{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T05:13:40Z","timestamp":1747458820404,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030943424"},{"type":"electronic","value":"9783030943431"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-94343-1_6","type":"book-chapter","created":{"date-parts":[[2022,1,23]],"date-time":"2022-01-23T19:02:31Z","timestamp":1642964551000},"page":"73-85","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Distance Measure for\u00a0Privacy-Preserving Process Mining Based on\u00a0Feature Learning"],"prefix":"10.1007","author":[{"given":"Fabian","family":"R\u00f6sel","sequence":"first","affiliation":[]},{"given":"Stephan A.","family":"Fahrenkog-Petersen","sequence":"additional","affiliation":[]},{"given":"Han","family":"van\u00a0der Aa","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Weidlich","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,23]]},"reference":[{"key":"6_CR1","unstructured":"BPI challenge 2020: Prepaid travel costs. https:\/\/data.4tu.nl\/articles\/dataset\/BPI_Challenge_2020_Prepaid_Travel_Costs\/12696722. Accessed 12 May 2020"},{"key":"6_CR2","unstructured":"Receipt phase of an environmental permit application process (\u2018wabo\u2019), coselog project. https:\/\/data.4tu.nl\/collections\/Environmental_permit_application_process_WABO_CoSeLoG_project\/5065529. Accessed 11 May 2020"},{"key":"6_CR3","unstructured":"Sepsis cases - event log. https:\/\/data.4tu.nl\/articles\/dataset\/Sepsis_Cases_-_Event_Log\/12707639. Accessed 03 Apr 2020"},{"key":"6_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12083-020-01059-1","volume":"14","author":"E Batista","year":"2021","unstructured":"Batista, E., Solanas, A.: A uniformization-based approach to preserve individuals\u2019 privacy during process mining analyses. Peer Peer Netw. Appl. 14, 1\u201320 (2021). https:\/\/doi.org\/10.1007\/s12083-020-01059-1","journal-title":"Peer Peer Netw. Appl."},{"key":"6_CR5","unstructured":"Bauer, M., Fahrenkrog-Petersen, S.A., Koschmider, A., Mannhardt, F., van der Aa, H., Weidlich, M.: ELPaaS: event log privacy as a service. In: BPM Demos, pp. 159\u2013163 (2019)"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-319-98648-7_18","volume-title":"Business Process Management","author":"P De Koninck","year":"2018","unstructured":"De Koninck, P., vanden Broucke, S., De Weerdt, J.: act2vec, trace2vec, log2vec, and\u00a0model2vec: representation learning for business processes. In: Weske, M., Montali, M., Weber, I., vom Brocke, J. (eds.) BPM 2018. LNCS, vol. 11080, pp. 305\u2013321. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98648-7_18"},{"key":"6_CR7","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/978-3-030-49418-6_11","volume-title":"Enterprise, Business-Process and Information Systems Modeling","author":"G Elkoumy","year":"2020","unstructured":"Elkoumy, G., Fahrenkrog-Petersen, S.A., Dumas, M., Laud, P., Pankova, A., Weidlich, M.: Secure multi-party computation for inter-organizational process mining. In: Nurcan, S., Reinhartz-Berger, I., Soffer, P., Zdravkovic, J. (eds.) BPMDS\/EMMSAD -2020. LNBIP, vol. 387, pp. 166\u2013181. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-49418-6_11"},{"key":"6_CR8","unstructured":"Elkoumy, G., Fahrenkrog-Petersen, S.A., Dumas, M., Laud, P., Pankova, A., Weidlich, M.: Shareprom: a tool for privacy-preserving inter-organizational process mining. In: BPM Demos, pp. 72\u201376 (2020)"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Elkoumy, G., et al.: Privacy and confidentiality in process mining-threats and research challenges. arXiv:2106.00388 (2021)","DOI":"10.1145\/3468877"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Elkoumy, G., Pankova, A., Dumas, M.: Mine me but don\u2019t single me out: differentially private event logs for process mining. arXiv:2103.11739 (2021)","DOI":"10.1109\/ICPM53251.2021.9576852"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Fahrenkrog-Petersen, S., van der Aa, H., Weidlich, M.: PRETSA: event log sanitization for privacy-aware process discovery. In: ICPM (2019)","DOI":"10.1109\/ICPM.2019.00012"},{"key":"6_CR12","unstructured":"Fahrenkrog-Petersen, S.A.: Providing privacy guarantees in process mining. In: CAiSE (Doctoral Consortium), pp. 23\u201330 (2019)"},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-030-58666-9_7","volume-title":"Business Process Management","author":"SA Fahrenkrog-Petersen","year":"2020","unstructured":"Fahrenkrog-Petersen, S.A., van der Aa, H., Weidlich, M.: PRIPEL: privacy-preserving event log publishing including contextual information. In: Fahland, D., Ghidini, C., Becker, J., Dumas, M. (eds.) BPM 2020. LNCS, vol. 12168, pp. 111\u2013128. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58666-9_7"},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-030-79382-1_2","volume-title":"Advanced Information Systems Engineering","author":"M Kabierski","year":"2021","unstructured":"Kabierski, M., Fahrenkrog-Petersen, S.A., Weidlich, M.: Privacy-aware process performance indicators: framework and release mechanisms. In: La Rosa, M., Sadiq, S., Teniente, E. (eds.) CAiSE 2021. LNCS, vol. 12751, pp. 19\u201336. