<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Anonymization Techniques for Privacy-preserving Process Mining (Extended Abstract)</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Stephan A. Fahrenkrog-Petersen</string-name>
          <email>stephan.fahrenkrog-petersen@hu-berlin.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>Privacy, Anonymization, Process Mining, Privacy-aware Process Mining</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Humboldt-Universität zu Berlin</institution>
          ,
          <addr-line>Berlin</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Weizenbaum Institute</institution>
          ,
          <addr-line>Berlin</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>1863</year>
      </pub-date>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>Privacy concerns arise when analyzing event logs in process mining, as they may contain sensitive information, such as clinical treatment details. Recently, through the work covered in this thesis, the risk of re-identification in event logs was quantified, and privacy threats within process mining were modeled. Anonymization emerged as a key strategy to address these privacy issues. The aim is to strike a balance between preserving utility and providing a predetermined level of privacy. This thesis introduced several novel anonymization techniques that provide superior utility compared to the state-of-the-art.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>CEUR
ceur-ws.org</p>
    </sec>
    <sec id="sec-2">
      <title>1. Introduction</title>
      <p>
        Event logs are commonly used for process mining, enabling the analysis of business
processes [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. These logs contain fine-granular information about the execution of a business
process. Sometimes these logs cover extremely private information, such as the clinical
treatment of a patient [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Consequently, there are privacy concerns over the sensitive information
within an event log. These issue sometimes block the adoption of process mining in sensitive
domains such as healthcare or human resource management.
      </p>
      <p>
        While the issue of privacy in process mining was already mentioned in the process mining
manifesto [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], it was not well-studied. This changed recently, partly due to the work covered in
the thesis [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], and the risk of re-identification in event logs [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] and also process models [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] was
quantified. Furthermore, the threats to privacy within process mining have been modeled [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
Through this approach, anonymization was established as a key strategy to handle the privacy
issues in process mining.
      </p>
      <p>
        Within the thesis discussed in this paper, several novel anonymization techniques have
been introduced. These techniques are suited to preserving as much utility as possible while
providing a pre-determined privacy guarantee. This privacy-utility trade-of is a major challenge
addressed within the thesis. Overall, the covered thesis contributes to the field of process mining
in three ways: (i) The thesis studies the re-identification risk of event logs and explores the
2024.
challenges that exist for privacy-preserving process mining; (ii) The thesis introduces novel
anonymization strategies that provide better utility than state-of-the-art techniques; (iii) The
algorithms of this thesis were made available to the community through integration into the
famous framework PM4PY [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>The remaining paper follows the same structure as the underlying thesis: In Section 2 we
highlight how the thesis contributed towards understanding privacy threats in process mining.
Next, we outline the anonymization techniques introduced in the thesis in Section 3. Finally,
we discuss future impact of the thesis for the field in Section 4.</p>
    </sec>
    <sec id="sec-3">
      <title>2. The Case for Anonymization</title>
      <p>
        Within section, we show studies that support the argument why anonymization techniques for
privacy-preserving process mining is needed. We do this by two studies, one qualitative study
and one quantitative study:
Qualitative Discussion on the Threats and Requirements of Privacy-preserving Process
Mining. While there exists a general understanding of the need to consider privacy within
process mining, the concrete requirements and threats have not been analysed. We fill this gap
in the thesis with this chapter, that is based on a collaboration of several privacy-preserving
process mining experts [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] (including the author of the thesis). This group collected the privacy
threats to process mining and derived requirements for privacy-preserving process mining based
on these threats. Furthermore, we argue that anonymization can help to address a majority of
the requirements spelled out and therefore, motivate the need for anonymization techniques
for event logs.
