Designing Privacy-Enhancing Mobile Applications

@inproceedings{Decroix2011DesigningPM,
  title={Designing Privacy-Enhancing Mobile Applications},
  author={Koen Decroix and Bart De Decker and Vincent Naessens},
  booktitle={PrimeLife},
  year={2011}
}
This paper evaluates the multi-paradigm modelling methodology for designing controlled anonymous applications, like applications that use trap-door anonymity. The methodology is applied to a class of mobile applications with strong security and privacy requirements. From this study, we detect the constraints in the existing methodology in the context of mobile applications, explore the solution space and define directions for research. Moreover, a first iteration of the realization of the… 
1 Citations
Model-Based Analysis of Privacy in Electronic Services
TLDR
This dissertation presents a logic based modeling approach to inspect privacy in composite electronic services from different viewpoints in data protection, and extracts profiles, containing a set of personal data that can be compiled by service providers after a user has interacted with a particular service provider.

References

SHOWING 1-9 OF 9 REFERENCES
A Methodology for Designing Controlled Anonymous Applications
TLDR
A methodology for designing controlled anonymous environments is presented that generates a conceptual model that compromises between privacy requirements and control requirements and easily maps to control mechanisms.
A Fair Anonymous Submission and Review System
TLDR
This paper presents a fair anonymous submission and review system that provides better anonymity properties than existing reputation systems, and allows for accountability measures.
Communications and Multimedia Security
We propose to establish a standardised tool in fingerprint recognition robustness assessment, which is able to simulate a wide class of acquisition conditions, applicable to any given dataset and
Modular synthesis of mobile device applications from domain-specific models
TLDR
This work proposes a more structured approach to artifact generation where layered model transformations are used to modularly isolate, compile and re-combine various aspects of DSms.
An introduction to multi-paradigm modelling and simulation.
TLDR
The article first introduces the general concepts of Modelling and Simulation theory, and explains how rigourous application thereof provides a sound basis for the meaningful exchange and re-use of knowledge about the behaviour of complex systems.
Modelling Recursive Calls with UML State Diagrams
TLDR
It is shown that this can lead to anomalous behaviour, and in particular that it is not possible to model recursive calls, in which an object receives a second message whilst still in the process of reacting to the first.
AToM3: A Tool for Multi-formalism and Meta-modelling
TLDR
The combined use of multiformalism modelling and meta-modelling is introduced to facilitate computer assisted modelling of complex systems to aid in the automatic generation of multi-formalism modelling tools.
AToM 3 : A tool for multi-formalism and metamodelling
  • Fundamental Approaches to Software Engineering
  • 2002