{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T15:29:37Z","timestamp":1758814177686},"reference-count":13,"publisher":"Springer Fachmedien Wiesbaden GmbH","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["HMD"],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1007\/bf03340838","type":"journal-article","created":{"date-parts":[[2014,1,14]],"date-time":"2014-01-14T03:36:58Z","timestamp":1389670618000},"page":"92-103","source":"Crossref","is-referenced-by-count":2,"title":["Computergest\u00fctzte Prozessauditierung mit Process Mining"],"prefix":"10.1365","volume":"50","author":[{"given":"Thomas","family":"Stocker","sequence":"first","affiliation":[]},{"given":"Rafael","family":"Accorsi","sequence":"additional","affiliation":[]},{"given":"Tobias","family":"Rother","sequence":"additional","affiliation":[]}],"member":"93","published-online":{"date-parts":[[2014,1,13]]},"reference":[{"key":"BF03340838_CR1","doi-asserted-by":"crossref","unstructured":"Accorsi, R.: Business Process as a Service: Chances for Remote Auditing. IEEE Computer Software and Applications Conference, 2011, pp. 398\u2013403.","DOI":"10.1109\/COMPSACW.2011.73"},{"key":"BF03340838_CR2","doi-asserted-by":"crossref","unstructured":"Accorsi R.; Stocker T.: On the Exploitation of Process Mining for Security Audits: The Conformance Checking Case. ACM Symposium on Applied Computing, 2012, pp. 1709\u20131716.","DOI":"10.1145\/2245276.2232051"},{"key":"BF03340838_CR3","doi-asserted-by":"crossref","unstructured":"Baumgra\u00df, A.; Baier, T.; Mendling, J.; Strembeck, M.: Conformance Checking of RBAC Policies in Process-Aware Information Systems. Business Process Management Workshops, 2011, pp. 435\u2013446.","DOI":"10.1007\/978-3-642-28115-0_41"},{"issue":"3","key":"BF03340838_CR4","doi-asserted-by":"crossref","first-page":"666","DOI":"10.1147\/sj.403.0666","volume":"40","author":"R Botha","year":"2001","unstructured":"Botha, R.; Eloff, J.: Separation of Duties for Access Control Enforcement in Workflow Environments. IBM Systems Journal 40 (2001), 3, pp. 666\u2013682.","journal-title":"IBM Systems Journal"},{"issue":"7","key":"BF03340838_CR5","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1109\/MC.2007.246","volume":"40","author":"A Carlin","year":"2007","unstructured":"Carlin, A.; Gallegos, F.: IT Audit: A Critical Business Process. IEEE Computer 40 (2007), 7, pp. 7\u201389.","journal-title":"IEEE Computer"},{"issue":"2","key":"BF03340838_CR6","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1145\/304399.304401","volume":"8","author":"J Cook","year":"1999","unstructured":"Cook, J.; Wolf, A.: Software Process Validation: Quantitatively Measuring the Correspondence of a Process to a Model. ACM Transactions on Software Engineering Methodology 8 (1999), 2, pp. 147\u2013176.","journal-title":"ACM Transactions on Software Engineering Methodology"},{"key":"BF03340838_CR7","doi-asserted-by":"crossref","unstructured":"Dumas, M.; van der Aalst, W.; ter Hofstede, A.: Process Aware Information Systems: Bridging People and Software Through Process Technology. Wiley-Interscience, 2005.","DOI":"10.1002\/0471741442"},{"key":"BF03340838_CR8","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1007\/978-3-540-75183-0_24","volume-title":"Business Process Management (BPM'07)","author":"C G\u00fcnther","year":"2007","unstructured":"G\u00fcnther, C.; van der Aalst, W.: Fuzzy Mining: Adaptive Process Simplification Based on Multi-Perspective Metrics. Business Process Management (BPM'07), Springer-Verlag, Berlin, 2007, pp. 328\u2013343."},{"issue":"3","key":"BF03340838_CR9","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1109\/TSC.2010.37","volume":"4","author":"L Lowis","year":"2011","unstructured":"Lowis, L.; Accorsi, R.: Vulnerability Analysis in SOA-Based Business Processes. IEEE Transactions on Services Computing 4 (2011), 3, pp. 230\u2013242.","journal-title":"IEEE Transactions on Services Computing"},{"key":"BF03340838_CR10","doi-asserted-by":"crossref","unstructured":"van der Aalst, W.: Process Mining \u2014 Discovery, Conformance and Enhancement of Business Processes. Springer-Verlag, Heidelberg, 2011.","DOI":"10.1007\/978-3-642-19345-3"},{"key":"BF03340838_CR11","doi-asserted-by":"crossref","unstructured":"van der Aalst, W.; de Beer, H.; van Dongen, B.: Process Mining and Verification of Properties: An Approach Based on Temporal Logic. OTM Conferences, 2005, pp. 130\u2013147.","DOI":"10.1007\/11575771_11"},{"issue":"3","key":"BF03340838_CR12","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/MC.2010.61","volume":"43","author":"W der Aalst van","year":"2010","unstructured":"van der Aalst, W.; van Hee, K.; van der Werf, J.; Verdonk, M.: Auditing 2.0: Using Process Mining to Support Tomorrow's Auditor. IEEE Computer 43 (2010), 3, pp. 90\u201393.","journal-title":"IEEE Computer"},{"key":"BF03340838_CR13","doi-asserted-by":"crossref","unstructured":"van Dongen, B.; Alves de Medeiros, A.; Wen, L.: Process Mining: Overview and Outlook of Petri Net Discovery Algorithms. Transactions on Petri Nets and Other Models of Concurrency II, 2009, pp. 225\u2013242.","DOI":"10.1007\/978-3-642-00899-3_13"}],"container-title":["HMD Praxis der Wirtschaftsinformatik"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03340838","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,23]],"date-time":"2022-03-23T10:29:24Z","timestamp":1648031364000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF03340838"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":13,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,8]]}},"alternative-id":["BF03340838"],"URL":"https:\/\/doi.org\/10.1007\/bf03340838","relation":{},"ISSN":["1436-3011","2198-2775"],"issn-type":[{"value":"1436-3011","type":"print"},{"value":"2198-2775","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,8]]}}}