<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Providing Privacy Guarantees in Process Mining</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Stephan A. Fahrenkrog-Petersen</string-name>
          <email>stephan.fahrenkrog-petersen@hu-berlin.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Humboldt-Universitt zu Berlin</institution>
          ,
          <addr-line>Berlin</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <fpage>23</fpage>
      <lpage>30</lpage>
      <abstract>
        <p>Information systems record data while executing business processes. This data can be analyzed, by process mining, to gain knowledge about the business processes underlying the information systems. Data recorded by the information systems is often personal data belonging to individuals such as customers or process workers. Such data has become a strong focus of recent regulations like the GDPR. These new legal developments force organizations that process personal data to ensure a certain level of privacy. Unlike in other elds of data science, in the eld of process mining there are no existing solutions to guarantee such privacy. This research aims to provide such solutions that enable organizations to do process mining while giving privacy guarantees to individuals, such as employees, that contribute their data. In this work, we present privacy challenges in the area of process mining and outline privacy guarantees we aim to provide for process mining. We want to follow the design science paradigm to achieve our goals. We describe our preliminary results, an algorithm, called PRETSA, to sanitize event logs for privacy-aware process discovery and show the next steps we want to take in our research.</p>
      </abstract>
      <kwd-group>
        <kwd>Process Mining</kwd>
        <kwd>Privacy</kwd>
        <kwd>Privacy-aware Data Mining</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Information systems, like ERP or CRM systems, are used to execute business
processes. While doing so, these system record data. Process mining [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] allows
an organization to utilize this data to produce insights into the processes of
the organization. Data records of information systems are called event logs and
contain personal information of individuals involved in the underlying business
process, e.g. about process worker, and customers. Personal data is protected
by privacy legislation, such as the GDPR in the European Union, the Health
insurance Portability and Accountability Act [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] in the United States, or the
Personal Information Protection and Electronic Documents Act [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] in Canada.
      </p>
      <p>
        Besides those legal requirements, there is also a motivation from a business
point of view to ensure privacy. Violations against privacy regulations can result
in expensive nes, up to 4% of the annual revenue of a company [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], and have
negative impact on the market value of a company [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Therefore, it makes sense
from a business point of view to invest in privacy-enhancing technologies to
minimize the risk for the business.
      </p>
      <p>
        If an organization wants to ensure the protection of personal data, it may
strive for compliance, to certain privacy guarantees [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ], e.g. k-anonymity [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] or
di erential privacy [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Much research has aimed to providing such guarantees in
areas like machine learning or sequence mining. However, techniques to ensure
such guarantees do not yet exists for process mining. Since privacy-enhancing
technologies come with a utility loss [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], it is bene ciary to customize these
technologies for each application, to preserve as much utility as possible. For
this reason, we plan to develop techniques suited for process mining. We outline
our research plans in more detail later in this paper.
      </p>
      <p>The remainder of the paper is structured as follows: In Section 2 we give an
overview about related lines of research and describe the existing privacy notions
we plan to build on. In Section 3 we explain in detail what research problems we
want to answer. Our research methodology is explained in Section 4. We outline
the results we already achieved so far and our short term plan in Section 5.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Related Work and Background</title>
      <p>
        In the area of privacy, notions [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ] such as k-anonymity [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] or di erential
privacy [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] are used to guarantee a certain level of privacy. These guarantees can
either limit the information an adversary can gain from an attack or bound
the chance of success that an attack will succeed. To achieve these goals,
kanonymity, for example, gives a lower bound of entries in a data set that need to
have the same values for their identifying attributes. In this way, k-anonymity
limits the chance of relating one entry in a data set to a speci c individual.
The approach of k-anonymity and its extending concepts, e.g. l-diversity [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]
or t-closeness [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], are used in the context of data publishing. The mentioned
extensions of k-anonymity provide additional protection against information
release about so called sensitive attributes of an individual. Di erential privacy, on
the other hand, guarantees an upper bound of privacy impact of a query, that is
evaluated on a data set. This goal is achieved by adding noise to the data. The
goal of di erential privacy is to make it impossible to determine if the data of a
certain individual is part of the data set. Di erential privacy was widely adapted
by industry, e.g., by Apple [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. While k-anonymity and its enhancements are
constraints on the data set, di erential privacy is usually a constraint applied
to a query that is evaluated over the data set [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. A stronger privacy guarantee,
for either k-anonymity or di erential privacy, usually comes with higher utility
loss [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], i.e., it lowers the ability to answer some analysis question based on the
data.
