Process mining provides valuable insights into workflows based on recorded execution data. The registered event logs often contain sensitive information as they may bear personal details about working individuals or reveal organizations’ know-how and their operations’ history. Therefore, confidentiality and privacy requirements are high priority for process mining. In this paper, we present ProMiSe, a software framework and service that allows users to control information usage for automated process discovery, from input provision, through log processing, to output consultation. Usage control rules are expressed by means of policies. ProMiSe turns them into dedicated applications running within a Trusted Execution Environment (TEE) to enforce those rules. We put our solution to the test with real-world event logs to assess its computational resource consumption and service time.

Usage Control for Process Discovery Through a Trusted Execution Environment / Goretti, Valerio; Kirrane, Sabrina; Di Ciccio, Claudio. - 16321:(2026), pp. 268-286. ( 23rd International Conference on Service-Oriented Computing, ICSOC 2025 Shenzhen; China ) [10.1007/978-981-95-5015-9_20].

Usage Control for Process Discovery Through a Trusted Execution Environment

Valerio Goretti
Primo
Writing – Original Draft Preparation
;
Claudio Di Ciccio
Ultimo
Writing – Review & Editing
2026

Abstract

Process mining provides valuable insights into workflows based on recorded execution data. The registered event logs often contain sensitive information as they may bear personal details about working individuals or reveal organizations’ know-how and their operations’ history. Therefore, confidentiality and privacy requirements are high priority for process mining. In this paper, we present ProMiSe, a software framework and service that allows users to control information usage for automated process discovery, from input provision, through log processing, to output consultation. Usage control rules are expressed by means of policies. ProMiSe turns them into dedicated applications running within a Trusted Execution Environment (TEE) to enforce those rules. We put our solution to the test with real-world event logs to assess its computational resource consumption and service time.
2026
23rd International Conference on Service-Oriented Computing, ICSOC 2025
Confidential computing; Confidentiality; Privacy; TEE
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
Usage Control for Process Discovery Through a Trusted Execution Environment / Goretti, Valerio; Kirrane, Sabrina; Di Ciccio, Claudio. - 16321:(2026), pp. 268-286. ( 23rd International Conference on Service-Oriented Computing, ICSOC 2025 Shenzhen; China ) [10.1007/978-981-95-5015-9_20].
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1759655
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact