SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Privacy and Trust in Business Processes: Challenges and Opportunities
In processes we trust
Marlon Dumas
marlon.dumas@ut.ee
SOAMED Workshop – Berlin 9-10 June 2016
What do you understand by…
Security?
Privacy?Trust?
2
Trust
Confidentiality
Integrity
Non-
Repudiation
Availability
Reliability
Safety
Functionality
Data
3
• Security: Confidentiality, integrity and non-repudiation in the presence of
dishonest/malicious attackers
• Privacy: Confidentiality in the presence of honest-but-curious actors
SECURITY VS. PRIVACY
4
Topics in Business Process Security & Privacy
• Access control and release control in business processes
• Flow analysis to detect unauthorized data object access/disclosures
• Privacy-aware business process execution
• Collaborative process execution with untrusted parties
5
Privacy-Aware Business
Processes
Analysis of Linked Datasets: No privacy tech
Analysis of Linked Datasets: k-anonymization
Analysis of Linked Datasets:
Multi-Party Computation (MPC)
10 million tax records
+
500 000 education records
Dan Bogdanov et al.: Students and Taxes: a Privacy-Preserving Study Using Secure
Computation. PoPETs 2016(3): 117-135 (2016)
9
Dan Bogdanov et al.: a Privacy-Preserving Study Using Secure Computation. PoPETs 2016(3): 117-135 (2016)
Data Analysis with MPC – Architecture
10
Data analysis process with MPC (part 1)
11
12
Data analysis process with MPC (part 2)
Challenges
1. How can we make it easy for business users to model
and configure multi-party private data analysis
processes?
2. How to analyze such processes against compliance
requirements?
12
Scope of MPC
• Allows a computation to be performed across parties without them disclosing
anything but the output
• But the output is visible to the analyst…
• What if the analyst issues several (authorized) queries? What can they learn about individuals?
• Information release control
• K-anonymity, t-closeness
• Differential privacy
13
Differential Privacy (Dwork 2006)
K gives e-differential privacy if for all values of DB, DB’
differing in a single element, and all S in Range(K )
Pr[ K (DB) in S]
Pr[ K (DB’) in S]
≤ eε ~ (1+ε)
ratio bounded
Pr [t]
14
Differential Privacy
Source: Gerome Miklau and Michael Hay
Accuracy
loss!
15
Dan Bogdanov et al.: a Privacy-Preserving Study Using Secure Computation. PoPETs 2016(3): 117-135 (2016)
Data Analysis with MPC – Architecture
Differentially
Private Release
Mechanism
Challenges
3. How to measure differential privacy of data analysis
processes that are repeatedly executed?
4. How to strike tradeoffs between differential privacy
and accuracy in data analysis processes?
Pleak.io – Vision
- Lets one model stakeholders and flows in extended BPMN (PA-BPMN)
- Finds data leaks taking into account Privacy-Enhancing Technologies used
- Secure multi-party computation
- Encrypted computation
- K-anonymity, differential privacy
- Quantifies leakages and accuracy loss.
- Suggests relevant privacy-enhancing technologies to reduce privacy leaks.
Part of DARPA’s Brandeis Program – NAPLES Project
18
Pleak.io – Architecture
Sample Scenario in PA-BPMN
19
dp-flow
dp-task
Privacy Analysis
Differential Privacy Disclosure
20
Underpinning Theory – Generalized Sensitivity
 Generalized distances – any partial order with addition and least element
- dX: X2
→ VX
 f : X→Y has sensitivity cf : VX→VY
 Differential privacy is a specific case of generalized sensitivity
 Generalized sensitivity is composable, e.g. cf○g = cf cg
21
Abstract Model:
Data Processing Workflow
22
Differential Privacy Disclosure of Outputs w.r.t. Data
Sources
23
Differential Privacy Disclosure of Outputs w.r.t. Data
Sources
24
Differential Privacy Disclosure of Outputs w.r.t. Data
Sources
25
Differential Privacy Disclosure of a
Data Source to a Party
r
26
(ships, disaster) -> {
avail_food = 0;
avail_ships = [];
for (ship in ships) do {
fuzzed_loc = ship.loc() + Lap2
(3);
if (dist(fuzzed_loc, disaster.loc()) / ship.speed() <= 2
&& ship.cargo_type() == "food"
&& !ship.contains(dangerous_materials) ) {
avail_food += ship.cargo();
avail_ships.append({ship.name(), fuzzed_loc});
}
}
avail_food += Lap(2);
return (avail_food, avail_ships);
}
Collaborative processes with
untrusted parties
Distributed Ledger (e.g. Blockchain)
29
Source: FT Research
Distributed append-only database that ensures integrity and non-
repudiation in an untrusted setting
• Programs living on the blockchain (e.g. Ethereum) with their own memory and
code
• Invoked when certain transactions are sent to them
• Can store data, send transactions, interact with other contracts or with “agents”
Smart Contracts
30
Distributed Ledgers for Collaborative Processes
- Participants agree on a collaborative process and a model for it
31
32
32
Distributed Ledgers for Collaborative Processes
- Participants agree on a collaborative process and a model for it
- The model is translated to a smart contract(s) to be executed on the blockchain
- Smart contracts listen to process execution events and interact with agents or
other smart contracts in order to monitor and/or execute the process
33
1. Audit trail: Record all events in the process, which can be used later to retrace
the execution of a given process instance.
2. Monitoring: Deploy a smart contract for every instance of the process to verify
and/or enforce the constraints captured in the process model.
3. Active coordination: Deploy a smart contract for every process instance, which
observes every event occurring in the process instance and triggers the next step
by notifying the agent(s) of the corresponding actors.
34
Distributed Ledgers for Collaborative Processes
Collaborative Process Coordination on Blockchain
35
Ingo Weber et al. (BPM’2016)
Challenges
1. How to make it possible for business users to model
and configure collaborative processes on dist. ledgers?
2. How to analyze these processes against security and
privacy requirements?
3. How to efficiently execute high-throughput collaborative
processes on distributed ledgers?
4. How to ensure privacy in these processes?
Join us…
Reference(s)
[1] Dan Bogdanov et al.: Students and Taxes: a Privacy-Preserving Study Using
Secure Computation. PoPETs 2016(3):117-135, 2016
[2] Marlon Dumas, Luciano Garcia-Banuelos, Peeter Laud: Differential Privacy of
Data Processing Workflows. In Proc. of GraMSec’2016
[3] Ingo Weber, Xiwei Xu, Regis Riveret, Guido Governatori, Alexander
Ponomarev, Jan Mendling. Untrusted Business Process Monitoring and Execution
Using Blockchain. In Proc. of BPM’2016
37
Research funded by DARPA (Brandeis
program 2015-2019)
Thanks!