      </p>
      <p>
        Recently, the problem of privacy in the context of process mining was
discussed in [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] by Mannhardt et al. The paper introduced a framework that
explains challenges arising from the GDPR for the design of process mining
systems. A major contribution of the paper was the discussion of the primary use
and the secondary use in the context of process mining. In the case of business
processes, customers usually agree to the usage of their data e.g. for executing
the business process, but they usually never agreed to the secondary use of their
data, e.g., for process mining. However, the framework by Mannhardt et al. [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]
did not provide any techniques to ensure privacy for process mining. We plan to
ll that gap with our work.
      </p>
      <p>
        A related concept to privacy is the concept of con dentiality. In [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], this
concept was described in the context of process mining. In [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], an approach based
on encryption to achieve con dentiality was introduced. However, no guarantee
for con dentiality was given. The concept of con dentiality also di ers from
privacy, since some information might be con dential but not relevant in terms of
privacy. An example are aggregated performance information about a business
process. Such performance information might be useful to a competitor and an
organization therefore might want to protect them. However, aggregated
information itself is usually not critical from a privacy point of view, as long as it not
possible to link such data to an individual. While con dentiality is a nice-to-have,
privacy is often a must due to legal regulations, like the GDPR [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. However,
even if the goals of con dentiality and privacy di er, some future techniques in
both areas might also be applicable to the other area.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Research Aim</title>
      <p>Process Mining
Event Log 
Sanitization
Sanitized  
Event Data
Process Mining </p>
      <p>Artifact
Data Contribution</p>
      <p>Data Extraction</p>
      <p>Privatized Process Mining
Individual</p>
      <p>Information System</p>
      <p>Event Data
Process Mining </p>
      <p>Artifact</p>
      <p>
        Our overall goal is to provide privacy guarantees for process mining by
preserving as much utility as possible. We think it is possible to provide the
guarantees in two approaches, as visualized in Figure 1. These two di erent approaches
can be described as follows:
Event Log Sanitization One way of ensuring privacy is by preprocessing an
event log in such a way, that the event log itself guarantees certain levels of
privacy e.g. k-anonymity. As such, ideas from privacy-aware data
publishing [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] are adapted for event logs. We call the event log that is generated
by this preprocessing step a sanitized event log. Such a sanitized event log
can be used as input data for existing process mining techniques. Event log
sanitization would also allow an organization to share its event log with
another organization, e.g,. a consulting rm, while at the same time being able
to provide privacy guarantees to the individuals involved in the process.
Privatized Process Mining Alternatively, it is possible to develop new
process mining techniques, that guarantee a certain level of privacy for the
generated process mining artifacts. This can for example be done, by using
queries on the event data that ful ll di erential privacy. If an algorithm is
changed in a way that it only uses such queries, the resulting artifact of the
algorithm also guarantees di erential privacy.
      </p>
      <p>The two possible approaches come with speci c advantages and
disadvantages that we list in Table 1.</p>
      <p>We plan to develop unique techniques for each of the process mining sub
elds listed below, because we think it is necessary to tackle each sub eld with
their own approaches to maintain as much utility as possible for each sub eld.
Since each sub eld has it own de nition of utility we need di erent approaches
to achieve that goal.</p>
      <p>
        Usually process mining is structured in the sub elds process discovery,
conformance checking, and enhancement. In process discovery [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], models that
describe the business process are automatically generated from the event data.
Sensitive information, like performance information, is also often part of the
input data and displayed in the resulting models. The information about each
instance of a process itself is also related to one speci c individual and is
therefore sensitive information. These examples clearly show that it is necessary to
ensure privacy in the context of process discovery, to protect such information.
      </p>
      <p>In conformance checking the goal is to check if an event log complies to a
known process model. We think it is not useful to develop privacy techniques
for conformance checking, because the whole point of conformance checking is
to identify process instances that di er from the standard. Therefore it would
not be meaningful to hide unusual information.</p>
      <p>
        For enhancement, the extraction of additional information from an event log,
we want to highlight the sub elds predictive process monitoring [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], i.e. the
construction of models to predict properties of running process instances, and
queue mining [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ], the analysis of queueing e ects in resource driven business
processes. For both elds, it is necessary to process events individually to give
an online prediction. Therefore, it would not be enough to just sanitize an event
log. Instead, it must also be sanitize to privatize individual events. Hence, the
requirements to meet by any sanitization technique are di erent from those
imposed by process discovery.
