Event logs recorded during the execution of business processes constitute a valuable source of information. Applying process mining techniques to them, event logs may reveal the actual process execution and enable reasoning on quantitative or qualitative process properties. However, event logs often contain sensitive information that could be related to individual process stakeholders through background information and cross-correlation. We therefore argue that, when publishing event logs, the risk of such re-identification attacks must be considered. In this paper, we show how to quantify the re-identification risk with measures for the individual uniqueness in event logs. We also report on a large-scale study that explored the individual ...
Data extraction and preparation are the most time-consuming phases of any process mining project. Du...
Increasingly organizations are using process mining to understand the way that operational processes...
Process mining has been successfully applied in the healthcare domain and has helped to uncover vari...
Event logs recorded during the execution of business processes constitute a valuable source of infor...
The final publication is available at Springer via http://dx.doi.org/10.1007/s12599-019-00613-3Priva...
Privacy regulations for data can be regarded as amajor driver for data sovereignty measures. A speci...
The applicability of process mining techniques hinges on the availability of event logs capturing th...
Event logs that originate from information systems enable comprehensive analysis of business process...
Abstract. The research field of process mining deals with the extraction of knowledge from event log...
International audienceProcess mining aims to bridge the gap between data science and process science...
Event logs capture the execution of business processes in terms of executed activities and their exe...
In this archive, we provide supplementary material for our paper entitled "Mine Me but Don’t Single ...
Process mining is the research area that is concerned with knowledge discovery from event logs, whic...
Organisations store a lot of data from their business processes nowadays. This execution data is oft...
Process Mining techniques rely on the existence of event data. However, in many cases it is far from...
Data extraction and preparation are the most time-consuming phases of any process mining project. Du...
Increasingly organizations are using process mining to understand the way that operational processes...
Process mining has been successfully applied in the healthcare domain and has helped to uncover vari...
Event logs recorded during the execution of business processes constitute a valuable source of infor...
The final publication is available at Springer via http://dx.doi.org/10.1007/s12599-019-00613-3Priva...
Privacy regulations for data can be regarded as amajor driver for data sovereignty measures. A speci...
The applicability of process mining techniques hinges on the availability of event logs capturing th...
Event logs that originate from information systems enable comprehensive analysis of business process...
Abstract. The research field of process mining deals with the extraction of knowledge from event log...
International audienceProcess mining aims to bridge the gap between data science and process science...
Event logs capture the execution of business processes in terms of executed activities and their exe...
In this archive, we provide supplementary material for our paper entitled "Mine Me but Don’t Single ...
Process mining is the research area that is concerned with knowledge discovery from event logs, whic...
Organisations store a lot of data from their business processes nowadays. This execution data is oft...
Process Mining techniques rely on the existence of event data. However, in many cases it is far from...
Data extraction and preparation are the most time-consuming phases of any process mining project. Du...
Increasingly organizations are using process mining to understand the way that operational processes...
Process mining has been successfully applied in the healthcare domain and has helped to uncover vari...