Workshop on Process Mining for Security, Privacy, Compliance & Resilience (PMSPCR 2016)

– workshop cancelled –

Topics of interest | Submission guidelines | Important dates | Organizers and Chairs | Program Committee

Security in Business Processes (BP) is an extension to well-known security analysis. Security rules are either defined by regulation, e.g. data protection law, or as guidelines for good conducts, e.g. Basel III or SOX. Business guidelines, e.g. ITIL and COBIT, form a specification of regulation and business conduct, but there are almost no satisfying approaches as far as computer science is concerned. This workshop deals with process mining as a means for security analysis.

Three phases may be identified: process analysis before execution, monitoring, or after execution of the BP. With regard to the latter, logs recording the events executed in BP build the basis for Process Mining (PM), which provides methods and tools to ensure compliance to regulations and guidelines.

This workshop aims to explore the potentials of process mining to bridge the gap between an analysis of workflows and a certification of compliance and security. We invite innovative and previously undisclosed contributions, but also case studies and best practices, which present the analysis of business processes related to security, resilience and privacy aspects “by design”, during runtime, and forensically, based on the analysis of process logs. In this regard, we explicitly invite submission of practical contributions.

Topics of interest

  • delegation of rights in business processes
  • agility and resilience of business processes
  • temporal aspects in business processes
  • resource impact analysis
  • forensic log analysis
  • constraint based obstruction detection and correction/workarounds
  • interoperability of workflow systems
  • impacts of interferences on processes
  • process mining and ex-post analysis of processes
  • conformance checking
  • process optimization with external data sources
  • integration of automated workflows in existing structures

Submission guidelines

  • Long papers: max. 12 pages

Submitted papers must be original, unpublished, and not submitted to another conference or journal for consideration. Authors must follow the LNBIP formatting guidelines.

Submission system is available at EasyChair.

Papers approved for presentation will be published in BIS 2016 workshop post-conference proceedings, as a volume in Lecture Notes in Business Information Processing series by Springer after a second review round. Submissions need to be anonymized and will receive at least three reviews.

Registration for the BIS’16 conference entitles to participate in the conference, as well as in all workshops and tutorials held in conjunction with it. At least one author of each paper needs to register for the conference for the paper to be included in proceedings.

Important dates

  • Submission deadline: May 6, 2016
  • Notification of acceptance/rejection: May 27, 2016
  • Submission of final papers: Jun 14, 2016
  • Workshop: Jul 6-8, 2016

Organizers and Chairs

  • Prof. Dr. Dr. h.c. Günter Müller, Albert-Ludwigs-University of Freiburg (General Chair)
  • Julius Holderer, Albert-Ludwigs-University of Freiburg (Co-Chair)
  • Adrian Lange, Albert-Ludwigs-University of Freiburg (Co-Chair)

Program Committee

  • Günter Müller, Albert-Ludwigs-University of Freiburg
  • Rafael Accorsi, Price Waterhouse Zürich
  • Julius Holderer, Albert-Ludwigs-University of Freiburg
  • Adrian Lange, Albert-Ludwigs-University of Freiburg
  • Richard Zahoransky, Albert-Ludwigs-University of Freiburg
  • Silvia von Stackelberg, Karlsruhe Institute of Technology
  • Josep Carmona, UPC Barcelona
  • Stefanie Rinderle-Ma, University of Vienna
  • Stefan Sackmann, Martin-Luther-University Halle-Wittenberg
  • Sven Wohlgemuth, Senior Security Scientist