{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T03:17:09Z","timestamp":1775618229824,"version":"3.50.1"},"reference-count":60,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T00:00:00Z","timestamp":1700438400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["BPMJ"],"published-print":{"date-parts":[[2024,2,5]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to design a consortium-blockchain based framework for cross-organizational business process mining complying with privacy requirements.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>Business process modeling in a cross-organizational setting is complicated due to privacy concerns. The process mining in this situation occurs through trusted third parties (TTPs). It uses a special class of Petri-nets called workflow nets (WF-nets) to represent the formal specifications of event logs in a blockchain-enabled cross-organization.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>Using a smart contract algorithm, the proposed framework discovers the organization-specific business process models (BPM) without a TTP. The discovered BPMs are formally represented using WF-nets with a message factor to support the authors\u2019 claim. Finally, the applicability and suitability of the proposed framework is demonstrated using a case study of multimodal transportation.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>The proposed framework complies with privacy requirements. It shows how to represent the formal specifications of event logs in a blockchain using a special class of Petri-nets called WF-nets. It also presents a smart contract algorithm to discover organization-specific business process models (BPM) without a TTP.<\/jats:p><\/jats:sec>","DOI":"10.1108\/bpmj-11-2022-0558","type":"journal-article","created":{"date-parts":[[2023,11,18]],"date-time":"2023-11-18T08:58:30Z","timestamp":1700297910000},"page":"239-269","source":"Crossref","is-referenced-by-count":7,"title":["<i>ProcessChain<\/i>: a blockchain-based framework for privacy preserving cross-organizational business process mining from distributed event logs"],"prefix":"10.1108","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3262-7644","authenticated-orcid":false,"given":"Sandeep Kumar","family":"Singh","sequence":"first","affiliation":[]},{"given":"Mamata","family":"Jenamani","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2023,11,20]]},"reference":[{"issue":"3","key":"key2024020210105936900_ref001","first-page":"335","article-title":"Interorganizational work-flows: an approach based on message sequence charts and petri nets","volume":"34","year":"1999","journal-title":"Systems Analysis - Modelling - Simulation"},{"issue":"3","key":"key2024020210105936900_ref002","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/s12599-011-0155-7","article-title":"Automated certification for compliant cloud-based business processes","volume":"3","year":"2011","journal-title":"Business and Information Systems Engineering"},{"key":"key2024020210105936900_ref003","first-page":"153","article-title":"A cross-organizational process mining framework for obtaining insights from software products: accurate comparison challenges","year":"2016"},{"key":"key2024020210105936900_ref004","first-page":"109","article-title":"Business process integration: how to achieve interoperability through process patterns","year":"2017"},{"issue":"3","key":"key2024020210105936900_ref061","doi-asserted-by":"crossref","first-page":"1500","DOI":"10.1007\/s12083-020-01059-1","article-title":"A uniformization-based approach to preserve individuals\u2019 privacy during process mining analyses","volume":"14","year":"2021","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"2","key":"key2024020210105936900_ref005","first-page":"631","article-title":"A review of fleet planning problems in single and multimodal transportation systems","volume":"15","year":"2019","journal-title":"Transportmetrica A: Transport Science"},{"issue":"2","key":"key2024020210105936900_ref006","doi-asserted-by":"publisher","DOI":"10.1142\/S0219649218500144","article-title":"Cross-organisational process mining in cloud environments","volume":"17","year":"2018","journal-title":"Journal of Information and Knowledge Management"},{"issue":"2","key":"key2024020210105936900_ref007","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/j.datak.2005.03.008","article-title":"The view-based approach to dynamic inter-organizational workflow cooperation","volume":"56","year":"2006","journal-title":"Data and Knowledge Engineering"},{"issue":"16","key":"key2024020210105936900_ref008","doi-asserted-by":"crossref","first-page":"7291","DOI":"10.1016\/j.eswa.2014.06.012","article-title":"Merging event logs for process mining: a rule based merging method and rule suggestion algorithm","volume":"41","year":"2014","journal-title":"Expert Systems with Applications"},{"key":"key2024020210105936900_ref009","article-title":"Synthetic event log in XES formate","author":"Dataset","year":"2020"},{"key":"key2024020210105936900_ref010","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-56509-4","volume-title":"Fundamentals of Business Process Management","year":"2018","edition":"2nd ed."