{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:37:52Z","timestamp":1767339472196,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031610561"},{"type":"electronic","value":"9783031610578"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-61057-8_30","type":"book-chapter","created":{"date-parts":[[2024,6,2]],"date-time":"2024-06-02T20:17:29Z","timestamp":1717359449000},"page":"509-527","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Trusted Execution Environment for\u00a0Decentralized Process Mining"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9714-4278","authenticated-orcid":false,"given":"Valerio","family":"Goretti","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5804-4036","authenticated-orcid":false,"given":"Davide","family":"Basile","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2975-5330","authenticated-orcid":false,"given":"Luca","family":"Barbaro","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5570-0475","authenticated-orcid":false,"given":"Claudio","family":"Di Ciccio","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,3]]},"reference":[{"key":"30_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/3-540-63139-9_48","volume-title":"ICATPN 1997","author":"WMP van der Aalst","year":"1997","unstructured":"van der Aalst, W.M.P.: Verification of workflow nets. In: Az\u00e9ma, P., Balbo, G. (eds.) ICATPN 1997. LNCS, vol. 1248, pp. 407\u2013426. Springer, Heidelberg (1997)"},{"key":"30_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-24849-8_1","volume-title":"PoEM 2011","author":"WMP van der Aalst","year":"2011","unstructured":"van der Aalst, W.M.P.: Intra-and inter-organizational process mining: discovering processes within and between organizations. In: Johannesson, P., Krogstie, J., Opdahl, A.L. (eds.) PoEM 2011. LNBIP, vol. 92, pp. 1\u201311. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24849-8_1"},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"van der Aalst, W.M.P.: Federated process mining: exploiting event data across organizational boundaries. In: SMDS 2021, pp.\u00a01\u20137 (2021)","DOI":"10.1109\/SMDS53860.2021.00011"},{"issue":"11","key":"30_CR4","doi-asserted-by":"publisher","first-page":"999","DOI":"10.1038\/nmeth.3627","volume":"12","author":"N Altman","year":"2015","unstructured":"Altman, N., Krzywinski, M.: Simple linear regression. Nat. Methods 12(11), 999\u20131000 (2015)","journal-title":"Nat. Methods"},{"issue":"1","key":"30_CR5","first-page":"19","volume":"28","author":"JP Barrett","year":"1974","unstructured":"Barrett, J.P.: The coefficient of determination-some limitations. Am. Stat. 28(1), 19\u201320 (1974)","journal-title":"Am. Stat."},{"key":"30_CR6","doi-asserted-by":"publisher","first-page":"1141909","DOI":"10.3389\/fbloc.2023.1141909","volume":"6","author":"D Basile","year":"2023","unstructured":"Basile, D., Di Ciccio, C., Goretti, V., Kirrane, S.: Blockchain based resource governance for decentralized web environments. Front. Blockchain 6, 1141909 (2023)","journal-title":"Front. Blockchain"},{"key":"30_CR7","doi-asserted-by":"crossref","unstructured":"Basile, D., Di\u00a0Ciccio, C., Goretti, V., Kirrane, S.: A blockchain-driven architecture for usage control in solid. In: ICDCSW, pp. 19\u201324 (2023)","DOI":"10.1109\/ICDCSW60045.2023.00009"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Birkholz, H., Thaler, D., Richardson, M., et al.: Remote ATtestation procedureS (RATS) Architecture (2023)","DOI":"10.17487\/RFC9334"},{"key":"30_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15260-3","volume-title":"Introduction to Reliable and Secure Distributed Programming","author":"C Cachin","year":"2011","unstructured":"Cachin, C., Guerraoui, R., Rodrigues, L.E.T.: Introduction to Reliable and Secure Distributed Programming, 2nd edn. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-15260-3","edition":"2"},{"issue":"16","key":"30_CR10","doi-asserted-by":"publisher","first-page":"7291","DOI":"10.1016\/j.eswa.2014.06.012","volume":"41","author":"J Claes","year":"2014","unstructured":"Claes, J., Poels, G.: Merging event logs for process mining: a rule based merging method and rule suggestion algorithm. Expert Syst. Appl. 41(16), 7291\u20137306 (2014)","journal-title":"Expert Syst. Appl."},{"key":"30_CR11","unstructured":"Costan, V., Devadas, S.: Intel SGX explained. Cryptology ePrint Archive (2016)"},{"key":"30_CR12","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107337756","volume-title":"Secure Multiparty Computation and Secret Sharing","author":"R Cramer","year":"2015","unstructured":"Cramer, R., Damg\u00e5rd, I., Nielsen, J.B.: Secure Multiparty Computation and Secret Sharing. Cambridge University Press, Cambridge (2015)"},{"key":"30_CR13","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/978-3-031-08848-3_6","volume-title":"Process Mining Handbook","author":"J De Weerdt","year":"2022","unstructured":"De Weerdt, J., Wynn, M.T.: Foundations of process event data. In: van der Aalst, W.M.P., Carmona, J. (eds.) Process Mining Handbook. LNBIP, vol. 448, pp. 193\u2013211. