1,318 Hits in 3.0 sec

Analyzing Privacy Policies Based on a Privacy-Aware Profile: The Facebook and LinkedIn Case Studies

Joao Caramujo, Alberto Manuel Rodrigues da Silva
2015 2015 IEEE 17th Conference on Business Informatics  
This paper proposes the extension and validation of a UML profile for privacy-aware systems.  ...  The goal of this approach is to provide a better understanding of the different privacy-related requirements for improving privacy policies enforcement when developing systems or applications integrated  ...  One of the approaches that came up described the creation of a privacy-aware context profile towards context-aware application development [6] .  ... 
doi:10.1109/cbi.2015.44 dblp:conf/wecwis/CaramujoS15 fatcat:zdr6ri6ntbapllgz37jffql4gq

Context-aware service engineering: A survey

Georgia M. Kapitsaki, George N. Prezerakos, Nikolaos D. Tselikas, Iakovos S. Venieris
2009 Journal of Systems and Software  
A representative example is used to illustrate more precisely how these approaches can be used. Finally, all three categories are compared based on a number of criteria.  ...  We enumerate all context management categories, but focus on the most appropriate for service engineering, namely source code level, model-driven and message interception, taking also into account the  ...  Acknowledgements Georgia Kapitsaki is supported by a Greek State Scholarships Foundation grant.  ... 
doi:10.1016/j.jss.2009.02.026 fatcat:tx4e2ggx3vcuxf6ykjl7v7ejpy

A NFP Model for Internet of Things applications

Sabrina Sicari, Alessandra Rizzardi, Alberto Coen-Porisini, Cinzia Cappiello
2014 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)  
Such a model should represent a starting point for the development of IoT privacy-aware solutions, handling data with a well-defined quality.  ...  This work proposes a UML general conceptual model, which defines the entities involved in the IoT context, their relationships, facing privacy policies definition and data quality assessment.  ...  In order to develop privacy-aware services (atomic or composite) using data with a certain level of quality, this paper proposes a general UML conceptual model, which describes and analyzes the privacy  ... 
doi:10.1109/wimob.2014.6962181 dblp:conf/wimob/SicariRCC14 fatcat:zz3w6k5anfb6dmxb3ffqy56qsi

Envisioning Tool Support for Designing Privacy-Aware Internet of Thing Applications [article]

Charith Perera, Mahmoud Barhamgi, Massimo Vecchio
2020 arXiv   pre-print
This paper presents a research vision that argues the importance of developing a privacy-aware IoT application design tool to address the challenges mentioned above.  ...  This tool should not only transform IoT application designs into privacy-aware application designs but also validate and verify them.  ...  In this regard, we propose a usable privacy-aware IoT application design tool which will inform the privacy-aware design choices to the developers.  ... 
arXiv:1908.02724v3 fatcat:nzqmzy6s4favdbfjmd6drpkknm

Computer-Aided Identification and Validation of Privacy Requirements

Rene Meis, Maritta Heisel
2016 Information  
As initial evaluation of our method, we show its applicability on a small electronic health system scenario.  ...  The contribution of this paper is a semi-automatic method to identify the relevant privacy requirements for a software-to-be based on its functional requirements.  ...  First, a collection of UML profiles that allow users to model the needed elements for the method in a single UML model.  ... 
doi:10.3390/info7020028 fatcat:vf4evwhlgzgcpk4yvngtvhcmgm

RC-ASEF: An open-source tool-supported requirements elicitation framework for context-aware systems development

Unai Alegre-Ibarra, Juan Carlos Augusto, Carl Evans
2018 Proceedings of the 2018 Federated Conference on Computer Science and Information Systems  
The proposal is illustrated through the analysis of an application for a European funded project.  ...  The framework follows an end-user, stakeholder-centred vision, which guides the analysis of stakeholders towards the discovery of specific stakeholder profiles and their particular needs, preferences,  ...  requirements profiles such as UML-AT [9] .  ... 
doi:10.15439/2018f136 dblp:conf/fedcsis/IbarraAE18 fatcat:5lnqlbwjhbexjoznphdkuythpe

Biomedical Information Integration Middleware for Clinical Genomics [chapter]

Simona Rabinovici-Cohen
2009 Lecture Notes in Computer Science  
A key enabler of clinical genomics is a sound standards-based biomedical information integration middleware.  ...  Clinical genomics, the marriage of clinical information and knowledge about the human or pathogen genome, holds enormous promise for the healthcare and life sciences domain.  ...  In the MDD approach, the source and target schemas are represented in UMLs, and UML profiles are introduced to extend and constrain UMLs for a particular use.  ... 
doi:10.1007/978-3-642-04941-5_4 fatcat:tywr7shf4ngbladlq33uz6vqvu

