Privacy-Aware Business Processes Modeling Notation (PrvBPMN) in the Context of Distributed Mobile Applications: Communications in Computer and Information Science

Research output: Chapter in Book/Conference proceedingChapter

Abstract

Distributed mobile applications are increasingly being considered as solutions which provide robustness and performance benefits, especially in contexts such as emergency response systems, where a conventional centralized ICT infrastructure can be rendered inoperative. The information intensive nature of such systems brings to the fore the importance of data distribution through the right workflow channels under conditions of data privacy and short timescales. This paper reports on the early stages of a project aimed at developing a privacy-aware process-level framework for such distributed mobile applications, exemplified through a distributed prototype that can be used to model and manage fire emergency situations in airports. The novelty of the framework arises from modeling, reasoning and generating privacy preserving business processes applicable to distributed mobile information systems. © Springer International Publishing Switzerland 2013.
Original languageEnglish
Title of host publicationCommunications in Computer and Information Science|Commun. Comput. Info. Sci.
Subtitle of host publicationTrends in Mobile Web Information Systems
PublisherSpringer Nature
Pages120-134
Number of pages14
Volume183
DOIs
Publication statusPublished - 2013
EventInternational Conference on Mobile Web Information Systems, MobiWIS 2013 - Paphos
Duration: 1 Jul 2013 → …
http://www.springer.com/series/7899

Other

OtherInternational Conference on Mobile Web Information Systems, MobiWIS 2013
CityPaphos
Period1/07/13 → …
Internet address

Keywords

  • BPMN
  • privacy modelling
  • privacy-aware
  • service-based

Fingerprint

Dive into the research topics of 'Privacy-Aware Business Processes Modeling Notation (PrvBPMN) in the Context of Distributed Mobile Applications: Communications in Computer and Information Science'. Together they form a unique fingerprint.

Cite this