1

Ensuring Confidentiality in Process Mining