4
      </p>
    </sec>
    <sec id="sec-4">
      <title>Research Approach</title>
      <p>
        Our approach to develop solutions for the problem space mentioned above will
be based on the methodology of design science [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]. This means that we will
build prototypes of our proposed solutions and then evaluate these prototypes
in an experimental setup. In these experiments, we will evaluate our approaches
on real-world event logs to show applicability and usefulness, and on synthetic
data to study scalability and sensitivity of our techniques.
      </p>
      <p>To complement our experimental evaluations, we plan to conduct case
studies with organizations to test our developed solutions in practice. Case studies
would allow us to assess, if our solutions are feasible in a real-world setting. We
would also be able to examine, if we solved the most pressing privacy issues of
our industry partners. Therefore, these case studies might lead to directions for
further research.</p>
      <p>
        Finally we want our techniques to be available for others to use. We plan to
make our implementations available as open source code. Additionally, we plan
to integrate our approaches into existing process mining solutions, like ProM [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]
or Apromore [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] and provide event log sanitization as a service on a website.
5
      </p>
    </sec>
    <sec id="sec-5">
      <title>Preliminary Results</title>
      <p>In this section, we introduce our results achieved so far and the tasks we are
currently working on.
5.1</p>
      <p>
        Providing k-Anonymity and t-Closeness for Process Discovery
Our rst contribution is an algorithm that provides a privacy guarantee for
process discovery, called PRETSA [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. It provides k-anonymity and t-closeness
guarantees, by a sanitization of an event log. Our algorithm works on a pre
xtree based representation of the event log and modi es the pre x-tree until the
privacy constrain is ful lled. The resulting event log can be used to generate an
annotated process model, e.g., a model with performance information. We aimed
to preserve as much utility as possible for process discovery with PRETSA.
Based on experiments with the inductive miner [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] on three real-world event
logs we showed that PRETSA preserves more utility than a baseline. We even
can provide an event log with reasonable utility for settings in which a baseline
fails to provide any sanitized event log.
      </p>
      <p>As mentioned earlier it is desirable to conducts a case study to test our
approaches. We already reached out to two organizations to check if they would
be interested to test PRETSA in a case study.</p>
      <p>We made our PRETSA implementation available as a stand-alone python
program on Github1 under the MIT licence. Next, we plan to integrate it in a
process mining solution.
5.2</p>
      <sec id="sec-5-1">
        <title>Providing Di erential Privacy for Process Discovery</title>
        <p>We started working on a mechanism to provide ( , )-di erential privacy for
process discovery. We plan to provide these guarantees for a query that returns the
directly follows relationships of an event log, since directly follows relations are
widely used by process discovery techniques. Our research aims to build a
specialized noise function for such queries that provides noise with low utility loss
for process discovery.
5.3</p>
      </sec>
      <sec id="sec-5-2">
        <title>Predictive Process Monitoring</title>
        <p>
          Predictive process monitoring is a sub eld of process mining that aims to predict
future outcomes of ongoing cases, like the remaining time of the case or the next
event. This eld is an applies machine learning to achieve it goals. In the eld of
machine learning various work to achieve privacy guarantees exists [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] provides
1 https://github.com/samadeusfp/PRETSA
an broad overview about privacy issues and their solution in the area of machine
learning.
        </p>
        <p>Moreover, our current work considers privacy and con dentiality issues in
the area of predictive process monitoring. We plan to provide an overview about
these issues and set them in context with issues and solutions for privacy and
con dentiality in the context of machine learning in general.
6</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Conclusion</title>
      <p>In this work, we explained the importance of privacy guarantees for the eld
of process mining. We outlined related lines of research and our own research
plans to achieve such privacy guarantees for process discovery, predictive process
monitoring, and queue mining. We explained that we will conduct this research
based on the design science methodology. Our preliminary results include an
algorithm, PRETSA, ensure k-anonymity and t-closeness for process discovery
by preprocessing an event log. We also gave an overview about our current work
and future plans.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          :
          <article-title>Responsible data science: Using event data in a "people friendly" manner</article-title>
          .
