PIPER: A Framework for Exploring the Privacy Implications of Pervasive Computing Applications in Their Physical Environments

Pervasive computing presents profound privacy risks for end users because its capabilities to monitor, control, and interact with the physical world. As a first step to support early evaluation of potential privacy violations, we introduce PIPER, a framework for the systematic modeling, analysis, an...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Babbitt, R., Hen-I Yang, Wong, J.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 171
container_issue
container_start_page 166
container_title
container_volume
creator Babbitt, R.
Hen-I Yang
Wong, J.
description Pervasive computing presents profound privacy risks for end users because its capabilities to monitor, control, and interact with the physical world. As a first step to support early evaluation of potential privacy violations, we introduce PIPER, a framework for the systematic modeling, analysis, and exploration of Privacy Implications in PERvasive computing systems and their physical environments. UML/OCL is used to model important structures and behaviors of these systems as well as data flow properties and privacy requirements. This framework facilitates consideration and explicit specification of the effects of actions in the physical environment and the tracing of data flow through both cyber and physical components of the system. Using this framework, privacy analysts and software engineers can communicate more objectively about privacy-related issues, identify faults in application logic, and examine the impact that changes to either applications or physical environments have on personal privacy in pervasive systems.
doi_str_mv 10.1109/SAINT.2012.31
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6305276</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6305276</ieee_id><sourcerecordid>6305276</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-8c38f90fda5541444644f5adc567906906def64b659c7b3d60e2add069b6f6403</originalsourceid><addsrcrecordid>eNpNjE1Lw0AYhFdEUGuPnrzsH2h9N_uV9RZKWgNFg-ZetsmuXc0XuzFa8Mcb0YPDwMAzwyB0TWBJCKjb5yR7KJYRkGhJyQmaKxmDFIozSSU7RZeECUkjAELP0TyEV5gUE0koXKCvPMvTpzuc4LXXjfno_Bu2ncfpZ1933rUveDgYnHs36vKIs6avXakH17UBdxbnxo86uNHgVdf078PPPun_bVyLi4NxHueHY5hojdN2dL5rG9MO4QqdWV0HM__LGSrWabG6X2wfN9kq2S6cgmERlzS2CmylOWeEMSYYs1xXJRdSgZhcGSvYXnBVyj2tBJhIV9XU7MXEgc7Qze-tM8bseu8a7Y87QYFHUtBvCvBfFA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>PIPER: A Framework for Exploring the Privacy Implications of Pervasive Computing Applications in Their Physical Environments</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Babbitt, R. ; Hen-I Yang ; Wong, J.</creator><creatorcontrib>Babbitt, R. ; Hen-I Yang ; Wong, J.</creatorcontrib><description>Pervasive computing presents profound privacy risks for end users because its capabilities to monitor, control, and interact with the physical world. As a first step to support early evaluation of potential privacy violations, we introduce PIPER, a framework for the systematic modeling, analysis, and exploration of Privacy Implications in PERvasive computing systems and their physical environments. UML/OCL is used to model important structures and behaviors of these systems as well as data flow properties and privacy requirements. This framework facilitates consideration and explicit specification of the effects of actions in the physical environment and the tracing of data flow through both cyber and physical components of the system. Using this framework, privacy analysts and software engineers can communicate more objectively about privacy-related issues, identify faults in application logic, and examine the impact that changes to either applications or physical environments have on personal privacy in pervasive systems.</description><identifier>ISBN: 1467320013</identifier><identifier>ISBN: 9781467320016</identifier><identifier>EISBN: 9780769547374</identifier><identifier>EISBN: 0769547370</identifier><identifier>DOI: 10.1109/SAINT.2012.31</identifier><identifier>CODEN: IEEPAD</identifier><language>eng</language><publisher>IEEE</publisher><subject>Analytical models ; Computational modeling ; cyber-physical systems ; data flow ; Data models ; Data privacy ; Object oriented modeling ; OCL ; pervasive computing ; Privacy ; privacy analysis ; UML ; Unified modeling language</subject><ispartof>2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, 2012, p.166-171</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6305276$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6305276$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Babbitt, R.</creatorcontrib><creatorcontrib>Hen-I Yang</creatorcontrib><creatorcontrib>Wong, J.</creatorcontrib><title>PIPER: A Framework for Exploring the Privacy Implications of Pervasive Computing Applications in Their Physical Environments</title><title>2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet</title><addtitle>saint</addtitle><description>Pervasive computing presents profound privacy risks for end users because its capabilities to monitor, control, and interact with the physical world. As a first step to support early evaluation of potential privacy violations, we introduce PIPER, a framework for the systematic modeling, analysis, and exploration of Privacy Implications in PERvasive computing systems and their physical environments. UML/OCL is used to model important structures and behaviors of these systems as well as data flow properties and privacy requirements. This framework facilitates consideration and explicit specification of the effects of actions in the physical environment and the tracing of data flow through both cyber and physical components of the system. Using this framework, privacy analysts and software engineers can communicate more objectively about privacy-related issues, identify faults in application logic, and examine the impact that changes to either applications or physical environments have on personal privacy in pervasive systems.