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-08848-3_6"},{"key":"30_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-56509-4","volume-title":"Fundamentals of Business Process Management","author":"M Dumas","year":"2018","unstructured":"Dumas, M., La Rosa, M., Mendling, J., Reijers, H.A.: Fundamentals of Business Process Management, 2nd edn. Springer, Heidelberg (2018). https:\/\/doi.org\/10.1007\/978-3-662-56509-4","edition":"2"},{"key":"30_CR15","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/978-3-030-49418-6_11","volume-title":"BPMDS\/EMMSAD 2020","author":"G Elkoumy","year":"2020","unstructured":"Elkoumy, G., Fahrenkrog-Petersen, S.A., Dumas, M., Laud, P., Pankova, A., Weidlich, M.: Secure multi-party computation for inter-organizational process mining. In: Nurcan, S., Reinhartz-Berger, I., Soffer, P., Zdravkovic, J. (eds.) BPMDS EMMSAD 2020. LNBIP, vol. 387, pp. 166\u2013181. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-49418-6_11"},{"key":"30_CR16","unstructured":"Elkoumy, G., Fahrenkrog-Petersen, S.A., et al.: Shareprom: a tool for privacy-preserving inter-organizational process mining. In: BPM (PhD\/Demos), pp. 72\u201376 (2020)"},{"key":"30_CR17","doi-asserted-by":"crossref","unstructured":"Fahrenkrog-Petersen, S.A., van\u00a0der Aa, H., Weidlich, M.: PRETSA: event log sanitization for privacy-aware process discovery. In: International Conference on Process Mining, ICPM 2019, Aachen, Germany, 24\u201326 June 2019, pp.\u00a01\u20138 (2019)","DOI":"10.1109\/ICPM.2019.00012"},{"key":"30_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2023.102175","volume":"145","author":"SA Fahrenkrog-Petersen","year":"2023","unstructured":"Fahrenkrog-Petersen, S.A., van der Aa, H., Weidlich, M.: Optimal event log sanitization for privacy-preserving process mining. Data Knowl. Eng. 145, 102175 (2023)","journal-title":"Data Knowl. Eng."},{"key":"30_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2023.102169","volume":"114","author":"SA Fahrenkrog-Petersen","year":"2023","unstructured":"Fahrenkrog-Petersen, S.A., Kabierski, M., van der Aa, H., Weidlich, M.: Semantics-aware mechanisms for control-flow anonymization in process mining. Inf. Syst. 114, 102169 (2023)","journal-title":"Inf. Syst."},{"key":"30_CR20","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-71115-3_1","volume-title":"New Perspectives on Enterprise Decision-Making Applying Artificial Intelligence Techniques","author":"JD Hernandez-Resendiz","year":"2021","unstructured":"Hernandez-Resendiz, J.D., Tello-Leal, E., Marin-Castro, H.M., Ramirez-Alcocer, U.M., Mata-Torres, J.A.: Merging event logs for inter-organizational process mining. In: Zapata-Cortes, J.A., Alor-Hern\u00e1ndez, G., S\u00e1nchez-Ram\u00edrez, C., Garc\u00eda-Alcaraz, J.L. (eds.) New Perspectives on Enterprise Decision-Making Applying Artificial Intelligence Techniques. SCI, vol. 966, pp. 3\u201326. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-71115-3_1"},{"key":"30_CR21","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.accinf.2018.11.002","volume":"32","author":"M Jans","year":"2019","unstructured":"Jans, M., Hosseinpour, M.: How active learning and process mining can act as continuous auditing catalyst. Int. J. Account. Inf. Syst. 32, 44\u201358 (2019)","journal-title":"Int. J. Account. Inf. Syst."},{"issue":"2","key":"30_CR22","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MSEC.2019.2947124","volume":"18","author":"P Jauernig","year":"2020","unstructured":"Jauernig, P., Sadeghi, A.R., Stapf, E.: Trusted execution environments: properties, applications, and challenges. IEEE Secur. Priv. 18(2), 56\u201360 (2020)","journal-title":"IEEE Secur. Priv."},{"key":"30_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/978-3-642-19751-2_4","volume-title":"FAST 2010","author":"A Kamil","year":"2010","unstructured":"Kamil, A., Lowe, G.: Understanding abstractions of secure channels. In: Degano, P., Etalle, S., Guttman, J. (eds.) FAST 2010. LNCS, vol. 6561, pp. 50\u201364. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-19751-2_4"},{"key":"30_CR24","unstructured":"Koch, N., Kraus, A.: The expressive power of UML-based web engineering. In: IWWOST 2002, vol.\u00a016, pp. 40\u201341 (2002)"},{"key":"30_CR25","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/s10796-008-9089-0","volume":"11","author":"C Liu","year":"2009","unstructured":"Liu, C., Li, Q., Zhao, X.: Challenges and opportunities in collaborative business process management: overview of recent advances and introduction to the special issue. Inf. Syst. Front. 11, 201\u2013209 (2009)","journal-title":"Inf. Syst. Front."