Abstract
Distributed mobile applications are increasingly being considered as solutions which provide robustness and performance benefits, especially in contexts such as emergency response systems, where a conventional centralized ICT infrastructure can be rendered inoperative. The information intensive nature of such systems brings to the fore the importance of data distribution through the right workflow channels under conditions of data privacy and short timescales. This paper reports on the early stages of a project aimed at developing a privacy-aware process-level framework for such distributed mobile applications, exemplified through a distributed prototype that can be used to model and manage fire emergency situations in airports. The novelty of the framework arises from modeling, reasoning and generating privacy preserving business processes applicable to distributed mobile information systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Awad, A., Weidlich, M., Weske, M.: Visually specifying compliance rules and explaining their violations for business processes. Journal of Visual Languages & Computing 22(1), 30–55 (2011)
Benatallah, B., Reza, H., Nezhad, H.R.M., Casati, F., Toumani, F., Ponge, J.: Service Mosaic: A Model- Driven Framework for Web Services Life-Cycle Management. IEEE Internet Computing 10(4), 55–63 (2006)
Business Process Modeling notation (BPMN), version 1.2, Object Management Group (OMG) (January 2009)
Brucker, A.D., Hang, I.: Secure and Compliant Implementation of Business Process-Driven Systems. In: La Rosa, M., Soffer, P. (eds.) BPM 2012 Workshops. LNBIP, vol. 132, pp. 662–674. Springer, Heidelberg (2013)
Clarke, R.: Introduction to dataveillance and information privacy, and definitions of terms (1999), http://www.anu.edu.au/people/Roger.Clarke/DV/Intro.html
Decker, G., Overdick, H., Weske, M.: Oryx- Sharing Conceptual Models on the Web. In: Li, Q., Spaccapietra, S., Yu, E., Olivé, A. (eds.) ER 2008. LNCS, vol. 5231, pp. 536–537. Springer, Heidelberg (2008)
Han, R., Liu, K., Ju, Y., Zhao, J.: A Petri net theory-based method for modeling web service-based systems. In: 4th WiCOM, Dalian, China, pp. 1–7 (2008)
He, Q.: Privacy Enforcement with an Extended Role-Based Access Control Model, North Carolina State University at Raleigh, Raleigh, NC (2003)
Hevner, A., March, S., Park, J., Ram, S.: Design Science in Information Systems Research. MIS Quarterly 28(1), 75–106 (2004)
Landau, S.: Security and privacy landscape in emerging technologies. IEEE Security & Privacy 6(4), 74–77 (2008)
Landgren, J., Nulden, U.: A study of emergency response work: patterns of mobile phone interaction. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1323–1332 (2007)
Poulovassilis, A., Papamarkos, G., Wood, P.T.: Event-condition-action rule languages for the semantic web. In: Grust, T., et al. (eds.) EDBT 2006 Workshops. LNCS, vol. 4254, pp. 855–864. Springer, Heidelberg (2006)
Peterson, J.L.: Petri net theory and the modeling of systems. Prentice-Hall (1981)
Pearson, S.: Taking Account of Privacy When Designing Cloud Computing Services. In: ICSE Workshop on Software Engineering Challenges of Cloud Computing, CLOUD 2009, pp. 44–52 (2009)
Rodríguez, A., Fernández-Medina, E., Piattini, M.: A BPMN Extension for the Modeling of Security Requirements in Business Processes. IEICE - Transactions on Information and Systems E90-D(4), 745–752 (2007)
Russell, N., van der Aalst, W.M.P., ter Hofstede, A.H.M., Wohed, P.: On the Suitability of UML 2.0 Activity Diagrams for Business Process Modelling. In: Third Asia-Pacific Conference on Conceptual Modelling (APCCM 2006). CRPIT, vol. 53, pp. 95–104 (2006)
Song, Y.J., Lee, D.H., Yim, J.G., Nam, T.Y.: Privacy Aware Adaptable Web Services Using Petri Nets. In: Proceedings of the 2007 International Conference on Convergence Information Technology (ICCIT 2007), pp. 1933–1938. IEEE Computer Society, Washington, DC (2007)
Semantic Web Rule Language (SWRL) (May 2004), http://www.w3.org/Submission/SWRL/
Tanasescu, V., Gugliotta, A., Domingue, J., Davies, R., Gutiérrez-Villarías, L., Rowlatt, M., Richardson, M., Stinčić, S.: A semantic web services GIS based emergency management application. In: Cruz, I., Decker, S., Allemang, D., Preist, C., Schwabe, D., Mika, P., Uschold, M., Aroyo, L.M. (eds.) ISWC 2006. LNCS, vol. 4273, pp. 959–966. Springer, Heidelberg (2006)
Thomas, M., Andoh-Baidoo, F., George, S.: Evresponse - moving beyond traditional emergency response notification. In: Proceedings of the Eleventh Americas Conference on Information Systems (2005)
van der Aalst, W.M.P., ter Hofstede, A.H.M., Weske, M.: Business Process Management: A Survey. In: van der Aalst, W.M.P., Weske, M. (eds.) BPM 2003. LNCS, vol. 2678, pp. 1–12. Springer, Heidelberg (2003)
Van der Aalst, W.M.P.: Formalization and verification of event-driven process chains Inform. Software Technol. 41(10), 639–650 (1999)
Xiaofeng, Y., Sommestad, T., Fung, C., Hung, P.C.K.: Emergency Response Framework for Aviation XML Services on MANET. In: Web Services, ICWS 2008, pp. 304-311 (2008)
Xu, W., Zlatanova, S.: Ontologies for Disaster Management Response. In: Li, J., Zlatanova, S., Fabbri, A. (eds.) Geomatics Solutions for Disaster Management, pp. 185–200 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer International Publishing Switzerland
About this paper
Cite this paper
Labda, W., Mehandjiev, N., Sampaio, P. (2013). Privacy-Aware Business Processes Modeling Notation (PrvBPMN) in the Context of Distributed Mobile Applications. In: Matera, M., Rossi, G. (eds) Trends in Mobile Web Information Systems. MobiWIS 2013. Communications in Computer and Information Science, vol 183. Springer, Cham. https://doi.org/10.1007/978-3-319-03737-0_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-03737-0_13
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-03736-3
Online ISBN: 978-3-319-03737-0
eBook Packages: Computer ScienceComputer Science (R0)