Nothing Special   »   [go: up one dir, main page]

Skip to main content

Privacy-Aware Business Processes Modeling Notation (PrvBPMN) in the Context of Distributed Mobile Applications

  • Conference paper
Trends in Mobile Web Information Systems (MobiWIS 2013)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 183))

Included in the following conference series:

Abstract

Distributed mobile applications are increasingly being considered as solutions which provide robustness and performance benefits, especially in contexts such as emergency response systems, where a conventional centralized ICT infrastructure can be rendered inoperative. The information intensive nature of such systems brings to the fore the importance of data distribution through the right workflow channels under conditions of data privacy and short timescales. This paper reports on the early stages of a project aimed at developing a privacy-aware process-level framework for such distributed mobile applications, exemplified through a distributed prototype that can be used to model and manage fire emergency situations in airports. The novelty of the framework arises from modeling, reasoning and generating privacy preserving business processes applicable to distributed mobile information systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Awad, A., Weidlich, M., Weske, M.: Visually specifying compliance rules and explaining their violations for business processes. Journal of Visual Languages & Computing 22(1), 30–55 (2011)

    Article  Google Scholar 

  2. Benatallah, B., Reza, H., Nezhad, H.R.M., Casati, F., Toumani, F., Ponge, J.: Service Mosaic: A Model- Driven Framework for Web Services Life-Cycle Management. IEEE Internet Computing 10(4), 55–63 (2006)

    Article  Google Scholar 

  3. Business Process Modeling notation (BPMN), version 1.2, Object Management Group (OMG) (January 2009)

    Google Scholar 

  4. Brucker, A.D., Hang, I.: Secure and Compliant Implementation of Business Process-Driven Systems. In: La Rosa, M., Soffer, P. (eds.) BPM 2012 Workshops. LNBIP, vol. 132, pp. 662–674. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  5. Clarke, R.: Introduction to dataveillance and information privacy, and definitions of terms (1999), http://www.anu.edu.au/people/Roger.Clarke/DV/Intro.html

  6. Decker, G., Overdick, H., Weske, M.: Oryx- Sharing Conceptual Models on the Web. In: Li, Q., Spaccapietra, S., Yu, E., Olivé, A. (eds.) ER 2008. LNCS, vol. 5231, pp. 536–537. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  7. Han, R., Liu, K., Ju, Y., Zhao, J.: A Petri net theory-based method for modeling web service-based systems. In: 4th WiCOM, Dalian, China, pp. 1–7 (2008)

    Google Scholar 

  8. He, Q.: Privacy Enforcement with an Extended Role-Based Access Control Model, North Carolina State University at Raleigh, Raleigh, NC (2003)

    Google Scholar 

  9. Hevner, A., March, S., Park, J., Ram, S.: Design Science in Information Systems Research. MIS Quarterly 28(1), 75–106 (2004)

    Google Scholar 

  10. Landau, S.: Security and privacy landscape in emerging technologies. IEEE Security & Privacy 6(4), 74–77 (2008)

    Article  Google Scholar 

  11. Landgren, J., Nulden, U.: A study of emergency response work: patterns of mobile phone interaction. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1323–1332 (2007)

    Google Scholar 

  12. Poulovassilis, A., Papamarkos, G., Wood, P.T.: Event-condition-action rule languages for the semantic web. In: Grust, T., et al. (eds.) EDBT 2006 Workshops. LNCS, vol. 4254, pp. 855–864. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  13. Peterson, J.L.: Petri net theory and the modeling of systems. Prentice-Hall (1981)

    Google Scholar 

  14. Pearson, S.: Taking Account of Privacy When Designing Cloud Computing Services. In: ICSE Workshop on Software Engineering Challenges of Cloud Computing, CLOUD 2009, pp. 44–52 (2009)

    Google Scholar 

  15. Rodríguez, A., Fernández-Medina, E., Piattini, M.: A BPMN Extension for the Modeling of Security Requirements in Business Processes. IEICE - Transactions on Information and Systems E90-D(4), 745–752 (2007)

    Article  Google Scholar 

  16. Russell, N., van der Aalst, W.M.P., ter Hofstede, A.H.M., Wohed, P.: On the Suitability of UML 2.0 Activity Diagrams for Business Process Modelling. In: Third Asia-Pacific Conference on Conceptual Modelling (APCCM 2006). CRPIT, vol. 53, pp. 95–104 (2006)

    Google Scholar 

  17. Song, Y.J., Lee, D.H., Yim, J.G., Nam, T.Y.: Privacy Aware Adaptable Web Services Using Petri Nets. In: Proceedings of the 2007 International Conference on Convergence Information Technology (ICCIT 2007), pp. 1933–1938. IEEE Computer Society, Washington, DC (2007)

    Chapter  Google Scholar 

  18. Semantic Web Rule Language (SWRL) (May 2004), http://www.w3.org/Submission/SWRL/

  19. Tanasescu, V., Gugliotta, A., Domingue, J., Davies, R., Gutiérrez-Villarías, L., Rowlatt, M., Richardson, M., Stinčić, S.: A semantic web services GIS based emergency management application. In: Cruz, I., Decker, S., Allemang, D., Preist, C., Schwabe, D., Mika, P., Uschold, M., Aroyo, L.M. (eds.) ISWC 2006. LNCS, vol. 4273, pp. 959–966. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  20. Thomas, M., Andoh-Baidoo, F., George, S.: Evresponse - moving beyond traditional emergency response notification. In: Proceedings of the Eleventh Americas Conference on Information Systems (2005)

    Google Scholar 

  21. van der Aalst, W.M.P., ter Hofstede, A.H.M., Weske, M.: Business Process Management: A Survey. In: van der Aalst, W.M.P., Weske, M. (eds.) BPM 2003. LNCS, vol. 2678, pp. 1–12. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  22. Van der Aalst, W.M.P.: Formalization and verification of event-driven process chains Inform. Software Technol. 41(10), 639–650 (1999)

    Article  Google Scholar 

  23. Xiaofeng, Y., Sommestad, T., Fung, C., Hung, P.C.K.: Emergency Response Framework for Aviation XML Services on MANET. In: Web Services, ICWS 2008, pp. 304-311 (2008)

    Google Scholar 

  24. Xu, W., Zlatanova, S.: Ontologies for Disaster Management Response. In: Li, J., Zlatanova, S., Fabbri, A. (eds.) Geomatics Solutions for Disaster Management, pp. 185–200 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer International Publishing Switzerland

About this paper

Cite this paper

Labda, W., Mehandjiev, N., Sampaio, P. (2013). Privacy-Aware Business Processes Modeling Notation (PrvBPMN) in the Context of Distributed Mobile Applications. In: Matera, M., Rossi, G. (eds) Trends in Mobile Web Information Systems. MobiWIS 2013. Communications in Computer and Information Science, vol 183. Springer, Cham. https://doi.org/10.1007/978-3-319-03737-0_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-03737-0_13

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-03736-3

  • Online ISBN: 978-3-319-03737-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics