Vis enkel innførsel

dc.contributor.authorNuñez von Voigt, Saskia
dc.contributor.authorFahrenkrog-Petersen, Stephan
dc.contributor.authorJanssen, Dominik
dc.contributor.authorKoschmider, Agnes
dc.contributor.authorTschorsch, Florian
dc.contributor.authorMannhardt, Felix
dc.contributor.authorLandsiedel, Olaf
dc.contributor.authorWeidlich, Matthias
dc.date.accessioned2020-09-08T14:35:08Z
dc.date.available2020-09-08T14:35:08Z
dc.date.created2020-06-09T15:57:36Z
dc.date.issued2020
dc.identifier.issn0302-9743
dc.identifier.urihttps://hdl.handle.net/11250/2676948
dc.description.abstractEvent logs recorded during the execution of business processes constitute a valuable source of information. Applying process mining techniques to them, event logs may reveal the actual process execution and enable reasoning on quantitative or qualitative process properties. However, event logs often contain sensitive information that could be related to individual process stakeholders through background information and cross-correlation. We therefore argue that, when publishing event logs, the risk of such re-identification attacks must be considered. In this paper, we show how to quantify the re-identification risk with measures for the individual uniqueness in event logs. We also report on a large-scale study that explored the individual uniqueness in a collection of publicly available event logs. Our results suggest that potentially up to all of the cases in an event log may be re-identified, which highlights the importance of privacy-preserving techniques in process mining.en_US
dc.language.isoengen_US
dc.publisherSpringer Verlagen_US
dc.titleQuantifying the Re-identification Risk of Event Logs for Process Miningen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionacceptedVersionen_US
dc.source.volume12127en_US
dc.source.journalLecture Notes in Computer Science (LNCS)en_US
dc.identifier.doi10.1007/978-3-030-49435-3_16
dc.identifier.cristin1814621
dc.description.localcodeThis is a post-peer-review, pre-copyedit version of an article. Locked until 3.6.2021 due to copyright restrictions. The final authenticated version is available online at: http://dx.doi.org/10.1007/978-3-030-49435-3_16en_US
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel