Extracting Attribute-Based Access Control Rules from Business Process Event Logs.
Amani Abou RidaNour AssyWalid GaaloulPublished in: BDCSIntell (2019)
Keyphrases
- access control
- event logs
- business process
- process mining
- security policies
- business rules
- business processes
- process model
- fine grained
- data security
- web services
- access control mechanism
- access control policies
- security requirements
- association rules
- role based access control
- workflow model
- case study
- service oriented architecture
- classification rules
- identity management
- rbac model
- virtual organization
- data mining
- workflow systems
- workflow models