      </p>
      <p>
        Quantitative Analysis of Re-identification Risk in Event Logs. Until now the discussion
of threats to the privacy in event logs have been completely qualitative, within this part of
the thesis we provided a qualitative study that estimates the re-identification risk in event
logs [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. In this study we used well-established techniques for re-identification risk estimation
and adjusted them to the specifics of event logs. We applied the new method to event logs
and considered also only subsets of the data within these event logs. All publicly available
event logs have been considered and were analyzed in a pseudonymized manner. Through
our experiments we could show that event logs posses significant re-identification threats and
therefore can reveal sensitive information about the individuals involved within the event logs.
      </p>
    </sec>
    <sec id="sec-4">
      <title>3. Anonymization Techniques</title>
      <p>
        In this section, we give an overview of the anonymization techniques included in the underlying
thesis. All of the algorithms are made available on Github. Additionally, the diferential privacy
algorithms have been integrated into PM4Py [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. The anonymization techniques covered in the
thesis can be described as follows:
Semantic-aware Control-flow Anonymization. Many process mining tasks, such as process
discovery, mainly focus on the control-flow. This data might encode sensitive information of
service consumers, such as medical treatments they underwent. It is therefore important that
such control-flows analyzed in a privacy-preserving manner, but at the same time it is important
that the semantics of the control-flow is preserved. With SaCoFa [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] and SaPa [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] we introduce
two mechanisms that achieve the privacy notion diferential privacy [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] through noise insertion.
However, compared to state-of-the-art techniques they are able to add noise that is semantically
sensible and therefore preserve a higher utility for process discovery. SaCoFa mainly focuses
on semantics in terms of a logical ordering of the activities, i.e. by preventing the adding of
obviously false behavior such a traces where a patient is released from a hospital before she is
admitted. SaPa focussed on preserving the original log size, since alternative anonymization
techniques sometimes distort the log size by order of magnitudes. Within the thesis we show
that SaCoFa and SaPa outperform the state of the art technique [11].
      </p>
      <p>PRIPEL. Certain process mining tasks require more information than the control-flow.
PRIPEL [12] is an anonymization technique that provides a diferential privacy guarantee
for this contextual information. The algorithm takes the output of one control-flow
anonymization technique, such as SaCoFa or SaPa, and enriches it with contextual information, that is
anonymized through local diferential privacy. Resulting in an event log that is completely
protected by diferential privacy. We showed that the event logs created by PRIPEL are able to
retain general properties that can be used to analyze certain aspects of of the process such as
bottlenecks.</p>
      <p>PRETSA-Algorithm Family. The above mentioned techniques focused on the privacy
protection of individuals represented as one case. However, in process mining the service providers,
also called resources, play an important role. The PRETSA-Algorithm family [13, 14] ofers
protection for these individuals, through the privacy guarantees  -anonymity [15] and  -closeness [16].
Both guarantees are based on the idea of hiding individuals within groups so that no individual
can be singled-out. The anonymization techniques represent the control-flows of the event log
as prefix trees. The algorithms travel the prefix tree and merge behavior that violates privacy
guarantees with similar behavior. The algorithm family con sits of three algorithms: PRETSA is
the basic version ans travels the prefix in an ad-hoc manner; PRETSA* formalizes removal of
behavior as a search problem and uses A*-search to find an optimal solution; BF-PRETSA uses the
same search heuristic as PRETSA* for a best-first-approach, but does not exhaustively explores
the complete search space. Overall, we could show that PRETSA outperforms naive baselines.
While BF-PRETSA outperforms PRETSA and other state of the art techniques. However, PRETSA*
nearly never terminates for real world event logs.</p>
    </sec>
    <sec id="sec-5">
      <title>4. Conclusion</title>
      <p>The thesis described in this paper contributed through the field of process mining by giving a
greater understanding of privacy issues and through anonymization techniques that preserve
utility for common process mining tasks. Furthermore, it introduced leading anonymization
algorithms for event logs. Therefore, the thesis enables the analysis of event logs that so far
have been considered to sensitive. The rising numbers of papers [17, 18, 19, 20, 21] concerned
with privacy-preserving process mining shows how this thesis opened up an important topic of
research to the community.
programming, Springer, 2006, pp. 1–12.