</description><subject>Analytical models</subject><subject>Computational modeling</subject><subject>cyber-physical systems</subject><subject>data flow</subject><subject>Data models</subject><subject>Data privacy</subject><subject>Object oriented modeling</subject><subject>OCL</subject><subject>pervasive computing</subject><subject>Privacy</subject><subject>privacy analysis</subject><subject>UML</subject><subject>Unified modeling language</subject><isbn>1467320013</isbn><isbn>9781467320016</isbn><isbn>9780769547374</isbn><isbn>0769547370</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2012</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpNjE1Lw0AYhFdEUGuPnrzsH2h9N_uV9RZKWgNFg-ZetsmuXc0XuzFa8Mcb0YPDwMAzwyB0TWBJCKjb5yR7KJYRkGhJyQmaKxmDFIozSSU7RZeECUkjAELP0TyEV5gUE0koXKCvPMvTpzuc4LXXjfno_Bu2ncfpZ1933rUveDgYnHs36vKIs6avXakH17UBdxbnxo86uNHgVdf078PPPun_bVyLi4NxHueHY5hojdN2dL5rG9MO4QqdWV0HM__LGSrWabG6X2wfN9kq2S6cgmERlzS2CmylOWeEMSYYs1xXJRdSgZhcGSvYXnBVyj2tBJhIV9XU7MXEgc7Qze-tM8bseu8a7Y87QYFHUtBvCvBfFA</recordid><startdate>201207</startdate><enddate>201207</enddate><creator>Babbitt, R.</creator><creator>Hen-I Yang</creator><creator>Wong, J.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201207</creationdate><title>PIPER: A Framework for Exploring the Privacy Implications of Pervasive Computing Applications in Their Physical Environments</title><author>Babbitt, R. ; Hen-I Yang ; Wong, J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-8c38f90fda5541444644f5adc567906906def64b659c7b3d60e2add069b6f6403</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Analytical models</topic><topic>Computational modeling</topic><topic>cyber-physical systems</topic><topic>data flow</topic><topic>Data models</topic><topic>Data privacy</topic><topic>Object oriented modeling</topic><topic>OCL</topic><topic>pervasive computing</topic><topic>Privacy</topic><topic>privacy analysis</topic><topic>UML</topic><topic>Unified modeling language</topic><toplevel>online_resources</toplevel><creatorcontrib>Babbitt, R.</creatorcontrib><creatorcontrib>Hen-I Yang</creatorcontrib><creatorcontrib>Wong, J.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Babbitt, R.</au><au>Hen-I Yang</au><au>Wong, J.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>PIPER: A Framework for Exploring the Privacy Implications of Pervasive Computing Applications in Their Physical Environments</atitle><btitle>2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet</btitle><stitle>saint</stitle><date>2012-07</date><risdate>2012</risdate><spage>166</spage><epage>171</epage><pages>166-171</pages><isbn>1467320013</isbn><isbn>9781467320016</isbn><eisbn>9780769547374</eisbn><eisbn>0769547370</eisbn><coden>IEEPAD</coden><abstract>Pervasive computing presents profound privacy risks for end users because its capabilities to monitor, control, and interact with the physical world. As a first step to support early evaluation of potential privacy violations, we introduce PIPER, a framework for the systematic modeling, analysis, and exploration of Privacy Implications in PERvasive computing systems and their physical environments. UML/OCL is used to model important structures and behaviors of these systems as well as data flow properties and privacy requirements. This framework facilitates consideration and explicit specification of the effects of actions in the physical environment and the tracing of data flow through both cyber and physical components of the system. Using this framework, privacy analysts and software engineers can communicate more objectively about privacy-related issues, identify faults in application logic, and examine the impact that changes to either applications or physical environments have on personal privacy in pervasive systems.</abstract><pub>IEEE</pub><doi>10.1109/SAINT.2012.31</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 1467320013
ispartof 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, 2012, p.166-171
issn
language eng
recordid cdi_ieee_primary_6305276
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Analytical models
Computational modeling
cyber-physical systems
data flow
Data models
Data privacy
Object oriented modeling
OCL
pervasive computing
Privacy
privacy analysis
UML
Unified modeling language
title PIPER: A Framework for Exploring the Privacy Implications of Pervasive Computing Applications in Their Physical Environments
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T22%3A33%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=PIPER:%20A%20Framework%20for%20Exploring%20the%20Privacy%20Implications%20of%20Pervasive%20Computing%20Applications%20in%20Their%20Physical%20Environments&rft.btitle=2012%20IEEE/IPSJ%2012th%20International%20Symposium%20on%20Applications%20and%20the%20Internet&rft.au=Babbitt,%20R.&rft.date=2012-07&rft.spage=166&rft.epage=171&rft.pages=166-171&rft.isbn=1467320013&rft.isbn_list=9781467320016&rft.coden=IEEPAD&rft_id=info:doi/10.1109/SAINT.2012.31&rft_dat=%3Cieee_6IE%3E6305276%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9780769547374&rft.eisbn_list=0769547370&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6305276&rfr_iscdi=true