},{"key":"key2024020210105936900_ref011","first-page":"13","article-title":"A Case Study for Blockchain in Healthcare: \u2018MedRec\u2019 prototype for electronic health records and medical research data","year":"2016"},{"key":"key2024020210105936900_ref012","first-page":"72","article-title":"Shareprom: a tool for privacy-preserving inter-organizational process mining","year":"2020"},{"key":"key2024020210105936900_ref013","first-page":"166","article-title":"Secure multi-party computation for inter-organizational process mining","volume":"387","year":"2020"},{"key":"key2024020210105936900_ref015","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1016\/j.eswa.2019.05.003","article-title":"Process mining techniques and applications \u2013 a systematic mapping study","volume":"133","year":"2019","journal-title":"Expert Systems with Applications"},{"issue":"1","key":"key2024020210105936900_ref016","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1007\/s00766-018-00308-3","article-title":"From event logs to goals: a systematic literature review of goal-oriented process mining","volume":"25","year":"2020","journal-title":"Requirements Engineering"},{"key":"key2024020210105936900_ref017","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1007\/s12599-020-00649-w","article-title":"Process mining for six sigma: a guideline and tool support","volume":"63","year":"2021","journal-title":"Business and Information Systems Engineering"},{"issue":"4","key":"key2024020210105936900_ref018","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1109\/TKDE.2005.63","article-title":"Mining and reasoning on workflows","volume":"17","year":"2005","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"2","key":"key2024020210105936900_ref019","first-page":"369","article-title":"Adoption, use and management of process mining in practice","volume":"27","year":"2021","journal-title":"Business Process Management Journal"},{"key":"key2024020210105936900_ref020","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2019.103181","article-title":"Efficient conditional compliance checking of business process models","volume":"115","year":"2020","journal-title":"Computers in Industry"},{"issue":"6","key":"key2024020210105936900_ref021","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1007\/s12599-011-0181-5","article-title":"Business process management in the large","volume":"3","year":"2011","journal-title":"Business and Information Systems Engineering"},{"issue":"5","key":"key2024020210105936900_ref022","doi-asserted-by":"crossref","first-page":"995","DOI":"10.1108\/BPMJ-02-2018-0051","article-title":"Discovering high-level BPMN process models from event data","volume":"25","year":"2019","journal-title":"Business Process Management Journal"},{"issue":"2","key":"key2024020210105936900_ref023","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/s12599-020-00637-0","article-title":"An exploration into future business process management capabilities in view of digitalization: results from a delphi study","volume":"63","year":"2021","journal-title":"Business and Information Systems Engineering"},{"key":"key2024020210105936900_ref062","first-page":"1802","article-title":"Blockchain-based cross-organizational execution framework for dynamic integration of process collaborations","year":"2020","journal-title":"Wirtschaftsinformatik (Zentrale Tracks)"},{"key":"key2024020210105936900_ref024","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/978-3-030-30429-4_6","article-title":"Mining blockchain processes: extracting process mining data from blockchain applications","volume":"361","year":"2019","journal-title":"Lecture Notes in Business Information Processing"},{"issue":"1","key":"key2024020210105936900_ref025","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/TSMC.2014.2330555","article-title":"E-Net modeling and analysis of emergency response processes constrained by resources and uncertain durations","volume":"45","year":"2015","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"issue":"4","key":"key2024020210105936900_ref026","first-page":"639","article-title":"Towards comprehensive support for privacy preservation cross-organization business process mining","volume":"12","year":"2016","journal-title":"IEEE Transactions