Non-Disclosing Credential On-chaining for Blockchain-based Decentralized Applications

A conflict of privacy and transparency requirements can be observed in many service systems that rely on verifiable identity-related information of their users. Such information is often required by services, for example, for access control purposes or to meet know-your-customer (KYC) obligations that providers have under anti-money laundering and counter-terrorism Read more…

Control-Flow-Based Querying of Process Executions from Partially Ordered Event Data

https://www.youtube.com/embed/1mgnpZLpZ8EProcess Mining deals with the analysis of event data that are generated during the execution of business processes. Event data contain numerous recorded individual process executions. Each process execution contains executed process activities and their temporal information, e.g., when activities for a given process execution are being conducted. We often Read more…