Event logs that originate from information systems enable comprehensive analysis of business processes, e.g., by process model discovery. However, logs potentially contain sensitive information about individual employees involved in process execution that are only partially hidden by an obfuscation of the event data. In this paper, we therefore address the risk of privacy-disclosure attacks on event logs with pseudonymized employee information. To this end, we introduce PRETSA, a novel algorithm for event log sanitization that provides privacy guarantees in terms of k-anonymity and t-closeness. It thereby avoids disclosure of employee identities, their membership in the event log, and their characterization based on sensitive attributes, su...
The size of computing systems and the number of their components steadily increase. The volume of ge...
In the area of industrial process mining, privacy-preserving event data publication is becoming incr...
In this document, we provide supplementary material for the paper entitled "Mine Me but Don't Single...
Event logs that originate from information systems enable comprehensive analysis of business process...
The final publication is available at Springer via http://dx.doi.org/10.1007/s12599-019-00613-3Priva...
Event logs capture the execution of business processes in terms of executed activities and their exe...
The privacy of an organization's workers represents a crucial concern in process mining settings, wh...
Event logs recorded during the execution of business processes constitute a valuable source of infor...
The applicability of process mining techniques hinges on the availability of event logs capturing th...
International audienceProcess mining aims to bridge the gap between data science and process science...
Privacy regulations for data can be regarded as amajor driver for data sovereignty measures. A speci...
Process mining has been successfully applied in the healthcare domain and has helped to uncover vari...
Validation in a big software system can be managed by analysis of its behaviour through occasionally...
The growing complexity of software with respect to technological advances encourages model-based ana...
In this document, we list the selected event logs, their characteristics, and their descriptive sta...
The size of computing systems and the number of their components steadily increase. The volume of ge...
In the area of industrial process mining, privacy-preserving event data publication is becoming incr...
In this document, we provide supplementary material for the paper entitled "Mine Me but Don't Single...
Event logs that originate from information systems enable comprehensive analysis of business process...
The final publication is available at Springer via http://dx.doi.org/10.1007/s12599-019-00613-3Priva...
Event logs capture the execution of business processes in terms of executed activities and their exe...
The privacy of an organization's workers represents a crucial concern in process mining settings, wh...
Event logs recorded during the execution of business processes constitute a valuable source of infor...
The applicability of process mining techniques hinges on the availability of event logs capturing th...
International audienceProcess mining aims to bridge the gap between data science and process science...
Privacy regulations for data can be regarded as amajor driver for data sovereignty measures. A speci...
Process mining has been successfully applied in the healthcare domain and has helped to uncover vari...
Validation in a big software system can be managed by analysis of its behaviour through occasionally...
The growing complexity of software with respect to technological advances encourages model-based ana...
In this document, we list the selected event logs, their characteristics, and their descriptive sta...
The size of computing systems and the number of their components steadily increase. The volume of ge...
In the area of industrial process mining, privacy-preserving event data publication is becoming incr...
In this document, we provide supplementary material for the paper entitled "Mine Me but Don't Single...