          <source>In: Enterprise Information Systems - 18th International Conference, ICEIS 2016</source>
          , Rome, Italy,
          <source>April 25-28</source>
          ,
          <year>2016</year>
          , Revised Selected Papers. pp.
          <volume>3</volume>
          {
          <issue>28</issue>
          (
          <year>2016</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -62386-3 1, https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -62386-3 1
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Acquisti</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Friedman</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Telang</surname>
          </string-name>
          , R.:
          <article-title>Is there a cost to privacy breaches? an event study</article-title>
          .
          <source>ICIS 2006</source>
          Proceedings p.
          <volume>94</volume>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Act</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Health insurance portability and accountability act of 1996</article-title>
          . Public law
          <volume>104</volume>
          ,
          <issue>191</issue>
          (
          <year>1996</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Al-Rubaie</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chang</surname>
            ,
            <given-names>J.M.:</given-names>
          </string-name>
          <article-title>Privacy preserving machine learning: Threats and solutions</article-title>
          . arXiv preprint arXiv:
          <year>1804</year>
          .
          <volume>11238</volume>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Augusto</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Conforti</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dumas</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>La</given-names>
            <surname>Rosa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Maggi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.M.</given-names>
            ,
            <surname>Marrella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Mecella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Soo</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          :
          <article-title>Automated discovery of process models from event logs: Review and benchmark</article-title>
          .
          <source>IEEE Transactions on Knowledge and Data Engineering</source>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Brickell</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shmatikov</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>The cost of privacy: destruction of data-mining utility in anonymized data publishing</article-title>
          .
          <source>In: Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining</source>
          . pp.
          <volume>70</volume>
          {
          <fpage>78</fpage>
          .
          <string-name>
            <surname>ACM</surname>
          </string-name>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Dwork</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Di erential privacy: A survey of results</article-title>
          .
          <source>In: International Conference on Theory and Applications of Models of Computation</source>
          . pp.
          <volume>1</volume>
          {
          <fpage>19</fpage>
          . Springer (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Fahrenkrog-Petersen</surname>
            ,
            <given-names>S.A</given-names>
          </string-name>
          ., van der Aa, H.,
          <string-name>
            <surname>Weidlich</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          : Pretsa:
          <article-title>Event log sanitization for privacy-aware process discovery</article-title>
          .
          <source>IEEE International Conference of Process Mining</source>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Holohan</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Antonatos</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Braghin</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mac</surname>
            <given-names>Aonghusa</given-names>
          </string-name>
          ,
          <string-name>
            <surname>P.</surname>
          </string-name>
          : (k, )
          <article-title>-anonymity: kanonymity with -di erential privacy</article-title>
          .
          <source>arXiv preprint arXiv:1710.01615</source>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Houser</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Voss</surname>
          </string-name>
          , W.G.:
          <article-title>Gdpr: The end of google and facebook or a new paradigm in data privacy? (</article-title>
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>La</given-names>
            <surname>Rosa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Reijers</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.A.</given-names>
            ,
            <surname>Van Der Aalst</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.M.</given-names>
            ,
            <surname>Dijkman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.M.</given-names>
            ,
            <surname>Mendling</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Garc</surname>
          </string-name>
          a-Ban~uelos, L.:
          <article-title>Apromore: An advanced process model repository</article-title>
          .
          <source>Expert Systems with Applications</source>
          <volume>38</volume>
          (
          <issue>6</issue>
          ),
          <volume>7029</volume>
          {
          <fpage>7040</fpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Leemans</surname>
            ,
            <given-names>S.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fahland</surname>
          </string-name>
          , D., van der Aalst, W.M.:
          <article-title>Discovering block-structured process models from event logs-a constructive approach</article-title>
          . In: International conference
          <article-title>on applications and theory of Petri nets and concurrency</article-title>
          . pp.
          <volume>311</volume>
          {
          <fpage>329</fpage>
          . Springer (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Venkatasubramanian</surname>
          </string-name>
          , S.:
          <article-title>t-closeness: Privacy beyond k-anonymity and l-diversity</article-title>
          .
          <source>In: 2007 IEEE 23rd International Conference on Data Engineering</source>
          . pp.
          <volume>106</volume>
          {
          <fpage>115</fpage>
          .
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Machanavajjhala</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gehrke</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kifer</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Venkitasubramaniam</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>l-diversity: Privacy beyond k-anonymity</article-title>
          .