[11] F. Mannhardt, A. Koschmider, N. Baracaldo, M. Weidlich, J. Michael, Privacy-preserving
process mining: Diferential privacy for event logs, Business &amp; Information Systems
Engineering 61 (2019) 595–614.
[12] S. A. Fahrenkrog-Petersen, H. van der Aa, M. Weidlich, PRIPEL: privacy-preserving event
log publishing including contextual information, in: D. Fahland, C. Ghidini, J. Becker,
M. Dumas (Eds.), Business Process Management - 18th International Conference, BPM 2020,
Seville, Spain, September 13-18, 2020, Proceedings, volume 12168 of Lecture Notes in
Computer Science, Springer, 2020, pp. 111–128. URL: https://doi.org/10.1007/978-3-030-58666-9_
7. doi:10.1007/978- 3- 030- 58666- 9\_7.
[13] S. A. Fahrenkrog-Petersen, H. van der Aa, M. Weidlich, PRETSA: event log sanitization
for privacy-aware process discovery, in: International Conference on Process Mining,
ICPM 2019, Aachen, Germany, June 24-26, 2019, IEEE, 2019, pp. 1–8. URL: https://doi.org/
10.1109/ICPM.2019.00012. doi:10.1109/ICPM.2019.00012.
[14] S. A. Fahrenkrog-Petersen, H. van der Aa, M. Weidlich, Optimal event log sanitization
for privacy-preserving process mining, Data Knowl. Eng. 145 (2023) 102175. URL: https:
//doi.org/10.1016/j.datak.2023.102175. doi:10.1016/j.datak.2023.102175.
[15] L. Sweeney, k-anonymity: A model for protecting privacy, International journal of
uncertainty, fuzziness and knowledge-based systems 10 (2002) 557–570.
[16] N. Li, T. Li, S. Venkatasubramanian, t-closeness: Privacy beyond k-anonymity and
ldiversity, in: 2007 IEEE 23rd international conference on data engineering, IEEE, 2006, pp.
106–115.
[17] R. Hildebrant, S. A. Fahrenkrog-Petersen, M. Weidlich, S. Ren, PMDG: privacy for
multiperspective process mining through data generalization, in: M. Indulska, I.
ReinhartzBerger, C. Cetina, O. Pastor (Eds.), Advanced Information Systems Engineering - 35th
International Conference, CAiSE 2023, Zaragoza, Spain, June 12-16, 2023, Proceedings,
volume 13901 of Lecture Notes in Computer Science, Springer, 2023, pp. 506–521. URL:
https://doi.org/10.1007/978-3-031-34560-9_30. doi:10.1007/978- 3- 031- 34560- 9\_30.
[18] M. Kabierski, S. A. Fahrenkrog-Petersen, M. Weidlich, Hiding in the forest:
Privacypreserving process performance indicators, Inf. Syst. 112 (2023) 102127. doi:10.1016/J.</p>
      <p>IS.2022.102127.
[19] M. Schulze, Y. Zisgen, M. Kirschte, E. Mohammadi, A. Koschmider, Diferentially private
inductive miner, CoRR abs/2407.04595 (2024). URL: https://doi.org/10.48550/arXiv.2407.
04595. doi:10.48550/ARXIV.2407.04595. arXiv:2407.04595.
[20] J. Cao, C. Wang, W. Guan, S. Qian, H. Zhao, Remaining time prediction for collaborative
business processes with privacy preservation, in: F. Monti, S. Rinderle-Ma, A. R. Cortés,
Z. Zheng, M. Mecella (Eds.), Service-Oriented Computing - 21st International Conference,
ICSOC 2023, Rome, Italy, November 28 - December 1, 2023, Proceedings, Part II, volume
14420 of Lecture Notes in Computer Science, Springer, 2023, pp. 38–53.
