{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T02:54:43Z","timestamp":1776394483954,"version":"3.51.2"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030466329","type":"print"},{"value":"9783030466336","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-46633-6_6","type":"book-chapter","created":{"date-parts":[[2020,4,24]],"date-time":"2020-04-24T14:03:39Z","timestamp":1587737019000},"page":"101-123","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Supporting Confidentiality in Process Mining Using Abstraction and Encryption"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7161-6927","authenticated-orcid":false,"given":"Majid","family":"Rafiei","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8892-8361","authenticated-orcid":false,"given":"Leopold","family":"von Waldthausen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0955-6940","authenticated-orcid":false,"given":"Wil M. P.","family":"van\u00a0der Aalst","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,25]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"van\u00a0der Aalst, W.M.P.: Business process management: a comprehensive survey. ISRN Softw. Eng. 2013, 1\u201337 (2013)","DOI":"10.1155\/2013\/507984"},{"key":"6_CR2","doi-asserted-by":"publisher","unstructured":"van\u00a0der Aalst, W.M.P.: Process Mining - Data Science in Action, Second edn. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49851-4","DOI":"10.1007\/978-3-662-49851-4"},{"key":"6_CR3","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-62386-3_1","volume-title":"Enterprise Information Systems","author":"WMP van der Aalst","year":"2017","unstructured":"van der Aalst, W.M.P.: Responsible data science: using event data in a \u201cpeople friendly\u201d manner. In: Hammoudi, S., Maciaszek, L.A., Missikoff, M.M., Camp, O., Cordeiro, J. (eds.) ICEIS 2016. LNBIP, vol. 291, pp. 3\u201328. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-62386-3_1"},{"key":"6_CR4","unstructured":"van der Aalst, W.M.P.: Benchmarking logs to test scalability of process discovery algorithms. Eindhoven University of Technology (2017). https:\/\/data.4tu.nl\/repository\/uuid:1cc41f8a-3557-499a-8b34-880c1251bd6e. Accessed 01 Apr 2018"},{"issue":"3","key":"6_CR5","first-page":"e1244","volume":"8","author":"WMP van der Aalst","year":"2018","unstructured":"van der Aalst, W.M.P.: Process discovery from event data: relating models and logs through abstractions. Wiley Interdiscip. Rev.: Data Mining Knowl. Discov. 8(3), e1244 (2018)","journal-title":"Wiley Interdiscip. Rev.: Data Mining Knowl. Discov."},{"key":"6_CR6","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-642-28108-2_19","volume-title":"Business Process Management Workshops","author":"W van der Aalst","year":"2012","unstructured":"van der Aalst, W., et al.: Process mining manifesto. In: Daniel, F., Barkaoui, K., Dustdar, S. (eds.) BPM 2011. LNBIP, vol. 99, pp. 169\u2013194. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-28108-2_19"},{"issue":"2","key":"6_CR7","first-page":"182","volume":"2","author":"WMP van der Aalst","year":"2012","unstructured":"van der Aalst, W.M.P., Adriansyah, A., van Dongen, B.: Replaying history on process models for conformance checking and performance analysis. Wiley Interdiscip. Rev.: Data Mining Knowl. Discov. 2(2), 182\u2013192 (2012)","journal-title":"Wiley Interdiscip. Rev.: Data Mining Knowl. Discov."},{"issue":"5","key":"6_CR8","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/s12599-017-0487-z","volume":"59","author":"WMP van der Aalst","year":"2017","unstructured":"van der Aalst, W.M.P., Bichler, M., Heinzl, A.: Responsible data science. Bus. Inf. Syst. Eng. 59(5), 311\u2013313 (2017)","journal-title":"Bus. Inf. Syst. Eng."},{"issue":"6","key":"6_CR9","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s10606-005-9005-9","volume":"14","author":"WMP van der Aalst","year":"2005","unstructured":"van der Aalst, W.M.P., Reijers, H.A., Song, M.: Discovering social networks from event logs. Comput. Support. Coop. Work (CSCW) 14(6), 549\u2013593 (2005)","journal-title":"Comput. Support. Coop. Work (CSCW)"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Accorsi, R., Stocker, T., M\u00fcller, G.: On the exploitation of process mining for security audits: the process discovery case. In: Proceedings of the 28th Annual ACM Symposium on Applied Computing, pp. 1462\u20131468. ACM (2013)","DOI":"10.1145\/2480362.2480634"},{"key":"6_CR11","first-page":"207","volume":"207","author":"M Bellare","year":"2005","unstructured":"Bellare, M., Rogaway, P.: Introduction to modern cryptography. UCSD CSE 207, 207 (2005)","journal-title":"UCSD CSE"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Burattin, A., Conti, M., Turato, D.: Toward an anonymous process mining. In: 2015 3rd International Conference on Future Internet of Things and Cloud (FiCloud), pp. 58\u201363. IEEE (2015)","DOI":"10.1109\/FiCloud.2015.9"},{"key":"6_CR13","unstructured":"Daemen, J., Rijmen, V.: The design of Rijndael: AES-the advanced encryption standard. Springer, Heidelberg (2013)"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Fahrenkrog-Petersen, S.A., van der Aa, H., Weidlich, M.: PRETSA: event log sanitization for privacy-aware process discovery. In: International Conference on Process Mining, ICPM 2019, Aachen, Germany, 24\u201326 June 2019, pp. 1\u20138 (2019)","DOI":"10.1109\/ICPM.2019.00012"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Kapoor, V., Poncelet, P., Trousset, F., Teisseire, M.: Privacy preserving sequential pattern mining in distributed databases. In: Proceedings of the 15th ACM International Conference on Information and Knowledge Management, pp. 758\u2013767. ACM (2006)","DOI":"10.1145\/1183614.1183722"},{"key":"6_CR16","unstructured":"Katz, J., Menezes, A.J., Van\u00a0Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Kleinberg, J.M.: Challenges in mining social network data: processes, privacy, and paradoxes. In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 4\u20135. ACM (2007)","DOI":"10.1145\/1281192.1281195"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Leemans, M., van der Aalst, W.M.P., van den Brand, M.G.: Hierarchical performance analysis for process mining. In: Proceedings of the 2018 International Conference on Software and System Process, pp. 96\u2013105. ACM (2018)","DOI":"10.1145\/3202710.3203151"},{"issue":"2","key":"6_CR19","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1007\/s10270-016-0545-x","volume":"17","author":"SJJ Leemans","year":"2016","unstructured":"Leemans, S.J.J., Fahland, D., van der Aalst, W.M.P.: Scalable process discovery and conformance checking. Softw. Syst. Model. 