Process Mining for Trust Monitoring

Communicating systems are today composed of a huge number of distributed processes interoperate with diverse kinds of applications, services and actors. It therefore becomes crucial to monitor and manage these trustworthy interactions. For that purpose, passive testing techniques have been used particularly for checking the system conformance w.r.t. Its standard. Among these studies, trust behaviors have been monitored in such systems. However, while several approaches have been designed, most of them monitor trust properties that have been manually designed or provided by common database. In this paper, we propose a novel approach to automatically generate trust properties from the study and analysis of the system through process mining techniques and by comparing with the formal specification of the system under test.

[1]  Wil M. P. van der Aalst,et al.  Workflow mining: discovering process models from event logs , 2004, IEEE Transactions on Knowledge and Data Engineering.

[2]  P. Sreenivasa Kumar,et al.  Efficient Trust-Based Approximate SPARQL Querying of the Web of Linked Data , 2013, URSW.

[3]  Wil M.P. van der Aalst,et al.  Fuzzy Mining - Adaptive Process Simplification Based on Multi-perspective Metrics , 2007, BPM.

[4]  David Carrera,et al.  Business Process Mining from E-Commerce Web Logs , 2013, BPM.

[5]  Jorge López,et al.  A Distributed Monitoring Approach for Trust Assessment Based on Formal Testing , 2014, 2014 28th International Conference on Advanced Information Networking and Applications Workshops.

[6]  Guy Pujolle,et al.  An autonomic knowledge monitoring scheme for trust management on mobile ad hoc networks , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[7]  David Lee,et al.  Network protocol system monitoring-a formal approach with passive testing , 2006, IEEE/ACM Transactions on Networking.

[8]  Paul V. Mockapetris,et al.  Domain names - implementation and specification , 1987, RFC.

[9]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[10]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[11]  Stéphane Maag,et al.  A Logic-based Passive Testing Approach for the Validation of Communicating Protocols , 2012, ENASE.

[12]  Ana R. Cavalli,et al.  A passive conformance testing approach for a MANET routing protocol , 2009, SAC '09.

[13]  Paolo Ceravolo,et al.  Consistent Process Mining over Big Data Triple Stores , 2013, 2013 IEEE International Congress on Big Data.

[14]  Trevor Jim,et al.  SD3: a trust management system with certified evaluation , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[15]  Jorge López,et al.  Testing trust properties using a formal distributed network monitoring approach , 2015, Ann. des Télécommunications.

[16]  Joan Feigenbaum,et al.  REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.

[17]  Morris Sloman,et al.  Trust Management Tools for Internet Applications , 2003, iTrust.

[18]  David L. Mills,et al.  Internet time synchronization: the network time protocol , 1991, IEEE Trans. Commun..

[19]  Stéphane Maag,et al.  A Formal Data-Centric Approach for Passive Testing of Communication Protocols , 2013, IEEE/ACM Transactions on Networking.

[20]  Ana R. Cavalli,et al.  Trust-orBAC: A Trust Access Control Model in Multi-Organization Environments , 2012, ICISS.

[21]  Wil M. P. van der Aalst,et al.  Business Process Management in the Large , 2011, Bus. Inf. Syst. Eng..