},{"key":"30_CR26","doi-asserted-by":"publisher","unstructured":"Mannhardt, F.: Sepsis cases - event log (2016). https:\/\/doi.org\/10.4121\/UUID:915D2BFB-7E84-49AD-A286-DC35F063A460","DOI":"10.4121\/UUID:915D2BFB-7E84-49AD-A286-DC35F063A460"},{"key":"30_CR27","doi-asserted-by":"publisher","first-page":"65044","DOI":"10.1109\/ACCESS.2021.3075568","volume":"9","author":"M M\u00fcller","year":"2021","unstructured":"M\u00fcller, M., Ostern, N., Koljada, D., et al.: Trust mining: analyzing trust in collaborative business processes. IEEE Access 9, 65044\u201365065 (2021)","journal-title":"IEEE Access"},{"key":"30_CR28","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/978-3-030-98581-3_27","volume-title":"ICPM 2021","author":"M M\u00fcller","year":"2021","unstructured":"M\u00fcller, M., Simonet-Boulogne, A., Sengupta, S., Beige, O.: Process mining in trusted execution environments: towards hardware guarantees for trust-aware inter-organizational process analysis. In: Munoz-Gama, J., Lu, X. (eds.) ICPM 2021. LNBIP, vol. 433, pp. 369\u2013381. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-98581-3_27"},{"issue":"1","key":"30_CR29","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1145\/357980.358017","volume":"26","author":"RL Rivest","year":"1983","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems (reprint). Commun. ACM 26(1), 96\u201399 (1983)","journal-title":"Commun. ACM"},{"key":"30_CR30","doi-asserted-by":"crossref","unstructured":"Sabt, M., Achemlal, M., Bouabdallah, A.: Trusted execution environment: what it is, and what it is not. In: 2015 IEEE TrustCom\/BigDataSE\/ISPA, pp. 57\u201364 (2015)","DOI":"10.1109\/Trustcom.2015.357"},{"key":"30_CR31","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-3-031-33080-3_21","volume-title":"RCIS 2023","author":"T Sinik","year":"2023","unstructured":"Sinik, T., Beerepoot, I., Reijers, H.A.: A peek into the working day: comparing techniques for recording employee behaviour. In: Nurcan, S., Opdahl, A.L., Mouratidis, H., Tsohou, A. (eds.) RCIS 2023. LNBIP, vol. 476, pp. 343\u2013359. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-33080-3_21"},{"key":"30_CR32","doi-asserted-by":"publisher","unstructured":"Steeman, W.: BPI challenge 2013, incidents (2013). https:\/\/doi.org\/10.4121\/UUID:500573E6-ACCC-4B0C-9576-AA5468B10CEE","DOI":"10.4121\/UUID:500573E6-ACCC-4B0C-9576-AA5468B10CEE"},{"issue":"3","key":"30_CR33","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1007\/s10796-015-9553-6","volume":"18","author":"KH Tan","year":"2016","unstructured":"Tan, K.H., Wong, W.P., Chung, L.: Information and knowledge leakage in supply chain. Inf. Syst. Front. 18(3), 621\u2013638 (2016)","journal-title":"Inf. Syst. Front."},{"key":"30_CR34","volume-title":"SSL and TLS Essentials: Securing the Web","author":"SA Thomas","year":"2000","unstructured":"Thomas, S.A.: SSL and TLS Essentials: Securing the Web. Wiley, Hoboken (2000)"},{"key":"30_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/978-3-030-49435-3_16","volume-title":"CAiSE 2020","author":"SN von Voigt","year":"2020","unstructured":"von Voigt, S.N., et al.: Quantifying the re-identification risk of event logs for process mining - empiricial evaluation paper. In: Dustdar, S., Yu, E., Salinesi, C., Rieu, D., Pant, V. (eds.) CAiSE 2020. LNCS, vol. 12127, pp. 252\u2013267. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-49435-3_16"},{"key":"30_CR36","unstructured":"Weijters, A.J.M.M., van der Aalst, W.M.P., De Medeiros, A.K.A.: Process mining with the HeuristicsMiner algorithm (2006)"},{"key":"30_CR37","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.ins.2018.10.024","volume":"476","author":"C Zhao","year":"2019","unstructured":"Zhao, C., Zhao, S., Zhao, M., et al.: Secure multi-party computation: theory, practice and applications. Inf. Sci. 476, 357\u2013372 (2019)","journal-title":"Inf. Sci."}],"container-title":["Lecture Notes in Computer Science","Advanced Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-61057-8_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,2]],"date-time":"2024-06-02T20:21:11Z","timestamp":1717359671000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-61057-8_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031610561","9783031610578"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-61057-8_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"3 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CAiSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Limassol","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cyprus","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"36","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"caise2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/cyprusconferences.org\/caise2024\/#","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}