Configuring Private Data Management as Access Restrictions: From Design to Enforcement - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2012

Configuring Private Data Management as Access Restrictions: From Design to Enforcement

Résumé

Service-Oriented Computing (SOC) is a major trend in designing and implementing distributed computer-based applications. Dynamic late biding makes SOC a very promising way to realize pervasive computing, which promotes the integration of computerized artifacts into the fabric of our daily lives. However, pervasive computing raises new challenges which SOC has not addressed yet. Pervasive application relies on highly dynamic and heterogeneous entities. They also necessitate an important data collection to compute the context of users and process sensitive data. Such data collection and processing raise well-known concerns about data disclosure and use. They are a brake to the development of widely accepted pervasive applications. SOC already permits to impose constraints on the bindings of services. We propose to add a new range of constraints to allow data privatization, i.e. the restriction of their disclosure. We extend the traditional design and binding phases of a Service-Oriented Architecture with the expression and the enforcement of privatization constraints. We express and enforce these constraints according to a two phases model-driven approach. Our work is validated on real-world services.

Dates et versions

hal-00723506 , version 1 (10-08-2012)

Identifiants

Citer

Aurélien Faravelon, Stéphanie Chollet, Christine Verdier, Agnès Front. Configuring Private Data Management as Access Restrictions: From Design to Enforcement. ICSOC 2012 - International Conference on Service-Oriented Computing, Nov 2012, Shanghai, China. pp.344-358, ⟨10.1007/978-3-642-34321-6_23⟩. ⟨hal-00723506⟩
152 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More