[21] M. Rafiei, F. Wangelik, M. Pourbafrani, W. M. P. van der Aalst, Travag: Diferentially
private trace variant generation using gans, in: S. Nurcan, A. L. Opdahl, H. Mouratidis,
A. Tsohou (Eds.), RCIS 2023, Corfu, Greece, May 23-26, 2023, Proceedings, volume 476 of
Lecture Notes in Business Information Processing, Springer, 2023, pp. 415–431. doi:10.1007/
978- 3- 031- 33080- 3\_25.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>W.</given-names>
            <surname>Van Der Aalst</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Adriansyah</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. K. A. De Medeiros</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Arcieri</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Baier</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Blickle</surname>
            ,
            <given-names>J. C.</given-names>
          </string-name>
          <string-name>
            <surname>Bose</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Van Den</surname>
            <given-names>Brand</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Brandtjen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Buijs</surname>
          </string-name>
          , et al.,
          <article-title>Process mining manifesto</article-title>
          , in: Business Process Management Workshops:
          <article-title>BPM 2011 International Workshops</article-title>
          , Clermont-Ferrand, France,
          <year>August 29</year>
          ,
          <year>2011</year>
          ,
          <string-name>
            <given-names>Revised</given-names>
            <surname>Selected</surname>
          </string-name>
          <string-name>
            <surname>Papers</surname>
          </string-name>
          ,
          <source>Part I 9</source>
          , Springer,
          <year>2012</year>
          , pp.
          <fpage>169</fpage>
          -
          <lpage>194</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>E.</given-names>
            <surname>Rojas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Munoz-Gama</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sepúlveda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Capurro</surname>
          </string-name>
          ,
          <article-title>Process mining in healthcare: A literature review</article-title>
          ,
          <source>Journal of biomedical informatics 61</source>
          (
          <year>2016</year>
          )
          <fpage>224</fpage>
          -
          <lpage>236</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Fahrenkrog-Petersen</surname>
          </string-name>
          ,
          <article-title>Anonymization techniques for privacy-preserving process mining (</article-title>
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S. N. von</given-names>
            <surname>Voigt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Fahrenkrog-Petersen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Janssen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Koschmider</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Tschorsch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Mannhardt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Landsiedel</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Weidlich, Quantifying the re-identification risk of event logs for process mining - empiricial evaluation paper</article-title>
          , in: S.
          <string-name>
            <surname>Dustdar</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Salinesi</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Rieu</surname>
          </string-name>
          , V. Pant (Eds.),
          <source>Advanced Information Systems</source>
          Engineering - 32nd International Conference, CAiSE
          <year>2020</year>
          , Grenoble, France, June 8-12,
          <year>2020</year>
          , Proceedings, volume
          <volume>12127</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2020</year>
          , pp.
          <fpage>252</fpage>
          -
          <lpage>267</lpage>
          . URL: https://doi.org/10. 1007/978-3-
          <fpage>030</fpage>
          -49435-3_
          <fpage>16</fpage>
          . doi:
          <volume>10</volume>
          .1007/978- 3-
          <fpage>030</fpage>
          - 49435- 3\_
          <fpage>16</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>K.</given-names>
            <surname>Maatouk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Mannhardt</surname>
          </string-name>
          ,
          <article-title>Quantifying the re-identification risk in published process models</article-title>
          , in: J.
          <string-name>
            <surname>Munoz-Gama</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          Lu (Eds.),
          <string-name>
            <surname>Process Mining</surname>
          </string-name>
          Workshops - ICPM 2021 International Workshops, Eindhoven,
          <source>The Netherlands, October 31 - November 4</source>
          ,
          <year>2021</year>
          , Revised Selected Papers, volume
          <volume>433</volume>
          <source>of Lecture Notes in Business Information Processing</source>
          , Springer,
          <year>2021</year>
          , pp.