on Services Computing"},{"issue":"3","key":"key2024020210105936900_ref027","first-page":"1037","article-title":"Privacy-preserving behavioral correctness verification of cross-organizational workflow with task synchronization patterns","volume":"18","year":"2020","journal-title":"IEEE Transactions on Automation Science and Engineering"},{"issue":"5","key":"key2024020210105936900_ref028","doi-asserted-by":"crossref","first-page":"665","DOI":"10.1016\/j.indmarman.2013.05.007","article-title":"A service science perspective on business model innovation","volume":"42","year":"2013","journal-title":"Industrial Marketing Management"},{"key":"key2024020210105936900_ref029","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101653","article-title":"PrivySharing: a blockchain-based framework for privacy-preserving and secure data sharing in smart cities","volume":"88","year":"2020","journal-title":"Computers and Security"},{"issue":"5","key":"key2024020210105936900_ref030","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1007\/s12599-019-00613-3","article-title":"Privacy-preserving process mining: differential privacy for event logs","volume":"61","year":"2019","journal-title":"Business and Information Systems Engineering"},{"issue":"1","key":"key2024020210105936900_ref031","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3183367","article-title":"Blockchains for business process management - challenges and opportunities","volume":"9","year":"2018","journal-title":"ACM Transactions on Management Information Systems"},{"issue":"4","key":"key2024020210105936900_ref032","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/5.24143","article-title":"Petri nets: properties, analysis and applications","volume":"77","year":"1989","journal-title":"Proceedings of the IEEE"},{"issue":"6","key":"key2024020210105936900_ref033","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1007\/s12599-017-0499-8","article-title":"Trading real-world assets on blockchain: an application of trust-free transaction systems in the market for lemons","volume":"59","year":"2017","journal-title":"Business and Information Systems Engineering"},{"issue":"5","key":"key2024020210105936900_ref034","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph17051612","article-title":"Privacy-preserving process mining in healthcare","volume":"17","year":"2020","journal-title":"International Journal of Environmental Research and Public Health"},{"key":"key2024020210105936900_ref035","first-page":"1","article-title":"Towards quantifying privacy in process mining","year":"2020"},{"key":"key2024020210105936900_ref036","first-page":"101","article-title":"Supporting confidentiality in process mining using abstraction and encryption","year":"2020"},{"key":"key2024020210105936900_ref037","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/j.is.2017.08.010","article-title":"Merging event logs: combining granularity levels for process flow analysis","volume":"71","year":"2017","journal-title":"Information Systems"},{"key":"key2024020210105936900_ref014","volume-title":"Lectures on petri nets i: basic models: advances in petri nets","year":"1998"},{"issue":"7","key":"key2024020210105936900_ref038","doi-asserted-by":"crossref","first-page":"2124","DOI":"10.1080\/00207543.2019.1657247","article-title":"Distributed ledger technology in supply chains: a\u00a0transaction cost perspective","volume":"58","year":"2020","journal-title":"International Journal of Production Research"},{"issue":"4","key":"key2024020210105936900_ref039","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1016\/S0263-2373(00)00029-3","article-title":"Multimodal transportation, logistics, and the environment: managing interactions in a global economy","volume":"18","year":"2000","journal-title":"European Management Journal"},{"issue":"4","key":"key2024020210105936900_ref040","doi-asserted-by":"crossref","first-page":"900","DOI":"10.1108\/BPMJ-06-2017-0148","article-title":"How is process mining technology used by organizations? A systematic literature review of empirical studies","volume":"24","year":"2018","journal-title":"Business Process Management Journal"},{"key":"key2024020210105936900_ref041","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/978-3-030-20482-2_11","article-title":"Using blockchain technology for cross-organizational process mining \u2013 concept and case study","volume":"354","year":"2019","journal-title":"Lecture Notes in Business Information Processing"},{"issue":"1","key":"key2024020210105936900_ref042","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1142\/S0218126698000043","article-title":"The application of Petri nets to workflow management","volume":"8","year":"1998","journal-title":"Journal of Circuits, Systems