[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/358916.358963acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
Article
Free access

Ensuring privacy in presence awareness: an automated verification approach

Published: 01 December 2000 Publication History

Abstract

Providing information about other users and their activites is a central function of many collaborative applications. The data that provide this "presence awareness" are usually automatically generated and highly dynamic. For example, services such as AOL Instant Messenger allow users to observe the status of one another and to initiate and participate in chat sessions. As such services become more powerful, privacy and security issues regarding access to sensitive user data become critical. Two key software engineering challenges arise in this context:
Policies regarding access to data in collaborative applications have subtle complexities, and must be easily modifiable during a collaboration.
Users must be able to have a high degree of confidence that the implementations of these policies are correct.
In this paper, we propose a framework that uses an automated verification approach to ensure that such systems conform to complex policies. Our approach takes advantage of VeriSoft, a recent tool for systematically testing implementations of concurrent systems, and is applicable to a wide variety of specification and development platforms for collaborative applications. we illustrate the key features of our framework by applying it to the development of a presence awareness system.

References

[1]
G. D. Abowd. Software engineering issues for ubiquitous computing. In International Conference on Software Engineering, 1999.
[2]
B. Alpern and F. B. Schneider. Recognizing safety and liveness. Distributed Computing, 2:117-126, 1987.
[3]
V. Bellotti, A. Blandford, D. Duke, A. MacLean, J. May, and L. Nigay. Interpersonal access control in computermediated communications: A systematic analysis of the design space. Human-Computer Interaction, 11:357- 432, 1996.
[4]
A. Bullock and S. Benford. An access control framework for multi-user collaborative environments. In Proceedings GROUP '99, pages 140-149, Phoenix, AZ, November 1999.
[5]
R. Cleaveland, J. Parrow, and B. Steffen. The concurrency workbench: A semantics based tool for the verification of concurrent systems. ACM Transactions on Programming Languages and Systems, 1(15):36-72, 1993.
[6]
C. Colby, L. J. Jagadeesan, R. Jagadeesan, K. L~aufer, and C. Puchol. Objects and concurrency in Triveni: A telecommunication case study in Java. In 4th USENIX Conference on Object Oriented Technologies and Systems, April 1998.
[7]
W. K. Edwards. Policies and roles in collaborative applications. In Proc. of ACM Conf. on CSCW, 1996.
[8]
J. Fernandez, H. Garavel, L. Mounier, A. Rasse, C. Rodriguez, and J. Sifakis. A toolbox for the verification of LOTOS programs. In International Conference on Software Engineering, May 1992.
[9]
L. Fuchs. Area: A cross-application notification service for groupware. In Proceedings of the Sixth European Conference on Computer-supported Cooperative Work, pages 61-80, Copenhagen, Denmark, September 1999.
[10]
B. Gaver, T. Moran, A. MacLean, L. Levstrand, P. Dourish, K. Carter, and B. Buxton. Realizing a video environment: Europarc's rave system. In Conference on Human Factors in Computing Systems, 1992.
[11]
P. Godefroid. Model Checking for Programming Languages using VeriSoft. In ACM Symposium on Principles of Programming Languages, pages 174-186, January 1997.
[12]
P. Godefroid, R. S. Hanmer, and L. J. Jagadeesan. Model Checking Without a Model: An Analysis of the Heart- Beat Monitor of a Telephone Switch using VeriSoft. In ACM SIGSOFT International Symposium on Software Testing and Analysis, March 1998.
[13]
J. Grudin. Why cscw applications fail: Problems in the design and evaluation of organizational interfaces. In Conference on Computer-Supported Cooperative Work CSCW '88, 1988.
[14]
J. D. Herbsleb and R. E. Grinter. Architectures, coordination, and distance: Conway's law and beyond. IEEE Software, pages 63-70, Sept/Oct 1999.
[15]
D. Hindus, M. S. Ackerman, S. Mainwaring, and B. Starr. Thunderwire: A field study of an audioonly media space. In Computer Supported Cooperative Work, 1996.
[16]
G. J. Holzmann. Design and Validation of Computer Protocols. Prentice Hall, 1991.
[17]
S. E. Hudson and I. Smith. Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems. In Computer Supported Cooperative Work, 1996.
[18]
D. Li and R. R. Muntz. Coca: Collaborative objects coordination architecture. In Proceedings of ACM CSCW, Nov. 1998.
[19]
D. Li and R. R. Muntz. A collaboration specification language. In Proceedings of the 2nd USENIX Conference on Domain Specific Languages, Oct 1999.
[20]
Z. Manna and A. Pnueli. The Temporal Logic of Reactive and Concurrent Systems, Specification. Springer- Verlag, 1992.
[21]
M. Mantei, R. Baecker, A. Sellen, W. Buxton, T. Milligan, and B. Wellman. Experience in the use of a media space. In Proceedings of the CHI'91 Conference on Human Factors in Computing Systems, pages 203-208, 1991.
[22]
S. E. McDaniel, G. M. Olson, and J. C. Magee. Identifying and analyzing multiple threads in computermediated and face-to-face conversations. In Computer Supported Cooperative Work, 1996.
[23]
T. Nomura, K. Hayashi, T. Hazama, and S. Gudmundson. Interlocus: Workspace configuration mechanisms for activity awareness. In Computer Supported Cooperative Work, 1998.
[24]
L. Palen. Social, individual, and technological issues for groupware calendar systems. In CHI'99, 1999.
[25]
W. Prinz. Nessie: An awareness environment for cooperative settings. In European Conference on Computer Supported Cooperative Work, 1999.
[26]
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, Feb. 1996.
[27]
H. Shen and P. Dewan. Access control for collaborative systems. In Proc. of ACM Conf. on CSCW, 1992.
[28]
M. Vardi and P. Wolper. An automata-theoretic approach to automatic program verification. In First Symposium on Logic in Computer Science, pages 322-331, June 1986.
[29]
R. Want, A. Hopper, V. Falcao, and J. Gibbons. The active badge location system. ACM Transactions on Information Systems, 10(1):91-102, 1992.
[30]
E. Zaret. Upstart in the instant messager war. MSNBC, 1999.
[31]
Q. A. Zhao and J. T. Stasko. Evaluating image filtering based techniques in media space applications. In Proceedings of ACM CSCW, Nov 1998.

