextual data

M Hummer, M Kunz, M Netter, L Fuchs… - … , reliability and security, 2015 - ieeexplore.ieee.org
Due to compliance and IT security requirements, company-wide Identity and Access
Management within organizations has gained significant importance in research and …

An approach to bridge the gap between role mining and role engineering via migration guides

A Baumgrass, M Strembeck - 2012 Seventh International …, 2012 - ieeexplore.ieee.org
Mining approaches, such as role mining or organizational mining, can be applied to derive
permissions and roles from a system's configuration or from log files. In this way, mining …

Study on Interaction Behaviors of Micro-autonomous Vehicles

D Li, X Wang, W He, M Guo… - 2011 Tenth International …, 2011 - ieeexplore.ieee.org
Autonomous vehicles are very hot research area which advance artificial intelligent, pattern
recognition, computer vision, sensor fusion and control theory. In the paper we demonstrate …

Monitoring of access control policy for refinement and improvements

A Calabró, F Lonetti, E Marchetti - Software Quality: Methods and Tools for …, 2018 - Springer
Access Control is among the most important security mechanisms to put in place in order to
secure applications, and XACML is the de facto standard for defining access control policies …

[图书][B] Ein Process Mining-Rahmenwerk für agile, personenbezogene Prozesse

S Schönig - 2015 - search.proquest.com
Prozessmanagement gilt als Ansatz, durch Modellierung und Unterstützung von Prozessen
in Organisationen, Dienstleistungen effektiv zu gestalten. Es existieren verschiedene Arten …