{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:46:03Z","timestamp":1767339963107,"version":"3.44.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032028662"},{"type":"electronic","value":"9783032028679"}],"license":[{"start":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T00:00:00Z","timestamp":1756598400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T00:00:00Z","timestamp":1756598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-02867-9_15","type":"book-chapter","created":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T05:45:29Z","timestamp":1756532729000},"page":"235-254","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Secrecy Preservation for\u00a0Online Process Monitoring with\u00a0Trusted Execution Environment"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5804-4036","authenticated-orcid":false,"given":"Davide","family":"Basile","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5570-0475","authenticated-orcid":false,"given":"Claudio","family":"Di Ciccio","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,31]]},"reference":[{"issue":"1","key":"15_CR1","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1142\/S0218126698000043","volume":"8","author":"WMP van der Aalst","year":"1998","unstructured":"van der Aalst, W.M.P.: The application of petri nets to workflow management. J. Circuits Syst. Comput. 8(1), 21\u201366 (1998)","journal-title":"J. Circuits Syst. Comput."},{"key":"15_CR2","volume":"68","author":"E Batista","year":"2022","unstructured":"Batista, E., Mart\u00ednez-Ballest\u00e9, A., Solanas, A.: Privacy-preserving process mining: a microaggregation-based approach. J. Inf. Secur. Appl. 68, 103235 (2022)","journal-title":"J. Inf. Secur. Appl."},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Birkholz, H., Thaler, D., Richardson, M., et\u00a0al.: Remote attestation procedures (RATS) architecture. RFC (2023)","DOI":"10.17487\/RFC9334"},{"key":"15_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15260-3","volume-title":"Introduction to Reliable and Secure Distributed Programming","author":"C Cachin","year":"2011","unstructured":"Cachin, C., Guerraoui, R., Rodrigues, L.E.T.: Introduction to Reliable and Secure Distributed Programming, 2nd edn. Springer, Cham (2011)","edition":"2"},{"key":"15_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-56509-4","volume-title":"Fundamentals of Business Process Management","author":"M Dumas","year":"2018","unstructured":"Dumas, M., Rosa, M.L., Mendling, J., Re\u0133ers, H.: Fundamentals of Business Process Management, 2nd edn. Springer, Cham (2018)","edition":"2"},{"key":"15_CR6","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/978-3-030-49418-6_11","volume-title":"Enterprise, Business-Process and Information Systems Modeling","author":"G Elkoumy","year":"2020","unstructured":"Elkoumy, G., Fahrenkrog-Petersen, S.A., Dumas, M., Laud, P., Pankova, A., Weidlich, M.: Secure multi-party computation for inter-organizational process mining. In: Nurcan, S., Reinhartz-Berger, I., Soffer, P., Zdravkovic, J. (eds.) BPMDS\/EMMSAD -2020. LNBIP, vol. 387, pp. 166\u2013181. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-49418-6_11"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-030-58666-9_7","volume-title":"Business Process Management","author":"SA Fahrenkrog-Petersen","year":"2020","unstructured":"Fahrenkrog-Petersen, S.A., van der Aa, H., Weidlich, M.: PRIPEL: privacy-preserving event log publishing including contextual information. In: Fahland, D., Ghidini, C., Becker, J., Dumas, M. (eds.) BPM 2020. LNCS, vol. 12168, pp. 111\u2013128. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58666-9_7"},{"key":"15_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2023.102175","volume":"145","author":"SA Fahrenkrog-Petersen","year":"2023","unstructured":"Fahrenkrog-Petersen, S.A., van der Aa, H., Weidlich, M.: Optimal event log sanitization for privacy-preserving process mining. Data Knowl. Eng. 145, 102175 (2023)","journal-title":"Data Knowl. Eng."},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Goretti, V., Basile, D., Barbaro, L., et\u00a0al.: Trusted execution environment for decentralized process mining. In: CAiSE 2024, vol. 14663, pp. 509\u2013527 (2024)","DOI":"10.1007\/978-3-031-61057-8_30"},{"key":"15_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2020.101681","volume":"96","author":"Z Han","year":"2021","unstructured":"Han, Z., Hu, H.: ProDB: a memory-secure database using hardware enclave and practical oblivious RAM. Inf. Syst. 96, 101681 (2021)","journal-title":"Inf. Syst."},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Kang, K., Qi, H., Lu, J., et\u00a0al.: Dual-channel supply chain disruption model and analysis under cargo transportation insurance. IEEE Access 114953\u2013114967 (2020)","DOI":"10.1109\/ACCESS.2020.3004078"},{"key":"15_CR12","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/978-3-030-30429-4_6","volume-title":"Business Process Management: Blockchain and Central and Eastern Europe Forum","author":"C Klinkm\u00fcller","year":"2019","unstructured":"Klinkm\u00fcller, C., Ponomarev, A., Tran, A.B., Weber, I., van der Aalst, W.: Mining blockchain processes: extracting process mining data from blockchain applications. In: Di Ciccio, C., et al. (eds.) BPM 2019. LNBIP, vol. 361, pp. 71\u201386. