The privacy of an organization's workers represents a crucial concern in process mining settings, where data on an individual's performance is recorded and possibly shared for analysis. To enable users to appropriately deal with privacy concerns in process mining, this paper introduces ELPaaS (Event Log Privacy as a Service), a web application that offers state-of-the-art techniques for event log sanitization and privacy-preserving process mining queries. By employing our techniques, users obtain event logs and process mining results that provide privacy guarantees such as differential privacy and k-anonymity. Hence, the privacy of an organization's workers is protected.</p
Process mining has been successfully applied in the healthcare domain and helped to uncover various ...
In this document, we provide supplementary material for the paper entitled "Mine Me but Don't Single...
The growing complexity of software with respect to technological advances encourages model-based ana...
The privacy of an organization's workers represents a crucial concern in process mining settings, wh...
The final publication is available at Springer via http://dx.doi.org/10.1007/s12599-019-00613-3Priva...
Process mining has been successfully applied in the healthcare domain and has helped to uncover vari...
Event logs that originate from information systems enable comprehensive analysis of business process...
Privacy regulations for data can be regarded as amajor driver for data sovereignty measures. A speci...
The applicability of process mining techniques hinges on the availability of event logs capturing th...
With the advent of cloud computing and its model for IT services based on the Internet and big data ...
International audienceProcess mining aims to bridge the gap between data science and process science...
This paper summarizes the panel discussion at the 1st Workshop on Trust and Privacy in Process Analy...
Validation in a big software system can be managed by analysis of its behaviour through occasionally...
Event logs capture the execution of business processes in terms of executed activities and their exe...
Process mining has been successfully applied in the healthcare domain and helped to uncover various ...
In this document, we provide supplementary material for the paper entitled "Mine Me but Don't Single...
The growing complexity of software with respect to technological advances encourages model-based ana...
The privacy of an organization's workers represents a crucial concern in process mining settings, wh...
The final publication is available at Springer via http://dx.doi.org/10.1007/s12599-019-00613-3Priva...
Process mining has been successfully applied in the healthcare domain and has helped to uncover vari...
Event logs that originate from information systems enable comprehensive analysis of business process...
Privacy regulations for data can be regarded as amajor driver for data sovereignty measures. A speci...
The applicability of process mining techniques hinges on the availability of event logs capturing th...
With the advent of cloud computing and its model for IT services based on the Internet and big data ...
International audienceProcess mining aims to bridge the gap between data science and process science...
This paper summarizes the panel discussion at the 1st Workshop on Trust and Privacy in Process Analy...
Validation in a big software system can be managed by analysis of its behaviour through occasionally...
Event logs capture the execution of business processes in terms of executed activities and their exe...
Process mining has been successfully applied in the healthcare domain and helped to uncover various ...
In this document, we provide supplementary material for the paper entitled "Mine Me but Don't Single...
The growing complexity of software with respect to technological advances encourages model-based ana...