Author:
Müller Günter,Accorsi Rafael,Höhn Sebastian,Sackmann Stefan
Publisher
Springer Science and Business Media LLC
Subject
Computer Science Applications,Information Systems
Reference47 articles.
1. van der Aalst W, van Dongena B, Herbst J, Marustera L, Schimm G, Weijters A (2003) Workflow mining: A survey of issues and approaches. Data Knowl Eng 47(2):237–267
2. van der Aalst W, de Medeiros A (2005) Process mining and security: Detecting anomalous process executions and checking process conformance. Electron Notes Theor Comput Sci 121:3–21
3. Accorsi R (2008) Automated Privacy Audits to Complement the Notion of Control for Identity Management. In: Proceedings of the IFIP Conference on Policies and Research in Identity Management, vol 261, Springer-Verlag, Boston, pp 39–48
4. Accorsi R (2008) Automated Counterexample-Driven Audits of Authentic System Records. Dissertation, Universität Freiburg, Freiburg im Breisgau
5. Accorsi R (2009) Safekeeping Digital Evidence with Secure Logging Protocols. Proceedings of the 5th Conference on IT Security Incident Management & IT Forensics, IEEE, IEEE Computer Press, Los Alamitos, pp 94–110
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献