Provided by: Universitat Oberta de Catalunya
Topic: Big Data
Date Added: Apr 2013
Any system, company or complex task is composed by processes, i.e., sequences of actions performed in some established order. Some of these processes are considered sensitive for the role they play within the system, or for the sensitive data they manage. In such cases, the trust in these processes is desirable, requiring their verification, monitoring, auditing, but also the possibility of being insured by a third party. In this paper, the authors propose a schema for insuring sensitive process based on the use of formal models and process mining techniques (i.e. process management techniques that allows for the analysis of processes based on event logs).