The final publication is available at Springer via http://dx.doi.org/10.1007/s12599-019-00613-3Privacy regulations for data can be regarded as a major driver for data sovereignty measures. A specific example for this is the case of event data that is recorded by information systems during the processing of entities in domains such as e-commerce or health care. Since such data, typically available in the form of event log files, contains personalized information on the specific processed entities, it can expose sensitive information that may be traced back to individuals. In recent years, a plethora of methods have been developed to analyse event logs under the umbrella of process mining. However, the impact of privacy regulations on the tec...
In this archive, we provide supplementary material for our paper entitled "Mine Me but Don’t Single ...
With the advent of cloud computing and its model for IT services based on the Internet and big data ...
In the area of industrial process mining, privacy-preserving event data publication is becoming incr...
Privacy regulations for data can be regarded as amajor driver for data sovereignty measures. A speci...
Process mining has been successfully applied in the healthcare domain and has helped to uncover vari...
The applicability of process mining techniques hinges on the availability of event logs capturing th...
The privacy of an organization's workers represents a crucial concern in process mining settings, wh...
International audienceProcess mining aims to bridge the gap between data science and process science...
Event logs recorded during the execution of business processes constitute a valuable source of infor...
Event logs capture the execution of business processes in terms of executed activities and their exe...
Event logs that originate from information systems enable comprehensive analysis of business process...
In this document, we provide supplementary material for the paper entitled "Mine Me but Don't Single...
Process mining has been successfully applied in the healthcare domain and helped to uncover various ...
In this archive, we provide supplementary material for our paper entitled "Mine Me but Don’t Single ...
With the advent of cloud computing and its model for IT services based on the Internet and big data ...
In the area of industrial process mining, privacy-preserving event data publication is becoming incr...
Privacy regulations for data can be regarded as amajor driver for data sovereignty measures. A speci...
Process mining has been successfully applied in the healthcare domain and has helped to uncover vari...
The applicability of process mining techniques hinges on the availability of event logs capturing th...
The privacy of an organization's workers represents a crucial concern in process mining settings, wh...
International audienceProcess mining aims to bridge the gap between data science and process science...
Event logs recorded during the execution of business processes constitute a valuable source of infor...
Event logs capture the execution of business processes in terms of executed activities and their exe...
Event logs that originate from information systems enable comprehensive analysis of business process...
In this document, we provide supplementary material for the paper entitled "Mine Me but Don't Single...
Process mining has been successfully applied in the healthcare domain and helped to uncover various ...
In this archive, we provide supplementary material for our paper entitled "Mine Me but Don’t Single ...
With the advent of cloud computing and its model for IT services based on the Internet and big data ...
In the area of industrial process mining, privacy-preserving event data publication is becoming incr...