A Generic Layered Architecture for Context Aware Applications

Beza Mamo, Dejene Ejigu
2014 Procedia Computer Science  
In this paper a four layered generic architecture is proposed with a recommended components so as to support context awareness for pervasive applications.  ...  implementation section of this article describes how the context reasoning component employee different level of reasoning techniques such as knowledge acquisition, context based rule execution and the application  ...  A layered architecture provides tremendous benefits for the development of context-aware applications.  ... 
doi:10.1016/j.procs.2014.07.085 fatcat:ustje7ltinfqtmur7wbj6udlb4

A Graphical Approach to Risk Identification, Motivated by Empirical Investigations [chapter]

Ida Hogganvik, Ketil Stølen
2006 Lecture Notes in Computer Science  
The development of the language and the guidelines for its use have been based on a combination of empirical investigations and experiences gathered from utilizing the approach in large scale industrial  ...  We propose a graphical approach to identify, explain and document security threats and risk scenarios.  ...  The authors especially thank Mass Soldal Lund for his valuable input. We also thank the SECURIS analysis team: Fredrik Seehusen, Bjørnar Solhaug, Iselin Engan, Gyrd Braendeland and Fredrik Vraalsen.  ... 
doi:10.1007/11880240_40 fatcat:tk53cv54tfb2nk3cxubexfbx4q

HMM: HIPAA Modeling Method for Modeling Security in e-Health

Abdelhay Haqiq, Bouchaib Bounabat
2013 International Journal of Computer and Electrical Engineering  
This information is the base for defining the targeted security system.  ...  Based on UML (Unified Modeling Language) notation, HMM aims at transforming the HIPAA security requirements into models in order to define the process of the implementation of security policies, and therefore  ...  The [19] presents a UML 2.0 profile for secure business process modeling of the health-care system through activity diagrams, the approach allows business analysts to specify security requirements in  ... 
doi:10.7763/ijcee.2013.v5.779 fatcat:2uoa3ojmqzho5ccadrhtqteoqa

Architecting Embedded Software for Context-Aware Systems [chapter]

Susanna Pantsar-Syvniemi
2012 Embedded Systems - Theory and Design Methodology  
Research into pervasive and ubiquitous computing has been ongoing for over a decade, providing many context-aware systems and a multitude of related surveys.  ...  ., predicting future situations to offer relevant services for human beings.  ...  A UML profile describes how UML model elements are extended using stereotypes and tagged values that define additional properties for the elements (France & Rumpe, 2007) .  ... 
doi:10.5772/37634 fatcat:3wia23ocqnbmhc6j364xlqpxfq

ESEM19_Supplementary_Materials [article]

Nitish Patkar
2019 Figshare  
Supplementary material published for ESEM19  ...  UML Profile and Tool Support for Evolutionary Requirements Engineering UML4PF-A tool for problem-oriented requirements analysis T59 DODT 2011 S107 Ontology-driven guidance for requirements elicitation  ...  (PRET) Tool 2008 S93 Computer-aided privacy requirements elicitation technique T31 Story based Mobile Application for Requirements Engineering Process (SMAREP) 2008 S149 Story Based Mobile  ... 
doi:10.6084/m9.figshare.8307089 fatcat:yqiavc3lcjgnrpqiaqvevlirtu

Towards a Classification of Web Service Feature Interactions [chapter]

Michael Weiss, Babak Esfandiari, Yun Luo
2005 Lecture Notes in Computer Science  
In this paper, we outline a classification of web service feature interactions.  ...  As there is no standard set of web services that one could use as examples, we illustrate the interactions using a fictitious e-commerce scenario.  ...  In particular, we want to recognize Yi Lin and Zhiyong Lu for their efforts in coding much of the Amazin prototype, and Alex Oreshkin for his contribution to exploring the use of FSP in various feature  ... 
doi:10.1007/11596141_9 fatcat:7hrhqdrbt5birm2abhah7zr5ti

Towards a classification of web service feature interactions

M. Weiss, B. Esfandiari, Y. Luo
2007 Computer Networks  
In this paper, we outline a classification of web service feature interactions.  ...  As there is no standard set of web services that one could use as examples, we illustrate the interactions using a fictitious e-commerce scenario.  ...  In particular, we want to recognize Yi Lin and Zhiyong Lu for their efforts in coding much of the Amazin prototype, and Alex Oreshkin for his contribution to exploring the use of FSP in various feature  ... 
doi:10.1016/j.comnet.2006.08.003 fatcat:caqntlan7fhvjb5v6jszed3rji

Adaptive Security Schemes based on Context and Trust for Ubiquitous Computing Environment: A Comprehensive Survey

G. Jagadamba, B. Sathish Babu
2017 Indian Journal of Science and Technology  
Many security schemes applied for various applications are considered and evaluated by considering the security credentials such as access control, privacy, and context-awareness.  ...  Findings: The paper identified different taxonomies built for trust, context, policy and adaptive security.  ...  Several research works concentrate on providing the security and privacy for context-aware applications based on policy, contents, profiles, rules, etc., but the context decision in context-aware security  ... 
doi:10.17485/ijst/2016/v9i48/89396 fatcat:xf5kghfkqnh3dg5lfdgzmxrqsq
« Previous Showing results 1 — 15 out of 1,318 results