Weitere ähnliche Inhalte

Was ist angesagt?

Process Mining and Predictive Process Monitoring
Process Mining and Predictive Process MonitoringProcess Mining and Predictive Process Monitoring
Process Mining and Predictive Process MonitoringMarlon Dumas
 
Automated Process Improvement: Status, Challenges, and Perspectives
Automated Process Improvement: Status, Challenges, and PerspectivesAutomated Process Improvement: Status, Challenges, and Perspectives
Automated Process Improvement: Status, Challenges, and PerspectivesMarlon Dumas
 
Caterpillar: A Blockchain-Based Business Proces Management System
Caterpillar: A Blockchain-Based Business Proces Management SystemCaterpillar: A Blockchain-Based Business Proces Management System
Caterpillar: A Blockchain-Based Business Proces Management SystemMarlon Dumas
 
Multi-Perspective Comparison of Business Processes Variants Based on Event Logs
Multi-Perspective Comparison of Business Processes Variants Based on Event LogsMulti-Perspective Comparison of Business Processes Variants Based on Event Logs
Multi-Perspective Comparison of Business Processes Variants Based on Event LogsMarlon Dumas
 
Process Mining 2.0: From Insights to Actions
Process Mining 2.0: From Insights to ActionsProcess Mining 2.0: From Insights to Actions
Process Mining 2.0: From Insights to ActionsMarlon Dumas
 
White-box prediction of process performance indicators via flow analysis
White-box prediction of process performance indicators via flow analysisWhite-box prediction of process performance indicators via flow analysis
White-box prediction of process performance indicators via flow analysisMarlon Dumas
 
AI for Business Process Management
AI for Business Process ManagementAI for Business Process Management
AI for Business Process ManagementMarlon Dumas
 
Learning Accurate LSTM Models of Business Processes
Learning Accurate LSTM Models of Business ProcessesLearning Accurate LSTM Models of Business Processes
Learning Accurate LSTM Models of Business ProcessesMarlon Dumas
 
Collaborative Business Process Execution on Blockchain: The Caterpillar Approach
Collaborative Business Process Execution on Blockchain: The Caterpillar ApproachCollaborative Business Process Execution on Blockchain: The Caterpillar Approach
Collaborative Business Process Execution on Blockchain: The Caterpillar ApproachMarlon Dumas
 
Automated Discovery of Data Transformations for Robotic Process Automation
Automated Discovery of Data Transformations for Robotic Process AutomationAutomated Discovery of Data Transformations for Robotic Process Automation
Automated Discovery of Data Transformations for Robotic Process AutomationMarlon Dumas
 
Process Mining and Predictive Process Monitoring: From Technology to Business...
Process Mining and Predictive Process Monitoring: From Technology to Business...Process Mining and Predictive Process Monitoring: From Technology to Business...
Process Mining and Predictive Process Monitoring: From Technology to Business...Marlon Dumas
 
Beyond Tasks and Gateways: Automated Discovery of BPMN Models with Subprocess...
Beyond Tasks and Gateways: Automated Discovery of BPMN Models with Subprocess...Beyond Tasks and Gateways: Automated Discovery of BPMN Models with Subprocess...
Beyond Tasks and Gateways: Automated Discovery of BPMN Models with Subprocess...Marlon Dumas
 
Artificial Intelligence: The Next 5(0) Years
Artificial Intelligence: The Next 5(0) YearsArtificial Intelligence: The Next 5(0) Years
Artificial Intelligence: The Next 5(0) YearsMarlon Dumas
 
Interpreted Execution of Business Process Models on Blockchain
Interpreted Execution of Business Process Models on BlockchainInterpreted Execution of Business Process Models on Blockchain
Interpreted Execution of Business Process Models on BlockchainMarlon Dumas
 
Beyond Process Mining: Discovering Business Rules From Event Logs
Beyond Process Mining: Discovering Business Rules From Event LogsBeyond Process Mining: Discovering Business Rules From Event Logs
Beyond Process Mining: Discovering Business Rules From Event LogsMarlon Dumas
 
Enterprise Systems
Enterprise SystemsEnterprise Systems
Enterprise SystemsMarlon Dumas
 
Predictive Process Monitoring with Hyperparameter Optimization
Predictive Process Monitoring with Hyperparameter OptimizationPredictive Process Monitoring with Hyperparameter Optimization
Predictive Process Monitoring with Hyperparameter OptimizationMarlon Dumas
 
Automated Discovery of Structured Process Models: Discover Structured vs Disc...
Automated Discovery of Structured Process Models: Discover Structured vs Disc...Automated Discovery of Structured Process Models: Discover Structured vs Disc...
Automated Discovery of Structured Process Models: Discover Structured vs Disc...Marlon Dumas
 
