Proceedings of the 14th International Joint Conference on E-Business and Telecommunications 2017
DOI: 10.5220/0006408602670274
|View full text |Cite
|
Sign up to set email alerts
|

Mining Encrypted Software Logs using Alpha Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…Rafiee et al proposed a confidentiality framework and assessed the vulnerabilities, furthermore, they discussed the open difficulties of event log encryption [8], including the incompleteness of encrypting event records and the shortcomings of using a single technique. Tillem et al proposed an Alpha method employing encryption protocols for process discovery, the proposed method may protect the privacy of users and software simultaneously [9]; Burattin et al addressed the outsourcing of PM analytics [10], where the confidentiality of event logs and resultant processes must be ensured by concealing sensitive data with symmetric or homomorphic encryption; Liu et al presented a trusted third party for public and private business process models [11]. To implement privacy regulations on event logs, a PM privacy-preserving system design based on an Attribute-Based Access Control (ABAC)authorization model is proposed in the literature [12].…”
Section: A Mainstream Privacy Preserving Methodsmentioning
confidence: 99%
“…Rafiee et al proposed a confidentiality framework and assessed the vulnerabilities, furthermore, they discussed the open difficulties of event log encryption [8], including the incompleteness of encrypting event records and the shortcomings of using a single technique. Tillem et al proposed an Alpha method employing encryption protocols for process discovery, the proposed method may protect the privacy of users and software simultaneously [9]; Burattin et al addressed the outsourcing of PM analytics [10], where the confidentiality of event logs and resultant processes must be ensured by concealing sensitive data with symmetric or homomorphic encryption; Liu et al presented a trusted third party for public and private business process models [11]. To implement privacy regulations on event logs, a PM privacy-preserving system design based on an Attribute-Based Access Control (ABAC)authorization model is proposed in the literature [12].…”
Section: A Mainstream Privacy Preserving Methodsmentioning
confidence: 99%
“…Only centralized event logs are considered failing to provide support for distributed event logs (R7 -Data). A cross-organizational setting is considered, e.g., by Tillem et al [50] who propose a secure processing protocol to execute the Alpha algorithm over distributed event logs (R7 -Data). However, their protocol does not mitigate attacks on confidentiality described in T4.…”
Section: Current Workmentioning
confidence: 99%
“…The first concern is how to ensure confidentiality and privacy during the computation of process mining operations, particularly in a cross-organizational setting. For example, Tillem et al [44,45] propose a distributed secure processing protocol for discovering process models using the alpha algorithm. Similarly, Elkoumy et al [19,20] propose a method for securely computing the DFG of an event log in an inter-organizational setting.…”
Section: Privacy-preserving Process Miningmentioning
confidence: 99%