[HTML][HTML] A systematic review on security in Process-Aware Information Systems–Constitution, challenges, and future directions

M Leitner, S Rinderle-Ma - Information and Software Technology, 2014 - Elsevier
Abstract Context Security in Process-Aware Information Systems (PAIS) has gained
increased attention in current research and practice. However, a common understanding …

A framework for efficiently mining the organisational perspective of business processes

S Schönig, C Cabanillas, S Jablonski… - Decision Support …, 2016 - Elsevier
Process mining aims at discovering processes by extracting knowledge from event logs.
Such knowledge may refer to different business process perspectives. The organisational …

Mining the organisational perspective in agile business processes

S Schönig, C Cabanillas, S Jablonski… - International Workshop on …, 2015 - Springer
Agile processes depend on human resources, decisions and expert knowledge, and they
are especially versatile and comprise rather complex scenarios. Declarative, ie, rule-based …

Mining team compositions for collaborative work in business processes

S Schönig, C Cabanillas, C Di Ciccio… - Software & Systems …, 2018 - Springer
Process mining aims at discovering processes by extracting knowledge about their different
perspectives from event logs. The resource perspective (or organisational perspective) …

Towards employing process mining for role based access control analysis: a systematic literature review

R Alrahili - Proceedings of the Future Technologies Conference …, 2022 - Springer
In recent years, process mining has been used quite extensively for security analysis. Yet,
we have limited understanding of the use of process mining for Role Based Access Control …

Delta analysis of role-based access control models

M Leitner - Computer Aided Systems Theory-EUROCAST 2013 …, 2013 - Springer
Abstract Role-based Access Control (RBAC) is de facto standard for access control in
Process-aware Information Systems (PAIS); it grants authorization to users based on roles …

Conceptual framework for adaptive access and identity management

S Extros, TN Nisha - AIP Conference Proceedings, 2023 - pubs.aip.org
Access and Identity management have always been the key enablers in connecting the
users with the enterprises, system or networks. As a result of enhancing security culture …

Security and privacy in business processes: a posteriori analysis techniques

M Strembeck, S Rinderle-Ma - IT–Information Technology, 2013 - degruyter.com
In this paper, we motivate the need to perform a posteriori analyzes for process-related
security properties. In particular, we first discuss the relation of security engineering and a …

The application of process mining in determining employee well-being

S Lugtigheid - 2022 - studenttheses.uu.nl
The monitoring of well-being has become increasingly popular in the last decade as higher
employee well-being results in better performance and reduces the number of burnouts …

[PDF][PDF] The resource perspective in process mining: a systematic literature review

E Van Coillie - 2022 - documentserver.uhasselt.be
Faculty of Business Economics Master of Management 2021 2022 Page 1 Faculty of
Business Economics Master of Management Master's thesis The resource perspective in …