Visualising and Analysing Dynamic Business Processes using Petri nets
Visualising and Analysing Dynamic Business Processes using Petri netsVisualising and Analysing Dynamic Business Processes using Petri nets
Visualising and Analysing Dynamic Business Processes using Petri netsMithileysh Sathiyanarayanan
 
Process Mining Intro (Eng)
Process Mining Intro (Eng)Process Mining Intro (Eng)
Process Mining Intro (Eng)Dafna Levy
 

Was ist angesagt? (20)

Process Mining and Predictive Process Monitoring
Process Mining and Predictive Process MonitoringProcess Mining and Predictive Process Monitoring
Process Mining and Predictive Process Monitoring
 
Automated Process Improvement: Status, Challenges, and Perspectives
Automated Process Improvement: Status, Challenges, and PerspectivesAutomated Process Improvement: Status, Challenges, and Perspectives
Automated Process Improvement: Status, Challenges, and Perspectives
 
Caterpillar: A Blockchain-Based Business Proces Management System
Caterpillar: A Blockchain-Based Business Proces Management SystemCaterpillar: A Blockchain-Based Business Proces Management System
Caterpillar: A Blockchain-Based Business Proces Management System
 
Multi-Perspective Comparison of Business Processes Variants Based on Event Logs
Multi-Perspective Comparison of Business Processes Variants Based on Event LogsMulti-Perspective Comparison of Business Processes Variants Based on Event Logs
Multi-Perspective Comparison of Business Processes Variants Based on Event Logs
 
Process Mining 2.0: From Insights to Actions
Process Mining 2.0: From Insights to ActionsProcess Mining 2.0: From Insights to Actions
Process Mining 2.0: From Insights to Actions
 
White-box prediction of process performance indicators via flow analysis
White-box prediction of process performance indicators via flow analysisWhite-box prediction of process performance indicators via flow analysis
White-box prediction of process performance indicators via flow analysis
 
AI for Business Process Management
AI for Business Process ManagementAI for Business Process Management
AI for Business Process Management
 
Learning Accurate LSTM Models of Business Processes
Learning Accurate LSTM Models of Business ProcessesLearning Accurate LSTM Models of Business Processes
Learning Accurate LSTM Models of Business Processes
 
Collaborative Business Process Execution on Blockchain: The Caterpillar Approach
Collaborative Business Process Execution on Blockchain: The Caterpillar ApproachCollaborative Business Process Execution on Blockchain: The Caterpillar Approach
Collaborative Business Process Execution on Blockchain: The Caterpillar Approach
 
Automated Discovery of Data Transformations for Robotic Process Automation
Automated Discovery of Data Transformations for Robotic Process AutomationAutomated Discovery of Data Transformations for Robotic Process Automation
Automated Discovery of Data Transformations for Robotic Process Automation
 
Process Mining and Predictive Process Monitoring: From Technology to Business...
Process Mining and Predictive Process Monitoring: From Technology to Business...Process Mining and Predictive Process Monitoring: From Technology to Business...
Process Mining and Predictive Process Monitoring: From Technology to Business...
 
Beyond Tasks and Gateways: Automated Discovery of BPMN Models with Subprocess...
Beyond Tasks and Gateways: Automated Discovery of BPMN Models with Subprocess...Beyond Tasks and Gateways: Automated Discovery of BPMN Models with Subprocess...
Beyond Tasks and Gateways: Automated Discovery of BPMN Models with Subprocess...
 
Artificial Intelligence: The Next 5(0) Years
Artificial Intelligence: The Next 5(0) YearsArtificial Intelligence: The Next 5(0) Years
Artificial Intelligence: The Next 5(0) Years
 
Interpreted Execution of Business Process Models on Blockchain
Interpreted Execution of Business Process Models on BlockchainInterpreted Execution of Business Process Models on Blockchain
Interpreted Execution of Business Process Models on Blockchain
 
Beyond Process Mining: Discovering Business Rules From Event Logs
Beyond Process Mining: Discovering Business Rules From Event LogsBeyond Process Mining: Discovering Business Rules From Event Logs
Beyond Process Mining: Discovering Business Rules From Event Logs
 
Enterprise Systems
Enterprise SystemsEnterprise Systems
Enterprise Systems
 
Predictive Process Monitoring with Hyperparameter Optimization
Predictive Process Monitoring with Hyperparameter OptimizationPredictive Process Monitoring with Hyperparameter Optimization
Predictive Process Monitoring with Hyperparameter Optimization
 
Automated Discovery of Structured Process Models: Discover Structured vs Disc...
Automated Discovery of Structured Process Models: Discover Structured vs Disc...Automated Discovery of Structured Process Models: Discover Structured vs Disc...
Automated Discovery of Structured Process Models: Discover Structured vs Disc...
 
Visualising and Analysing Dynamic Business Processes using Petri nets
Visualising and Analysing Dynamic Business Processes using Petri netsVisualising and Analysing Dynamic Business Processes using Petri nets
Visualising and Analysing Dynamic Business Processes using Petri nets
 
Process Mining Intro (Eng)
Process Mining Intro (Eng)Process Mining Intro (Eng)
Process Mining Intro (Eng)
 

Andere mochten auch

Minimizing Overprocessing Waste in Business Processes via Predictive Activity...
Minimizing Overprocessing Waste in Business Processes via Predictive Activity...Minimizing Overprocessing Waste in Business Processes via Predictive Activity...
Minimizing Overprocessing Waste in Business Processes via Predictive Activity...Marlon Dumas
 
My business processes are deviant! What should I do about it?
My business processes are deviant! What should I do about it?My business processes are deviant! What should I do about it?
My business processes are deviant! What should I do about it?Marlon Dumas
 