Cited By

View all
  • (2020)Not Too Much, Nor Too LessCompanion Publication of the 2020 Conference on Computer Supported Cooperative Work and Social Computing10.1145/3406865.3418308(239-243)Online publication date: 17-Oct-2020
  • (2019)Smile to MeProceedings of Mensch und Computer 201910.1145/3340764.3340795(373-385)Online publication date: 8-Sep-2019
  • (2016)Monitoring and Trust in Virtual TeamsProceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing10.1145/2818048.2820076(245-259)Online publication date: 27-Feb-2016
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CSCW '00: Proceedings of the 2000 ACM conference on Computer supported cooperative work
December 2000
346 pages
ISBN:1581132220
DOI:10.1145/358916
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 December 2000

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. computer-supported cooperative work
  2. coordination
  3. presence awareness
  4. privacy
  5. security
  6. verification

Qualifiers

  • Article

Conference

CSCW00
CSCW00: Computer Supported Cooperative Work
Pennsylvania, Philadelphia, USA

Acceptance Rates

CSCW '00 Paper Acceptance Rate 36 of 199 submissions, 18%;
Overall Acceptance Rate 2,235 of 8,521 submissions, 26%

Upcoming Conference

CSCW '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)75
  • Downloads (Last 6 weeks)5
Reflects downloads up to 20 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2020)Not Too Much, Nor Too LessCompanion Publication of the 2020 Conference on Computer Supported Cooperative Work and Social Computing10.1145/3406865.3418308(239-243)Online publication date: 17-Oct-2020
  • (2019)Smile to MeProceedings of Mensch und Computer 201910.1145/3340764.3340795(373-385)Online publication date: 8-Sep-2019
  • (2016)Monitoring and Trust in Virtual TeamsProceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing10.1145/2818048.2820076(245-259)Online publication date: 27-Feb-2016
  • (2014)Automatic handling of native methods in Java PathFinderProceedings of the 2014 International SPIN Symposium on Model Checking of Software10.1145/2632362.2632363(97-100)Online publication date: 21-Jul-2014
  • (2012)Social transparency in networked information exchangeProceedings of the ACM 2012 conference on Computer Supported Cooperative Work10.1145/2145204.2145275(451-460)Online publication date: 11-Feb-2012
  • (2012)Universal access to awareness information: using smart artefacts to mediate awareness in distributed teamsUniversal Access in the Information Society10.1007/s10209-011-0237-911:3(259-271)Online publication date: 1-Aug-2012
  • (2010)Awareness support in global software developmentProceedings of the 16th international conference on Collaboration and technology10.5555/1887532.1887552(185-201)Online publication date: 20-Sep-2010
  • (2010)MHS: a context‐enabled regulated framework for pervasive servicesInternational Journal of Pervasive Computing and Communications10.1108/174273710110332806:1(47-87)Online publication date: 6-Apr-2010
  • (2010)Efficient Authorization of Rich Presence Using Secure and Composed Web ServicesWeb Information Systems and Technologies10.1007/978-3-642-12436-5_4(44-57)Online publication date: 2010
  • (2008)Towards Enhanced Presence FilteringProceedings of the 2008 12th Enterprise Distributed Object Computing Conference Workshops10.1109/EDOCW.2008.61(159-166)Online publication date: 16-Sep-2008
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media