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30429-4_6"},{"key":"15_CR13","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/s10796-008-9089-0","volume":"3","author":"C Liu","year":"2009","unstructured":"Liu, C., Li, Q., Zhao, X.: Challenges and opportunities in collaborative business process management: overview of recent advances and introduction to the special issue. Inf. Syst. Front. 3, 201\u2013209 (2009)","journal-title":"Inf. Syst. Front."},{"key":"15_CR14","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/j.is.2015.02.007","volume":"54","author":"LT Ly","year":"2015","unstructured":"Ly, L.T., Maggi, F.M., Montali, M., et al.: Compliance monitoring in business processes: functionalities, application, and tool-support. Inf. Syst. 54, 209\u2013234 (2015)","journal-title":"Inf. Syst."},{"key":"15_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-642-28872-2_11","volume-title":"Fundamental Approaches to Software Engineering","author":"FM Maggi","year":"2012","unstructured":"Maggi, F.M., Montali, M., van der Aalst, W.M.P.: An operational decision support framework for monitoring business constraints. In: de Lara, J., Zisman, A. (eds.) FASE 2012. LNCS, vol. 7212, pp. 146\u2013162. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-28872-2_11"},{"key":"15_CR16","unstructured":"Mannhardt, F., Blinde, D.: Analyzing the trajectories of patients with sepsis using process mining. In: RADAR+ EMISA 2017, vol.\u00a01859, pp. 72\u201380 (2017)"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Mincuzzi, N., Falsafi, M., Modoni, G., et\u00a0al.: Managing logistics in collaborative manufacturing: the integration services for an automotive application. In: PRO-VE 2019, pp. 355\u2013362 (2019)","DOI":"10.1007\/978-3-030-28464-0_31"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"M\u00fcller, M., Simonet-Boulogne, A., Sengupta, S., et\u00a0al.: Process mining in trusted execution environments: Towards hardware guarantees for trust-aware inter-organizational process analysis. In: ICPM Workshops, pp. 369\u2013381 (2021)","DOI":"10.1007\/978-3-030-98581-3_27"},{"key":"15_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2021.101892","volume":"104","author":"S Peters","year":"2022","unstructured":"Peters, S., Kerner, Y., Dijkman, R.M., et al.: Fast and accurate quantitative business process analysis using feature complete queueing models. Inf. Syst. 104, 101892 (2022)","journal-title":"Inf. Syst."},{"key":"15_CR20","volume-title":"Enabling Flexibility in Process-Aware Information Systems - Challenges, Methods, Technologies","author":"M Reichert","year":"2012","unstructured":"Reichert, M., Weber, B.: Enabling Flexibility in Process-Aware Information Systems - Challenges, Methods, Technologies. Springer, Cham (2012)"},{"key":"15_CR21","unstructured":"Rozanski, N., Woods, E.: Software Systems Architecture. Addison-Wesley Professional (2005)"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Sabt, M., Achemlal, M., Bouabdallah, A.: Trusted execution environment: what it is, and what it is not. In: TrustCom 2015, pp. 57\u201364. IEEE (2015)","DOI":"10.1109\/Trustcom.2015.357"},{"key":"15_CR23","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.is.2017.11.002","volume":"81","author":"P Soffer","year":"2019","unstructured":"Soffer, P., Hinze, A., Koschmider, A., et al.: From event streams to process models and back: challenges and opportunities. Inf. Syst. 81, 181\u2013200 (2019)","journal-title":"Inf. Syst."},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"V\u00f6lzer, H., Zerbato, F., Sulzer, T., et\u00a0al.: A fresh approach to analyze process outcomes. In: ICPM 2023, pp. 97\u2013104 (2023)","DOI":"10.1109\/ICPM60904.2023.10271968"},{"key":"15_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-3-319-45348-4_19","volume-title":"Business Process Management","author":"I Weber","year":"2016","unstructured":"Weber, I., Xu, X., Riveret, R., Governatori, G., Ponomarev, A., Mendling, J.: Untrusted business process monitoring and execution using blockchain. In: La Rosa, M., Loos, P., Pastor, O. (eds.) BPM 2016. LNCS, vol. 9850, pp. 329\u2013347. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45348-4_19"}],"container-title":["Lecture Notes in Computer Science","Business Process Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-02867-9_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T05:37:22Z","timestamp":1757482642000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-02867-9_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,31]]},"ISBN":["9783032028662","9783032028679"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-02867-9_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,8,31]]},"assertion":[{"value":"31 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BPM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Business Process Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seville","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bpm2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.bpm2025seville.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}