The applicability of process mining techniques hinges on the availability of event logs capturing the execution of a business process. In some use cases, particularly those involving customer-facing processes, these event logs may contain private information. Data protection regulations restrict the use of such event logs for analysis purposes. One way of circumventing these restrictions is to anonymize the event log to the extent that no individual can be singled out using the anonymized log. This article addresses the problem of anonymizing an event log in order to guarantee that, upon release of the anonymized log, the probability that an attacker may single out any individual represented in the original log does not increase by more tha...
Process mining has been successfully applied in the healthcare domain and has helped to uncover vari...
In this document, we list the selected event logs, their characteristics, and their descriptive sta...
The growing complexity of software with respect to technological advances encourages model-based ana...
The final publication is available at Springer via http://dx.doi.org/10.1007/s12599-019-00613-3Priva...
The anonymized event logs of the experiments in the paper "Differentially Private Release of Event L...
In this archive, we provide supplementary material for our paper entitled "Mine Me but Don’t Single ...
In this document, we provide supplementary material for the paper entitled "Mine Me but Don't Single...
Event logs recorded during the execution of business processes constitute a valuable source of infor...
Privacy regulations for data can be regarded as amajor driver for data sovereignty measures. A speci...
Event logs that originate from information systems enable comprehensive analysis of business process...
In the area of industrial process mining, privacy-preserving event data publication is becoming incr...
The privacy of an organization's workers represents a crucial concern in process mining settings, wh...
International audienceProcess mining aims to bridge the gap between data science and process science...
Event logs capture the execution of business processes in terms of executed activities and their exe...
Process mining has been successfully applied in the healthcare domain and has helped to uncover vari...
In this document, we list the selected event logs, their characteristics, and their descriptive sta...
The growing complexity of software with respect to technological advances encourages model-based ana...
The final publication is available at Springer via http://dx.doi.org/10.1007/s12599-019-00613-3Priva...
The anonymized event logs of the experiments in the paper "Differentially Private Release of Event L...
In this archive, we provide supplementary material for our paper entitled "Mine Me but Don’t Single ...
In this document, we provide supplementary material for the paper entitled "Mine Me but Don't Single...
Event logs recorded during the execution of business processes constitute a valuable source of infor...
Privacy regulations for data can be regarded as amajor driver for data sovereignty measures. A speci...
Event logs that originate from information systems enable comprehensive analysis of business process...
In the area of industrial process mining, privacy-preserving event data publication is becoming incr...
The privacy of an organization's workers represents a crucial concern in process mining settings, wh...
International audienceProcess mining aims to bridge the gap between data science and process science...
Event logs capture the execution of business processes in terms of executed activities and their exe...
Process mining has been successfully applied in the healthcare domain and has helped to uncover vari...
In this document, we list the selected event logs, their characteristics, and their descriptive sta...
The growing complexity of software with respect to technological advances encourages model-based ana...