and Computers"},{"issue":"2","key":"key2024020210105936900_ref043","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/S0378-7206(99)00038-5","article-title":"Loosely coupled interorganizational workflows: modeling and analyzing workflows crossing organizational boundaries","volume":"37","year":"2000","journal-title":"Information and Management"},{"key":"key2024020210105936900_ref044","first-page":"1","article-title":"Intra- and inter-organizational process mining: discovering processes within and between organizations","volume":"92","year":"2011"},{"key":"key2024020210105936900_ref045","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2013\/507984","article-title":"Business process management: a comprehensive survey","volume":"2013","year":"2013","journal-title":"ISRN Software Engineering"},{"key":"key2024020210105936900_ref046","first-page":"3","volume-title":"Data Science in Action","year":"2016"},{"issue":"1-2","key":"key2024020210105936900_ref047","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/S0304-3975(00)00321-2","article-title":"Inheritance of workflows: an approach to tackling problems related to change","volume":"270","year":"2002","journal-title":"Theoretical Computer Science"},{"issue":"3","key":"key2024020210105936900_ref048","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1016\/j.compind.2003.10.001","article-title":"Process mining: a research agenda","volume":"53","year":"2004","journal-title":"Computers in Industry"},{"key":"key2024020210105936900_ref049","first-page":"169","article-title":"Process mining manifesto","volume":"29","year":"2012","journal-title":"Business Process Management Workshops: BPM 2011 International Workshops"},{"issue":"1","key":"key2024020210105936900_ref050","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1093\/comjnl\/bxn064","article-title":"Multiparty contracts: agreeing and implementing interorganizational processes","volume":"53","year":"2010","journal-title":"Computer Journal"},{"issue":"5","key":"key2024020210105936900_ref051","doi-asserted-by":"crossref","first-page":"713","DOI":"10.1016\/j.is.2006.05.003","article-title":"Business process mining: an industrial application","volume":"32","year":"2007","journal-title":"Information Systems"},{"issue":"9","key":"key2024020210105936900_ref052","doi-asserted-by":"crossref","first-page":"1128","DOI":"10.1109\/TKDE.2004.47","article-title":"Workflow mining: discovering process models from event logs","volume":"16","year":"2004","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"5","key":"key2024020210105936900_ref053","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1007\/s00607-017-0582-5","article-title":"Discovering workflow nets using integer linear programming","volume":"100","year":"2018","journal-title":"Computing"},{"key":"key2024020210105936900_ref054","first-page":"329","article-title":"Untrusted business process monitoring and execution using blockchain","volume":"9850","year":"2016"},{"issue":"1","key":"key2024020210105936900_ref055","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1109\/TKDE.2013.109","article-title":"Data mining with big data","volume":"26","year":"2014","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"key2024020210105936900_ref056","first-page":"145","article-title":"Towards an integrated multimodal transportation dashboard","year":"2014"},{"issue":"3","key":"key2024020210105936900_ref057","doi-asserted-by":"crossref","first-page":"1280","DOI":"10.1016\/j.dss.2012.12.001","article-title":"Cross-organizational collaborative workflow mining from a multi-source log","volume":"54","year":"2013","journal-title":"Decision Support Systems"},{"key":"key2024020210105936900_ref058","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1007\/978-3-642-54924-3_66","article-title":"Process mining from the organizational perspective","volume":"277","year":"2014","journal-title":"Advances in Intelligent Systems and Computing"}],"container-title":["Business Process Management Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/BPMJ-11-2022-0558\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/BPMJ-11-2022-0558\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:16:34Z","timestamp":1753398994000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/bpmj\/article\/30\/1\/239-269\/1221452"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,20]]},"references-count":60,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,11,20]]},"published-print":{"date-parts":[[2024,2,5]]}},"alternative-id":["10.1108\/BPMJ-11-2022-0558"],"URL":"https:\/\/doi.org\/10.1108\/bpmj-11-2022-0558","relation":{},"ISSN":["1463-7154"],"issn-type":[{"value":"1463-7154","type":"print"}],"subject":[],"published":{"date-parts":[[2023,11,20]]}}}