          <fpage>382</fpage>
          -
          <lpage>394</lpage>
          . URL: https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -98581-3_
          <fpage>28</fpage>
          . doi:
          <volume>10</volume>
          .1007/978- 3-
          <fpage>030</fpage>
          - 98581- 3\_
          <fpage>28</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>G.</given-names>
            <surname>Elkoumy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Fahrenkrog-Petersen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. F.</given-names>
            <surname>Sani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Koschmider</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Mannhardt</surname>
          </string-name>
          ,
          <string-name>
            <surname>S. N. von Voigt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Rafiei</surname>
          </string-name>
          , L. von Waldthausen,
          <article-title>Privacy and confidentiality in process mining: Threats and research challenges</article-title>
          ,
          <source>ACM Trans. Manag. Inf. Syst</source>
          .
          <volume>13</volume>
          (
          <year>2022</year>
          )
          <volume>11</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>11</lpage>
          :
          <fpage>17</fpage>
          . URL: https://doi.org/10.1145/3468877. doi:
          <volume>10</volume>
          .1145/3468877.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>H.</given-names>
            <surname>Kirchmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Fahrenkrog-Petersen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kabierski</surname>
          </string-name>
          , H. van der Aa, M. Weidlich,
          <article-title>Privacy-preserving process mining with pm4py (extended abstract)</article-title>
          , in: M.
          <string-name>
            <surname>Hassani</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Koschmider</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Comuzzi</surname>
            ,
            <given-names>F. M.</given-names>
          </string-name>
          <string-name>
            <surname>Maggi</surname>
          </string-name>
          , L. Pufahl (Eds.),
          <source>Proceedings of the ICPM Doctoral Consortium and Demo Track</source>
          <year>2022</year>
          co
          <article-title>-located with 4th International Conference on Process Mining (ICPM</article-title>
          <year>2022</year>
          ), Bolzano, Italy, October,
          <year>2022</year>
          , volume
          <volume>3299</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>85</fpage>
          -
          <lpage>89</lpage>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3299</volume>
          / Paper18.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Fahrenkrog-Petersen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kabierski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Rösel</surname>
          </string-name>
          , H. van der Aa, M. Weidlich, Sacofa:
          <article-title>Semantics-aware control-flow anonymization for process mining</article-title>
          , in: C. D.
          <string-name>
            <surname>Ciccio</surname>
            ,
            <given-names>C. D.</given-names>
          </string-name>
          <string-name>
            <surname>Francescomarino</surname>
          </string-name>
          , P. Sofer (Eds.),
          <source>3rd International Conference on Process Mining, ICPM</source>
          <year>2021</year>
          , Eindhoven,
          <source>The Netherlands, October 31 - Nov. 4</source>
          ,
          <year>2021</year>
          , IEEE,
          <year>2021</year>
          , pp.
          <fpage>72</fpage>
          -
          <lpage>79</lpage>
          . URL: https://doi.org/10.1109/ICPM53251.
          <year>2021</year>
          .
          <volume>9576857</volume>
          . doi:
          <volume>10</volume>
          .1109/ICPM53251.
          <year>2021</year>
          .
          <volume>9576857</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Fahrenkrog-Petersen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kabierski</surname>
          </string-name>
          , H. van der Aa, M. Weidlich,
          <article-title>Semantics-aware mechanisms for control-flow anonymization in process mining</article-title>
          ,
          <source>Inf. Syst</source>
          .
          <volume>114</volume>
          (
          <year>2023</year>
          )
          <article-title>102169</article-title>
          . URL: https://doi.org/10.1016/j.is.
          <year>2023</year>
          .
          <volume>102169</volume>
          . doi:
          <volume>10</volume>
          .1016/j.is.
          <year>2023</year>
          .
          <volume>102169</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>C.</given-names>
            <surname>Dwork</surname>
          </string-name>
          ,
          <article-title>Diferential privacy</article-title>
          , in: International colloquium on automata, languages, and
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>