17(2), 599\u2013631 (2016). https:\/\/doi.org\/10.1007\/s10270-016-0545-x","journal-title":"Softw. Syst. Model."},{"key":"6_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TSUSC.2016.2610598","volume":"1","author":"C Liu","year":"2016","unstructured":"Liu, C., Duan, H., Qingtian, Z., Zhou, M., Lu, F., Cheng, J.: Towards comprehensive support for privacy preservation cross-organization business process mining. IEEE Trans. Serv. Comput. 1, 1\u20131 (2016)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"3","key":"6_CR21","doi-asserted-by":"publisher","first-page":"720","DOI":"10.1109\/TNET.2012.2208983","volume":"21","author":"CY Ma","year":"2013","unstructured":"Ma, C.Y., Yau, D.K., Yip, N.K., Rao, N.S.: Privacy vulnerability of published anonymous mobility traces. IEEE\/ACM Trans. Netw. (TON) 21(3), 720\u2013733 (2013)","journal-title":"IEEE\/ACM Trans. Netw. (TON)"},{"key":"6_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.is.2018.01.009","volume":"76","author":"F Mannhardt","year":"2018","unstructured":"Mannhardt, F., de Leoni, M., Reijers, H.A., van der Aalst, W.M.P., Toussaint, P.J.: Guided process discovery-a pattern-based approach. Inf. Syst. 76, 1\u201318 (2018)","journal-title":"Inf. Syst."},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Mannhardt, F., Petersen, S.A., Oliveira, M.F.: Privacy challenges for process mining in human-centered industrial environments. In: 2018 14th International Conference on Intelligent Environments (IE), pp. 64\u201371. IEEE (2018)","DOI":"10.1109\/IE.2018.00017"},{"key":"6_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 99","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48910-X_16"},{"key":"6_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/978-3-030-33246-4_27","volume-title":"On the Move to Meaningful Internet Systems: OTM 2019 Conferences","author":"M Pourbafrani","year":"2019","unstructured":"Pourbafrani, M., van Zelst, S.J., van der Aalst, W.M.P.: Scenario-based prediction of business processes using system dynamics. In: Panetto, H., Debruyne, C., Hepp, M., Lewis, D., Ardagna, C.A., Meersman, R. (eds.) OTM 2019. LNCS, vol. 11877, pp. 422\u2013439. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-33246-4_27"},{"key":"6_CR26","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"676","DOI":"10.1007\/978-3-030-37453-2_54","volume-title":"Business Process Management Workshops","author":"M Rafiei","year":"2019","unstructured":"Rafiei, M., van der Aalst, W.M.P.: Mining roles from event logs while preserving privacy. In: Di Francescomarino, C., Dijkman, R., Zdun, U. (eds.) BPM 2019. LNBIP, vol. 362, pp. 676\u2013689. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-37453-2_54"},{"key":"6_CR27","unstructured":"Rafiei, M., von Waldthausen, L., van der Aalst, W.M.P.: Ensuring confidentiality in process mining. In: Proceedings of the 8th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2018), Seville, Spain, 13\u201314 December 2018, pp. 3\u201317 (2018). http:\/\/ceur-ws.org\/Vol-2270\/paper1.pdf"},{"key":"6_CR28","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-319-93931-5_9","volume-title":"Business Information Systems","author":"M Fani Sani","year":"2018","unstructured":"Fani Sani, M., van Zelst, S.J., van der Aalst, W.M.P.: Repairing outlier behaviour in event logs. In: Abramowicz, W., Paschke, A. (eds.) BIS 2018. LNBIP, vol. 320, pp. 115\u2013131. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-93931-5_9"},{"key":"6_CR29","unstructured":"Tillem, G., Erkin, Z., Lagendijk, R.L.: Privacy-preserving alpha algorithm for software analysis. In: 37th WIC Symposium on Information Theory in the Benelux\/6th WIC\/IEEE SP Symposium on Information Theory and Signal Processing in the Benelux (2016)"},{"key":"6_CR30","doi-asserted-by":"crossref","unstructured":"Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications, vol.\u00a08. Cambridge University Press, Cambridge (1994)","DOI":"10.1017\/CBO9780511815478"},{"key":"6_CR31","unstructured":"Zhan, J.Z., Chang, L., Matwin, S.: Privacy-preserving collaborative sequential pattern mining. Technical report, Ottawa Univ (Ontario) School of Information Technology (2004)"}],"container-title":["Lecture Notes in Business Information Processing","Data-Driven Process Discovery and Analysis"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-46633-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,24]],"date-time":"2024-04-24T00:02:33Z","timestamp":1713916953000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-46633-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030466329","9783030466336"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-46633-6_6","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"25 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SIMPDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Data-Driven Process Discovery and Analysis","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seville","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"simpda2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/simpda2018.di.unimi.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}