Login / Signup
Compliance to Data Protection and Purpose Control Using Process Mining Technique.
Azadeh Sadat Mozafari Mehr
Published in:
BPM (PhD/Demos) (2019)
Keyphrases
</>
data protection
process mining
process model
event logs
business process
access control
data security
business processes
sensitive information
object oriented
information security
database
decision trees
privacy preserving
formal concept analysis
personal data