Skip to main content
Log in

Privacy-preserving Process Mining: Differential

Privacy for Event Logs (Extended Abstract)

  • HAUPTBEITRAG
  • PRIVACY-PRESERVING PROCESS MINING: DIFFERENTIAL
  • Published:
Informatik Spektrum Aims and scope

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. D’Acquisto G, Domingo-Ferrer J, Kikiras P, Torra V, de Montjoye YA, Bourka A (2015) Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics

  2. Dwork C (2008) Differential privacy: A survey of results. In: International Conference on Theory and Applications of Models of Computation. Springer, pp 1–19

  3. Mannhardt F, Petersen S, de Oliveira MFD (2018) Privacy challenges for process mining in human-centered industrial environments. In: 14th International Conference on Intelligent Environments (IE). IEEE, Xplore, pp 64–71

  4. Mans RS, van der Aalst WMP, Vanwersch RJB, Moleman AJ (2013) Process mining in healthcare: Data challenges when answering frequently posed questions. In: Process Support and Knowledge Representation in Health Care. Springer, Berlin Heidelberg, pp 140–153

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Felix Mannhardt.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mannhardt, F., Koschmider, A., Baracaldo, N. et al. Privacy-preserving Process Mining: Differential. Informatik Spektrum 42, 349–351 (2019). https://doi.org/10.1007/s00287-019-01207-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00287-019-01207-9

Navigation