scispace - formally typeset
M

Majid Rafiei

Researcher at RWTH Aachen University

Publications -  32
Citations -  256

Majid Rafiei is an academic researcher from RWTH Aachen University. The author has contributed to research in topics: Process mining & Computer science. The author has an hindex of 7, co-authored 21 publications receiving 115 citations.

Papers
More filters
Book ChapterDOI

Mining Roles from Event Logs While Preserving Privacy

TL;DR: It is shown that the problem cannot be solved by naive approaches like encrypting data, and an anonymized person can still be identified based on a few well-chosen events and a decomposition method and a collection of techniques that preserve the privacy of the individuals are introduced.
Journal ArticleDOI

Group-based privacy preservation techniques for process mining

TL;DR: This paper provides formal definitions of attack models and introduces an effective group-based privacy preservation technique for process mining that covers the main perspectives of process mining including control-flow, time, case, and organizational perspectives.
Book ChapterDOI

TLKC-Privacy Model for Process Mining.

TL;DR: The TLKC-privacy model for process mining is introduced that provides privacy guarantees in terms of group-based anonymization and extends and customizes the LKC- Privacy model presented to deal with high-dimensional, sparse, and sequential trajectory data.
Journal ArticleDOI

Privacy and Confidentiality in Process Mining: Threats and Research Challenges

TL;DR: In this paper, the authors provide a foundation for future research in process mining with respect to privacy and confidentiality requirements, which are very important prerequisites for applying process mining to comply with regulations and keep company secrets.
Journal ArticleDOI

Privacy and Confidentiality in Process Mining -- Threats and Research Challenges

TL;DR: In this article, the authors provide a foundation for future research on privacy-preserving and confidential process mining techniques and identify main threats related to an motivation application scenario in a hospital context as well as to the current body of work on privacy and confidentiality in process mining.