Factors Affecting the Sustained Use of Process Models
Factors Affecting the Sustained Use of Process ModelsFactors Affecting the Sustained Use of Process Models
Factors Affecting the Sustained Use of Process ModelsMarlon Dumas
 
From Models to Data and Back: The Journey of the BPM Discipline and the Tangl...
From Models to Data and Back: The Journey of the BPM Discipline and the Tangl...From Models to Data and Back: The Journey of the BPM Discipline and the Tangl...
From Models to Data and Back: The Journey of the BPM Discipline and the Tangl...Marlon Dumas
 
Business Process Performance Mining with Staged Process Flows
Business Process Performance Mining with Staged Process FlowsBusiness Process Performance Mining with Staged Process Flows
Business Process Performance Mining with Staged Process FlowsMarlon Dumas
 
Complete and Interpretable Conformance Checking of Business Processes
Complete and Interpretable Conformance Checking of Business ProcessesComplete and Interpretable Conformance Checking of Business Processes
Complete and Interpretable Conformance Checking of Business ProcessesMarlon Dumas
 
Predictive Business Process Monitoring with Structured and Unstructured Data
Predictive Business Process Monitoring with Structured and Unstructured DataPredictive Business Process Monitoring with Structured and Unstructured Data
Predictive Business Process Monitoring with Structured and Unstructured DataMarlon Dumas
 
Evidence-Based Business Process Management
Evidence-Based Business Process ManagementEvidence-Based Business Process Management
Evidence-Based Business Process ManagementMarlon Dumas
 
Introduction to Business Process Analysis and Redesign
Introduction to Business Process Analysis and RedesignIntroduction to Business Process Analysis and Redesign
Introduction to Business Process Analysis and RedesignMarlon Dumas
 
Differential Privacy Analysis of Data Processing Workflows
Differential Privacy Analysis of Data Processing WorkflowsDifferential Privacy Analysis of Data Processing Workflows
Differential Privacy Analysis of Data Processing WorkflowsMarlon Dumas
 
Semantics and Analysis of DMN Decision Tables
Semantics and Analysis of DMN Decision TablesSemantics and Analysis of DMN Decision Tables
Semantics and Analysis of DMN Decision TablesMarlon Dumas
 
Minería de Procesos y de Reglas de Negocio
Minería de Procesos y de Reglas de NegocioMinería de Procesos y de Reglas de Negocio
Minería de Procesos y de Reglas de NegocioMarlon Dumas
 
BPM Techniques and Tools: A Quick Tour of the BPM Lifecycle
BPM Techniques and Tools: A Quick Tour of the BPM LifecycleBPM Techniques and Tools: A Quick Tour of the BPM Lifecycle
BPM Techniques and Tools: A Quick Tour of the BPM LifecycleMarlon Dumas
 
Fundamentals of Business Process Management: A Quick Introduction to Value-Dr...
Fundamentals of Business Process Management: A Quick Introduction to Value-Dr...Fundamentals of Business Process Management: A Quick Introduction to Value-Dr...
Fundamentals of Business Process Management: A Quick Introduction to Value-Dr...Marlon Dumas
 
OCLC Report: Sharing, Privacy and Trust
OCLC Report: Sharing, Privacy and TrustOCLC Report: Sharing, Privacy and Trust
OCLC Report: Sharing, Privacy and TrustMichael Sean Gallagher
 
Risto kunelius. security, privacy and trust, the legitimation challenge of th...
Risto kunelius. security, privacy and trust, the legitimation challenge of th...Risto kunelius. security, privacy and trust, the legitimation challenge of th...
Risto kunelius. security, privacy and trust, the legitimation challenge of th...NordForsk
 
Big Data, Big Responsibilities
Big Data, Big ResponsibilitiesBig Data, Big Responsibilities
Big Data, Big ResponsibilitiesStephen Loudermilk
 
Business Process Management - Building The BPM Balanced Scorecard
Business Process Management - Building The BPM Balanced ScorecardBusiness Process Management - Building The BPM Balanced Scorecard
Business Process Management - Building The BPM Balanced ScorecardSteve Towers, CEO and CPP Champion
 
BPMN 2.0 Tutorial 01 - Basic Constructs
BPMN 2.0 Tutorial 01 - Basic ConstructsBPMN 2.0 Tutorial 01 - Basic Constructs
BPMN 2.0 Tutorial 01 - Basic ConstructsMichael zur Muehlen
 

Andere mochten auch (20)

Minimizing Overprocessing Waste in Business Processes via Predictive Activity...
Minimizing Overprocessing Waste in Business Processes via Predictive Activity...Minimizing Overprocessing Waste in Business Processes via Predictive Activity...
Minimizing Overprocessing Waste in Business Processes via Predictive Activity...
 
My business processes are deviant! What should I do about it?
My business processes are deviant! What should I do about it?My business processes are deviant! What should I do about it?
My business processes are deviant! What should I do about it?
 
Factors Affecting the Sustained Use of Process Models
Factors Affecting the Sustained Use of Process ModelsFactors Affecting the Sustained Use of Process Models
Factors Affecting the Sustained Use of Process Models
 
From Models to Data and Back: The Journey of the BPM Discipline and the Tangl...
From Models to Data and Back: The Journey of the BPM Discipline and the Tangl...From Models to Data and Back: The Journey of the BPM Discipline and the Tangl...
From Models to Data and Back: The Journey of the BPM Discipline and the Tangl...
 
Business Process Performance Mining with Staged Process Flows
Business Process Performance Mining with Staged Process FlowsBusiness Process Performance Mining with Staged Process Flows
Business Process Performance Mining with Staged Process Flows
 
Complete and Interpretable Conformance Checking of Business Processes
Complete and Interpretable Conformance Checking of Business ProcessesComplete and Interpretable Conformance Checking of Business Processes
Complete and Interpretable Conformance Checking of Business Processes
 
Predictive Business Process Monitoring with Structured and Unstructured Data
Predictive Business Process Monitoring with Structured and Unstructured DataPredictive Business Process Monitoring with Structured and Unstructured Data
Predictive Business Process Monitoring with Structured and Unstructured Data
 
Evidence-Based Business Process Management
Evidence-Based Business Process ManagementEvidence-Based Business Process Management
Evidence-Based Business Process Management
 
Introduction to Business Process Analysis and Redesign
Introduction to Business Process Analysis and RedesignIntroduction to Business Process Analysis and Redesign
Introduction to Business Process Analysis and Redesign
 
Differential Privacy Analysis of Data Processing Workflows
Differential Privacy Analysis of Data Processing WorkflowsDifferential Privacy Analysis of Data Processing Workflows
Differential Privacy Analysis of Data Processing Workflows
 
Semantics and Analysis of DMN Decision Tables
Semantics and Analysis of DMN Decision TablesSemantics and Analysis of DMN Decision Tables
Semantics and Analysis of DMN Decision Tables
 
Minería de Procesos y de Reglas de Negocio
Minería de Procesos y de Reglas de NegocioMinería de Procesos y de Reglas de Negocio
Minería de Procesos y de Reglas de Negocio
 
BPM Techniques and Tools: A Quick Tour of the BPM Lifecycle
BPM Techniques and Tools: A Quick Tour of the BPM LifecycleBPM Techniques and Tools: A Quick Tour of the BPM Lifecycle
BPM Techniques and Tools: A Quick Tour of the BPM Lifecycle
 
Fundamentals of Business Process Management: A Quick Introduction to Value-Dr...
Fundamentals of Business Process Management: A Quick Introduction to Value-Dr...Fundamentals of Business Process Management: A Quick Introduction to Value-Dr...
Fundamentals of Business Process Management: A Quick Introduction to Value-Dr...
 
OCLC Report: Sharing, Privacy and Trust
OCLC Report: Sharing, Privacy and TrustOCLC Report: Sharing, Privacy and Trust
OCLC Report: Sharing, Privacy and Trust
 
Risto kunelius. security, privacy and trust, the legitimation challenge of th...
Risto kunelius. security, privacy and trust, the legitimation challenge of th...Risto kunelius. security, privacy and trust, the legitimation challenge of th...
Risto kunelius. security, privacy and trust, the legitimation challenge of th...
 
CSR Big data
CSR Big dataCSR Big data
CSR Big data
 
Big Data, Big Responsibilities
Big Data, Big ResponsibilitiesBig Data, Big Responsibilities
Big Data, Big Responsibilities
 
Business Process Management - Building The BPM Balanced Scorecard
Business Process Management - Building The BPM Balanced ScorecardBusiness Process Management - Building The BPM Balanced Scorecard
Business Process Management - Building The BPM Balanced Scorecard
 
BPMN 2.0 Tutorial 01 - Basic Constructs
BPMN 2.0 Tutorial 01 - Basic ConstructsBPMN 2.0 Tutorial 01 - Basic Constructs
BPMN 2.0 Tutorial 01 - Basic Constructs
 

Ähnlich wie In Processes We Trust: Privacy and Trust in Business Processes

20190423 PRiSE model to tackle data protection impact assessments and data pr...
20190423 PRiSE model to tackle data protection impact assessments and data pr...20190423 PRiSE model to tackle data protection impact assessments and data pr...
20190423 PRiSE model to tackle data protection impact assessments and data pr...Brussels Legal Hackers
 
Witdom overview 2016
Witdom overview 2016Witdom overview 2016
Witdom overview 2016Elsa Prieto
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data miningNeeda Multani
 
Collusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sumCollusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sumnexgentech15
 
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...Nexgen Technology
 
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...nexgentechnology
 
Collusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sumCollusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sumNexgen Technology
 
MN691 Assignment 3 - Final Report 2
MN691 Assignment 3 - Final Report 2MN691 Assignment 3 - Final Report 2
MN691 Assignment 3 - Final Report 2Abi Reddy
 
5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR ComplianceGabor Farkas
 
Secure multi party computation for inter-organizational process mining
Secure multi party computation for inter-organizational process miningSecure multi party computation for inter-organizational process mining
Secure multi party computation for inter-organizational process miningGamal Elkoumy
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageIJSRD
 
Privacy and security policies in supply chain
Privacy and security policies in supply chainPrivacy and security policies in supply chain
Privacy and security policies in supply chainVanya Vladeva
 
Harnessing Blockchain Innovation to Outsmart Insurance Fraudsters
Harnessing Blockchain Innovation to Outsmart Insurance FraudstersHarnessing Blockchain Innovation to Outsmart Insurance Fraudsters
Harnessing Blockchain Innovation to Outsmart Insurance FraudstersAeoLogic Technologies
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteSplunk
 
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesCluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesEditor IJMTER
 
Incentive compatible privacy preserving data analysis
Incentive compatible privacy preserving data analysisIncentive compatible privacy preserving data analysis
Incentive compatible privacy preserving data analysisJPINFOTECH JAYAPRAKASH
 
Survey on Peer to Peer Car Sharing System Using Blockchain
Survey on Peer to Peer Car Sharing System Using BlockchainSurvey on Peer to Peer Car Sharing System Using Blockchain
Survey on Peer to Peer Car Sharing System Using BlockchainIRJET Journal
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentEditor IJCATR
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
 
Anonymity based privacy-preserving data
Anonymity based privacy-preserving dataAnonymity based privacy-preserving data
Anonymity based privacy-preserving dataKamal Spring
 

Ähnlich wie In Processes We Trust: Privacy and Trust in Business Processes (20)

20190423 PRiSE model to tackle data protection impact assessments and data pr...
20190423 PRiSE model to tackle data protection impact assessments and data pr...20190423 PRiSE model to tackle data protection impact assessments and data pr...
20190423 PRiSE model to tackle data protection impact assessments and data pr...
 
Witdom overview 2016
Witdom overview 2016Witdom overview 2016
Witdom overview 2016
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data mining
 
Collusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sumCollusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sum
 
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
 
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
 
Collusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sumCollusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sum
 
MN691 Assignment 3 - Final Report 2
MN691 Assignment 3 - Final Report 2MN691 Assignment 3 - Final Report 2
MN691 Assignment 3 - Final Report 2
 
5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance
 
Secure multi party computation for inter-organizational process mining
Secure multi party computation for inter-organizational process miningSecure multi party computation for inter-organizational process mining
Secure multi party computation for inter-organizational process mining
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
 
Privacy and security policies in supply chain
Privacy and security policies in supply chainPrivacy and security policies in supply chain
Privacy and security policies in supply chain
 
Harnessing Blockchain Innovation to Outsmart Insurance Fraudsters
Harnessing Blockchain Innovation to Outsmart Insurance FraudstersHarnessing Blockchain Innovation to Outsmart Insurance Fraudsters
Harnessing Blockchain Innovation to Outsmart Insurance Fraudsters
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
 
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesCluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for Databases
 
Incentive compatible privacy preserving data analysis
Incentive compatible privacy preserving data analysisIncentive compatible privacy preserving data analysis
Incentive compatible privacy preserving data analysis
 
Survey on Peer to Peer Car Sharing System Using Blockchain
Survey on Peer to Peer Car Sharing System Using BlockchainSurvey on Peer to Peer Car Sharing System Using Blockchain
Survey on Peer to Peer Car Sharing System Using Blockchain
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
Anonymity based privacy-preserving data
Anonymity based privacy-preserving dataAnonymity based privacy-preserving data
Anonymity based privacy-preserving data
 

Mehr von Marlon Dumas

How GenAI will (not) change your business?
How GenAI will (not)  change your business?How GenAI will (not)  change your business?
How GenAI will (not) change your business?Marlon Dumas
 
Walking the Way from Process Mining to AI-Driven Process Optimization
Walking the Way from Process Mining to AI-Driven Process OptimizationWalking the Way from Process Mining to AI-Driven Process Optimization
Walking the Way from Process Mining to AI-Driven Process OptimizationMarlon Dumas
 
Discovery and Simulation of Business Processes with Probabilistic Resource Av...
Discovery and Simulation of Business Processes with Probabilistic Resource Av...Discovery and Simulation of Business Processes with Probabilistic Resource Av...
Discovery and Simulation of Business Processes with Probabilistic Resource Av...Marlon Dumas
 
Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...
Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...
Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...Marlon Dumas
 
Business Process Optimization: Status and Perspectives
Business Process Optimization: Status and PerspectivesBusiness Process Optimization: Status and Perspectives
Business Process Optimization: Status and PerspectivesMarlon Dumas
 
Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...
Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...
Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...Marlon Dumas
 
Why am I Waiting Data-Driven Analysis of Waiting Times in Business Processes
Why am I Waiting Data-Driven Analysis of Waiting Times in Business ProcessesWhy am I Waiting Data-Driven Analysis of Waiting Times in Business Processes
Why am I Waiting Data-Driven Analysis of Waiting Times in Business ProcessesMarlon Dumas
 
Augmented Business Process Management
Augmented Business Process ManagementAugmented Business Process Management
Augmented Business Process ManagementMarlon Dumas
 
Process Mining and Data-Driven Process Simulation
Process Mining and Data-Driven Process SimulationProcess Mining and Data-Driven Process Simulation
Process Mining and Data-Driven Process SimulationMarlon Dumas
 
Modeling Extraneous Activity Delays in Business Process Simulation
Modeling Extraneous Activity Delays in Business Process SimulationModeling Extraneous Activity Delays in Business Process Simulation
Modeling Extraneous Activity Delays in Business Process SimulationMarlon Dumas
 
Business Process Simulation with Differentiated Resources: Does it Make a Dif...
Business Process Simulation with Differentiated Resources: Does it Make a Dif...Business Process Simulation with Differentiated Resources: Does it Make a Dif...
Business Process Simulation with Differentiated Resources: Does it Make a Dif...Marlon Dumas
 
Prescriptive Process Monitoring Under Uncertainty and Resource Constraints
Prescriptive Process Monitoring Under Uncertainty and Resource ConstraintsPrescriptive Process Monitoring Under Uncertainty and Resource Constraints
Prescriptive Process Monitoring Under Uncertainty and Resource ConstraintsMarlon Dumas
 
Robotic Process Mining
Robotic Process MiningRobotic Process Mining
Robotic Process MiningMarlon Dumas
 
Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?
Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?
Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?Marlon Dumas
 
Learning Accurate Business Process Simulation Models from Event Logs via Auto...
Learning Accurate Business Process Simulation Models from Event Logs via Auto...Learning Accurate Business Process Simulation Models from Event Logs via Auto...
Learning Accurate Business Process Simulation Models from Event Logs via Auto...Marlon Dumas
 
Process Mining: A Guide for Practitioners
Process Mining: A Guide for PractitionersProcess Mining: A Guide for Practitioners
Process Mining: A Guide for PractitionersMarlon Dumas
 
Process Mining for Process Improvement.pptx
Process Mining for Process Improvement.pptxProcess Mining for Process Improvement.pptx
Process Mining for Process Improvement.pptxMarlon Dumas
 
