使用不完整的流程日志进行组织间业务流程的在线和离线一致性检查

A. C. D'Iddio, C. Schunck, F. Arcieri, M. Talamo
{"title":"使用不完整的流程日志进行组织间业务流程的在线和离线一致性检查","authors":"A. C. D'Iddio, C. Schunck, F. Arcieri, M. Talamo","doi":"10.1109/CCST.2016.7815702","DOIUrl":null,"url":null,"abstract":"Ensuring the compliance of inter-organizational business processes with security, privacy and workflow requirements poses significant challenges. For compliance checking a specification of the process model which contains important requirements like causal dependencies among actions must be compared to the available data from the process execution. Complete execution data may only become available by combining distributed event logs which are maintained and stored independently by the participants. Frequently the information in combined event logs is found to be of limited reliability and quality: the overall maturity of some event logs may be low, the temporal structure of events may be unclear/imprecise (e.g. when logs of different organizations are combined), confidentiality constraints may prevent certain activities from being logged and logs may be partially corrupted. We propose an approach using abstraction techniques based on over-approximation and under-approximation for checking the compliance of incomplete process logs with a given process specification. Such methods are widely used in Model Checking to model unmanageable information about the states of a system (state explosion). Here these techniques are applied to model unavailable information, in particular incomplete event descriptions. We show under what conditions deviations from a specification can be confirmed as anomalies and when a process can be certified as correct even in the presence of incomplete event descriptions. The methods described here can be adopted for post mortem investigation, for the prevention and detection of security anomalies and for assessing the maturity level of event logs.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"20 1","pages":"1-8"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Online and offline conformance checking of inter-organizational business processes with incomplete process logs\",\"authors\":\"A. C. D'Iddio, C. Schunck, F. Arcieri, M. Talamo\",\"doi\":\"10.1109/CCST.2016.7815702\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Ensuring the compliance of inter-organizational business processes with security, privacy and workflow requirements poses significant challenges. For compliance checking a specification of the process model which contains important requirements like causal dependencies among actions must be compared to the available data from the process execution. Complete execution data may only become available by combining distributed event logs which are maintained and stored independently by the participants. Frequently the information in combined event logs is found to be of limited reliability and quality: the overall maturity of some event logs may be low, the temporal structure of events may be unclear/imprecise (e.g. when logs of different organizations are combined), confidentiality constraints may prevent certain activities from being logged and logs may be partially corrupted. We propose an approach using abstraction techniques based on over-approximation and under-approximation for checking the compliance of incomplete process logs with a given process specification. Such methods are widely used in Model Checking to model unmanageable information about the states of a system (state explosion). Here these techniques are applied to model unavailable information, in particular incomplete event descriptions. We show under what conditions deviations from a specification can be confirmed as anomalies and when a process can be certified as correct even in the presence of incomplete event descriptions. The methods described here can be adopted for post mortem investigation, for the prevention and detection of security anomalies and for assessing the maturity level of event logs.\",\"PeriodicalId\":6510,\"journal\":{\"name\":\"2016 IEEE International Carnahan Conference on Security Technology (ICCST)\",\"volume\":\"20 1\",\"pages\":\"1-8\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE International Carnahan Conference on Security Technology (ICCST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.2016.7815702\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2016.7815702","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

确保组织间业务流程与安全性、隐私性和工作流需求的遵从性构成了重大挑战。对于合规性检查,必须将包含重要需求(如操作之间的因果依赖关系)的流程模型规范与流程执行的可用数据进行比较。只有将参与者独立维护和存储的分布式事件日志结合起来,才能获得完整的执行数据。经常发现合并事件日志中的信息可靠性和质量有限:一些事件日志的整体成熟度可能较低,事件的时间结构可能不清楚/不精确(例如,当不同组织的日志合并时),机密性约束可能阻止记录某些活动,日志可能部分损坏。我们提出了一种使用基于过近似和欠近似的抽象技术来检查不完整过程日志是否符合给定过程规范的方法。这种方法被广泛应用于模型检查中,对系统状态的不可管理信息(状态爆炸)进行建模。在这里,这些技术被应用于建模不可用的信息,特别是不完整的事件描述。我们展示了在什么条件下,对规范的偏离可以被确认为异常,以及即使在存在不完整事件描述的情况下,什么时候可以证明过程是正确的。这里描述的方法可以用于事后调查、安全异常的预防和检测,以及评估事件日志的成熟度级别。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Online and offline conformance checking of inter-organizational business processes with incomplete process logs
Ensuring the compliance of inter-organizational business processes with security, privacy and workflow requirements poses significant challenges. For compliance checking a specification of the process model which contains important requirements like causal dependencies among actions must be compared to the available data from the process execution. Complete execution data may only become available by combining distributed event logs which are maintained and stored independently by the participants. Frequently the information in combined event logs is found to be of limited reliability and quality: the overall maturity of some event logs may be low, the temporal structure of events may be unclear/imprecise (e.g. when logs of different organizations are combined), confidentiality constraints may prevent certain activities from being logged and logs may be partially corrupted. We propose an approach using abstraction techniques based on over-approximation and under-approximation for checking the compliance of incomplete process logs with a given process specification. Such methods are widely used in Model Checking to model unmanageable information about the states of a system (state explosion). Here these techniques are applied to model unavailable information, in particular incomplete event descriptions. We show under what conditions deviations from a specification can be confirmed as anomalies and when a process can be certified as correct even in the presence of incomplete event descriptions. The methods described here can be adopted for post mortem investigation, for the prevention and detection of security anomalies and for assessing the maturity level of event logs.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信