          <source>In: 22nd International Conference on Data Engineering (ICDE'06)</source>
          . pp.
          <volume>24</volume>
          {
          <fpage>24</fpage>
          .
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Maggi</surname>
            ,
            <given-names>F.M.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Di</given-names>
            <surname>Francescomarino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Ghidini</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.</surname>
          </string-name>
          :
          <article-title>Predictive monitoring of business processes</article-title>
          .
          <source>In: International conference on advanced information systems engineering</source>
          . pp.
          <volume>457</volume>
          {
          <fpage>472</fpage>
          . Springer (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Mannhardt</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petersen</surname>
            ,
            <given-names>S.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oliveira</surname>
            ,
            <given-names>M.F.</given-names>
          </string-name>
          :
          <article-title>Privacy challenges for process mining in human-centered industrial environments</article-title>
          .
          <source>In: 2018 14th International Conference on Intelligent Environments (IE)</source>
          . pp.
          <volume>64</volume>
          {
          <fpage>71</fpage>
          .
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Parliament</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Personal information protection and electronic documents act</article-title>
          .
          <source>Consolidated Acts, SC</source>
          <year>2000</year>
          ,
          <volume>c 5</volume>
          ,
          <issue>13</issue>
          (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Ra</surname>
            <given-names>ei</given-names>
          </string-name>
          , M.,
          <string-name>
            <surname>von Waldthausen</surname>
          </string-name>
          , L.,
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          :
          <article-title>Ensuring con dentiality in process mining</article-title>
          .
          <source>In: Proceedings of the 8th International Symposium on Datadriven Process Discovery and Analysis (SIMPDA</source>
          <year>2018</year>
          ), Seville, Spain,
          <source>December 13-14</source>
          ,
          <year>2018</year>
          . pp.
          <volume>3</volume>
          {
          <issue>17</issue>
          (
          <year>2018</year>
          ), http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2270</volume>
          /paper1.pdf
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Senderovich</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weidlich</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gal</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mandelbaum</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Queue mining for delay prediction in multi-class service processes</article-title>
          .
          <source>Information Systems</source>
          <volume>53</volume>
          ,
          <fpage>278</fpage>
          {
          <fpage>295</fpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Sweeney</surname>
          </string-name>
          , L.:
          <article-title>k-anonymity: A model for protecting privacy</article-title>
          .
          <source>International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems</source>
          <volume>10</volume>
          (
          <issue>05</issue>
          ),
          <volume>557</volume>
          {
          <fpage>570</fpage>
          (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Tang</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Korolova</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bai</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          :
          <article-title>Privacy loss in apple's implementation of di erential privacy on macos 10.12</article-title>
          . arXiv preprint arXiv:
          <volume>1709</volume>
          .02753 (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Van Der Aalst</surname>
          </string-name>
          , W.:
          <article-title>Process mining: discovery, conformance and enhancement of business processes</article-title>
          ,
          <source>vol. 2</source>
          . Springer (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Van Dongen</surname>
            ,
            <given-names>B.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>de Medeiros</surname>
            ,
            <given-names>A.K.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Verbeek</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weijters</surname>
          </string-name>
          , A.,
          <string-name>
            <surname>van Der Aalst</surname>
            ,
            <given-names>W.M.:</given-names>
          </string-name>
          <article-title>The prom framework: A new era in process mining tool support</article-title>
          .
          <source>In: International conference on application and theory of petri nets</source>
          . pp.
          <volume>444</volume>
          {
          <fpage>454</fpage>
          . Springer (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Voigt</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Von dem Bussche</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>The eu general data protection regulation (gdpr). A Practical Guide</article-title>
          , 1st Ed., Cham: Springer International Publishing (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Von</surname>
            <given-names>Alan</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>R.H.</given-names>
            ,
            <surname>March</surname>
          </string-name>
          , S.T.,
          <string-name>
            <surname>Park</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ram</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Design science in information systems research</article-title>
          .
          <source>MIS quarterly 28(1)</source>
          ,
          <volume>75</volume>
          {
          <fpage>105</fpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Wagner</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Eckho</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Technical privacy metrics: a systematic survey</article-title>
          .
          <source>ACM Computing Surveys (CSUR) 51(3)</source>
          ,
          <volume>57</volume>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>