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-79382-1_2"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Knols, B., van der Werf, J.M.E.M.: Measuring the behavioral quality of log sampling. In: ICPM. pp. 97\u2013104 (2019)","DOI":"10.1109\/ICPM.2019.00024"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: ICDE. IEEE (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"issue":"4","key":"6_CR17","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1109\/TSC.2016.2617331","volume":"12","author":"C Liu","year":"2016","unstructured":"Liu, C., Duan, H., Zeng, Q., Zhou, M., Lu, F., Cheng, J.: Towards comprehensive support for privacy preservation cross-organization business process mining. IEEE Trans. Serv. Comput. 12(4), 639\u2013653 (2016)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"5","key":"6_CR18","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1007\/s12599-019-00613-3","volume":"61","author":"F Mannhardt","year":"2019","unstructured":"Mannhardt, F., Koschmider, A., Baracaldo, N., Weidlich, M., Michael, J.: Privacy-preserving process mining. BISE 61(5), 595\u2013614 (2019). https:\/\/doi.org\/10.1007\/s12599-019-00613-3","journal-title":"BISE"},{"key":"6_CR19","unstructured":"Mikolov, T., Yih, W.t., Zweig, G.: Linguistic regularities in continuous space word representations. In: NAACL, pp. 746\u2013751 (2013)"},{"issue":"5","key":"6_CR20","doi-asserted-by":"publisher","first-page":"1612","DOI":"10.3390\/ijerph17051612","volume":"17","author":"A Pika","year":"2020","unstructured":"Pika, A., Wynn, M.T., Budiono, S., Ter Hofstede, A.H., van der Aalst, W., Reijers, H.A.: Privacy-preserving process mining in healthcare. Int. J. Environ. Res. Public Health 17(5), 1612 (2020)","journal-title":"Int. J. Environ. Res. Public Health"},{"key":"6_CR21","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"676","DOI":"10.1007\/978-3-030-37453-2_54","volume-title":"Business Process Management Workshops","author":"M Rafiei","year":"2019","unstructured":"Rafiei, M., van der Aalst, W.M.P.: Mining roles from event logs while preserving privacy. In: Di Francescomarino, C., Dijkman, R., Zdun, U. (eds.) BPM 2019. LNBIP, vol. 362, pp. 676\u2013689. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-37453-2_54"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Rafiei, M., van der Aalst, W.: Practical aspect of privacy-preserving data publishing in process mining. In: BPM Demos, pp. 92\u201396 (2020)","DOI":"10.1007\/978-3-030-58638-6_8"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Rafiei, M., van der Aalst, W.: Group-based privacy preservation techniques for process mining. arXiv preprint arXiv:2105.11983 (2021)","DOI":"10.1016\/j.datak.2021.101908"},{"key":"6_CR24","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/978-3-030-50316-1_24","volume-title":"Research Challenges in Information Science","author":"M Rafiei","year":"2020","unstructured":"Rafiei, M., Wagner, M., van der Aalst, W.M.P.: TLKC-privacy model for process mining. In: Dalpiaz, F., Zdravkovic, J., Loucopoulos, P. (eds.) RCIS 2020. LNBIP, vol. 385, pp. 398\u2013416. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-50316-1_24"},{"key":"6_CR25","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.is.2007.07.001","volume":"33","author":"A Rozinat","year":"2008","unstructured":"Rozinat, A., Aalst, W.: Conformance checking of processes based on monitoring real behavior. Inf. Syst. 33, 64\u201395 (2008)","journal-title":"Inf. Syst."},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Stefanini, A., Aloini, D., Benevento, E., Dulmin, R., Mininno, V.: Performance analysis in emergency departments: a data-driven approach. Measuring Bus. Excell. (2018)","DOI":"10.1108\/MBE-07-2017-0040"},{"issue":"05","key":"6_CR27","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzz. Knowl.-Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzz. Knowl.-Based Syst."},{"issue":"2","key":"6_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2229156.2229157","volume":"3","author":"W Van Der Aalst","year":"2012","unstructured":"Van Der Aalst, W.: Process mining: overview and opportunities. ACM Trans. Manag. Inf. Syst. (TMIS) 3(2), 1\u201317 (2012)","journal-title":"ACM Trans. Manag. Inf. Syst. (TMIS)"},{"key":"6_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/978-3-030-49435-3_16","volume-title":"Advanced Information Systems Engineering","author":"S Nu\u00f1ez von Voigt","year":"2020","unstructured":"Nu\u00f1ez von Voigt, S., et al.: Quantifying the re-identification risk of event logs for process mining. In: Dustdar, S., Yu, E., Salinesi, C., Rieu, D., Pant, V. (eds.) CAiSE 2020. LNCS, vol. 12127, pp. 252\u2013267. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-49435-3_16"}],"container-title":["Lecture Notes in Business Information Processing","Business Process Management Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-94343-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T07:04:46Z","timestamp":1674543886000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-94343-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030943424","9783030943431"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-94343-1_6","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"23 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BPM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Business Process Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bpm2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/bpm2021.diag.uniroma1.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"92","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"For the BPM forum 16 papers were accepted; and for the BPM and RPA Forum 8 papers were acceptedfrom 14 submissions. The BPM 2021 workshops accepted 31 full papers out of 60 submissions.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}