Data-Driven Analysis of Batch Processing Inefficiencies in Business Processes
Data-Driven Analysis of  Batch Processing Inefficiencies  in Business ProcessesData-Driven Analysis of  Batch Processing Inefficiencies  in Business Processes
Data-Driven Analysis of Batch Processing Inefficiencies in Business ProcessesMarlon Dumas
 
Optimización de procesos basada en datos
Optimización de procesos basada en datosOptimización de procesos basada en datos
Optimización de procesos basada en datosMarlon Dumas
 
Process Mining and AI for Continuous Process Improvement
Process Mining and AI for Continuous Process ImprovementProcess Mining and AI for Continuous Process Improvement
Process Mining and AI for Continuous Process ImprovementMarlon Dumas
 

Mehr von Marlon Dumas (20)

How GenAI will (not) change your business?
How GenAI will (not)  change your business?How GenAI will (not)  change your business?
How GenAI will (not) change your business?
 
Walking the Way from Process Mining to AI-Driven Process Optimization
Walking the Way from Process Mining to AI-Driven Process OptimizationWalking the Way from Process Mining to AI-Driven Process Optimization
Walking the Way from Process Mining to AI-Driven Process Optimization
 
Discovery and Simulation of Business Processes with Probabilistic Resource Av...
Discovery and Simulation of Business Processes with Probabilistic Resource Av...Discovery and Simulation of Business Processes with Probabilistic Resource Av...
Discovery and Simulation of Business Processes with Probabilistic Resource Av...
 
Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...
Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...
Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...
 
Business Process Optimization: Status and Perspectives
Business Process Optimization: Status and PerspectivesBusiness Process Optimization: Status and Perspectives
Business Process Optimization: Status and Perspectives
 
Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...
Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...
Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...
 
Why am I Waiting Data-Driven Analysis of Waiting Times in Business Processes
Why am I Waiting Data-Driven Analysis of Waiting Times in Business ProcessesWhy am I Waiting Data-Driven Analysis of Waiting Times in Business Processes
Why am I Waiting Data-Driven Analysis of Waiting Times in Business Processes
 
Augmented Business Process Management
Augmented Business Process ManagementAugmented Business Process Management
Augmented Business Process Management
 
Process Mining and Data-Driven Process Simulation
Process Mining and Data-Driven Process SimulationProcess Mining and Data-Driven Process Simulation
Process Mining and Data-Driven Process Simulation
 
Modeling Extraneous Activity Delays in Business Process Simulation
Modeling Extraneous Activity Delays in Business Process SimulationModeling Extraneous Activity Delays in Business Process Simulation
Modeling Extraneous Activity Delays in Business Process Simulation
 
Business Process Simulation with Differentiated Resources: Does it Make a Dif...
Business Process Simulation with Differentiated Resources: Does it Make a Dif...Business Process Simulation with Differentiated Resources: Does it Make a Dif...
Business Process Simulation with Differentiated Resources: Does it Make a Dif...
 
Prescriptive Process Monitoring Under Uncertainty and Resource Constraints
Prescriptive Process Monitoring Under Uncertainty and Resource ConstraintsPrescriptive Process Monitoring Under Uncertainty and Resource Constraints
Prescriptive Process Monitoring Under Uncertainty and Resource Constraints
 
Robotic Process Mining
Robotic Process MiningRobotic Process Mining
Robotic Process Mining
 
Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?
Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?
Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?
 
Learning Accurate Business Process Simulation Models from Event Logs via Auto...
Learning Accurate Business Process Simulation Models from Event Logs via Auto...Learning Accurate Business Process Simulation Models from Event Logs via Auto...
Learning Accurate Business Process Simulation Models from Event Logs via Auto...
 
Process Mining: A Guide for Practitioners
Process Mining: A Guide for PractitionersProcess Mining: A Guide for Practitioners
Process Mining: A Guide for Practitioners
 
Process Mining for Process Improvement.pptx
Process Mining for Process Improvement.pptxProcess Mining for Process Improvement.pptx
Process Mining for Process Improvement.pptx
 
Data-Driven Analysis of Batch Processing Inefficiencies in Business Processes
Data-Driven Analysis of  Batch Processing Inefficiencies  in Business ProcessesData-Driven Analysis of  Batch Processing Inefficiencies  in Business Processes
Data-Driven Analysis of Batch Processing Inefficiencies in Business Processes
 
Optimización de procesos basada en datos
Optimización de procesos basada en datosOptimización de procesos basada en datos
Optimización de procesos basada en datos
 
Process Mining and AI for Continuous Process Improvement
Process Mining and AI for Continuous Process ImprovementProcess Mining and AI for Continuous Process Improvement
Process Mining and AI for Continuous Process Improvement
 

Kürzlich hochgeladen

Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 

Kürzlich hochgeladen (20)

Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 

In Processes We Trust: Privacy and Trust in Business Processes

  • 1. Privacy and Trust in Business Processes: Challenges and Opportunities In processes we trust Marlon Dumas marlon.dumas@ut.ee SOAMED Workshop – Berlin 9-10 June 2016
  • 2. What do you understand by… Security? Privacy?Trust? 2
  • 4. • Security: Confidentiality, integrity and non-repudiation in the presence of dishonest/malicious attackers • Privacy: Confidentiality in the presence of honest-but-curious actors SECURITY VS. PRIVACY 4
  • 5. Topics in Business Process Security & Privacy • Access control and release control in business processes • Flow analysis to detect unauthorized data object access/disclosures • Privacy-aware business process execution • Collaborative process execution with untrusted parties 5
  • 7. Analysis of Linked Datasets: No privacy tech
  • 8. Analysis of Linked Datasets: k-anonymization
  • 9. Analysis of Linked Datasets: Multi-Party Computation (MPC) 10 million tax records + 500 000 education records Dan Bogdanov et al.: Students and Taxes: a Privacy-Preserving Study Using Secure Computation. PoPETs 2016(3): 117-135 (2016) 9
  • 10. Dan Bogdanov et al.: a Privacy-Preserving Study Using Secure Computation. PoPETs 2016(3): 117-135 (2016) Data Analysis with MPC – Architecture 10
  • 11. Data analysis process with MPC (part 1) 11
  • 12. 12 Data analysis process with MPC (part 2) Challenges 1. How can we make it easy for business users to model and configure multi-party private data analysis processes? 2. How to analyze such processes against compliance requirements? 12
  • 13. Scope of MPC • Allows a computation to be performed across parties without them disclosing anything but the output • But the output is visible to the analyst… • What if the analyst issues several (authorized) queries? What can they learn about individuals? • Information release control • K-anonymity, t-closeness • Differential privacy 13
  • 14. Differential Privacy (Dwork 2006) K gives e-differential privacy if for all values of DB, DB’ differing in a single element, and all S in Range(K ) Pr[ K (DB) in S] Pr[ K (DB’) in S] ≤ eε ~ (1+ε) ratio bounded Pr [t] 14
  • 15. Differential Privacy Source: Gerome Miklau and Michael Hay Accuracy loss! 15
  • 16. Dan Bogdanov et al.: a Privacy-Preserving Study Using Secure Computation. PoPETs 2016(3): 117-135 (2016) Data Analysis with MPC – Architecture Differentially Private Release Mechanism Challenges 3. How to measure differential privacy of data analysis processes that are repeatedly executed? 4. How to strike tradeoffs between differential privacy and accuracy in data analysis processes?
  • 17. Pleak.io – Vision - Lets one model stakeholders and flows in extended BPMN (PA-BPMN) - Finds data leaks taking into account Privacy-Enhancing Technologies used - Secure multi-party computation - Encrypted computation - K-anonymity, differential privacy - Quantifies leakages and accuracy loss. - Suggests relevant privacy-enhancing technologies to reduce privacy leaks. Part of DARPA’s Brandeis Program – NAPLES Project
  • 19. Sample Scenario in PA-BPMN 19 dp-flow dp-task
  • 21. Underpinning Theory – Generalized Sensitivity  Generalized distances – any partial order with addition and least element - dX: X2 → VX  f : X→Y has sensitivity cf : VX→VY  Differential privacy is a specific case of generalized sensitivity  Generalized sensitivity is composable, e.g. cf○g = cf cg 21
  • 23. Differential Privacy Disclosure of Outputs w.r.t. Data Sources 23
  • 24. Differential Privacy Disclosure of Outputs w.r.t. Data Sources 24
  • 25. Differential Privacy Disclosure of Outputs w.r.t. Data Sources 25
  • 26. Differential Privacy Disclosure of a Data Source to a Party r 26
  • 27. (ships, disaster) -> { avail_food = 0; avail_ships = []; for (ship in ships) do { fuzzed_loc = ship.loc() + Lap2 (3); if (dist(fuzzed_loc, disaster.loc()) / ship.speed() <= 2 && ship.cargo_type() == "food" && !ship.contains(dangerous_materials) ) { avail_food += ship.cargo(); avail_ships.append({ship.name(), fuzzed_loc}); } } avail_food += Lap(2); return (avail_food, avail_ships); }
  • 29. Distributed Ledger (e.g. Blockchain) 29 Source: FT Research Distributed append-only database that ensures integrity and non- repudiation in an untrusted setting
  • 30. • Programs living on the blockchain (e.g. Ethereum) with their own memory and code • Invoked when certain transactions are sent to them • Can store data, send transactions, interact with other contracts or with “agents” Smart Contracts 30
  • 31. Distributed Ledgers for Collaborative Processes - Participants agree on a collaborative process and a model for it 31
  • 32. 32 32
  • 33. Distributed Ledgers for Collaborative Processes - Participants agree on a collaborative process and a model for it - The model is translated to a smart contract(s) to be executed on the blockchain - Smart contracts listen to process execution events and interact with agents or other smart contracts in order to monitor and/or execute the process 33
  • 34. 1. Audit trail: Record all events in the process, which can be used later to retrace the execution of a given process instance. 2. Monitoring: Deploy a smart contract for every instance of the process to verify and/or enforce the constraints captured in the process model. 3. Active coordination: Deploy a smart contract for every process instance, which observes every event occurring in the process instance and triggers the next step by notifying the agent(s) of the corresponding actors. 34 Distributed Ledgers for Collaborative Processes
  • 35. Collaborative Process Coordination on Blockchain 35 Ingo Weber et al. (BPM’2016) Challenges 1. How to make it possible for business users to model and configure collaborative processes on dist. ledgers? 2. How to analyze these processes against security and privacy requirements? 3. How to efficiently execute high-throughput collaborative processes on distributed ledgers? 4. How to ensure privacy in these processes?
  • 37. Reference(s) [1] Dan Bogdanov et al.: Students and Taxes: a Privacy-Preserving Study Using Secure Computation. PoPETs 2016(3):117-135, 2016 [2] Marlon Dumas, Luciano Garcia-Banuelos, Peeter Laud: Differential Privacy of Data Processing Workflows. In Proc. of GraMSec’2016 [3] Ingo Weber, Xiwei Xu, Regis Riveret, Guido Governatori, Alexander Ponomarev, Jan Mendling. Untrusted Business Process Monitoring and Execution Using Blockchain. In Proc. of BPM’2016 37
  • 38. Research funded by DARPA (Brandeis program 2015-2019) Thanks!