skip to main content
10.1145/358916.358963acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
Article
Free Access

Ensuring privacy in presence awareness: an automated verification approach

Published:01 December 2000Publication History

ABSTRACT

Providing information about other users and their activites is a central function of many collaborative applications. The data that provide this "presence awareness" are usually automatically generated and highly dynamic. For example, services such as AOL Instant Messenger allow users to observe the status of one another and to initiate and participate in chat sessions. As such services become more powerful, privacy and security issues regarding access to sensitive user data become critical. Two key software engineering challenges arise in this context:

Policies regarding access to data in collaborative applications have subtle complexities, and must be easily modifiable during a collaboration.

Users must be able to have a high degree of confidence that the implementations of these policies are correct.

In this paper, we propose a framework that uses an automated verification approach to ensure that such systems conform to complex policies. Our approach takes advantage of VeriSoft, a recent tool for systematically testing implementations of concurrent systems, and is applicable to a wide variety of specification and development platforms for collaborative applications. we illustrate the key features of our framework by applying it to the development of a presence awareness system.

References

  1. 1.G. D. Abowd. Software engineering issues for ubiquitous computing. In International Conference on Software Engineering, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.B. Alpern and F. B. Schneider. Recognizing safety and liveness. Distributed Computing, 2:117-126, 1987.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3.V. Bellotti, A. Blandford, D. Duke, A. MacLean, J. May, and L. Nigay. Interpersonal access control in computermediated communications: A systematic analysis of the design space. Human-Computer Interaction, 11:357- 432, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4.A. Bullock and S. Benford. An access control framework for multi-user collaborative environments. In Proceedings GROUP '99, pages 140-149, Phoenix, AZ, November 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.R. Cleaveland, J. Parrow, and B. Steffen. The concurrency workbench: A semantics based tool for the verification of concurrent systems. ACM Transactions on Programming Languages and Systems, 1(15):36-72, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.C. Colby, L. J. Jagadeesan, R. Jagadeesan, K. L~aufer, and C. Puchol. Objects and concurrency in Triveni: A telecommunication case study in Java. In 4th USENIX Conference on Object Oriented Technologies and Systems, April 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.W. K. Edwards. Policies and roles in collaborative applications. In Proc. of ACM Conf. on CSCW, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.J. Fernandez, H. Garavel, L. Mounier, A. Rasse, C. Rodriguez, and J. Sifakis. A toolbox for the verification of LOTOS programs. In International Conference on Software Engineering, May 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.L. Fuchs. Area: A cross-application notification service for groupware. In Proceedings of the Sixth European Conference on Computer-supported Cooperative Work, pages 61-80, Copenhagen, Denmark, September 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10.B. Gaver, T. Moran, A. MacLean, L. Levstrand, P. Dourish, K. Carter, , and B. Buxton. Realizing a video environment: Europarc's rave system. In Conference on Human Factors in Computing Systems, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11.P. Godefroid. Model Checking for Programming Languages using VeriSoft. In ACM Symposium on Principles of Programming Languages, pages 174-186, January 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.P. Godefroid, R. S. Hanmer, and L. J. Jagadeesan. Model Checking Without a Model: An Analysis of the Heart- Beat Monitor of a Telephone Switch using VeriSoft. In ACM SIGSOFT International Symposium on Software Testing and Analysis, March 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13.J. Grudin. Why cscw applications fail: Problems in the design and evaluation of organizational interfaces. In Conference on Computer-Supported Cooperative Work CSCW '88, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. 14.J. D. Herbsleb and R. E. Grinter. Architectures, coordination, and distance: Conway's law and beyond. IEEE Software, pages 63-70, Sept/Oct 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. 15.D. Hindus, M. S. Ackerman, S. Mainwaring, and B. Starr. Thunderwire: A field study of an audioonly media space. In Computer Supported Cooperative Work, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16.G. J. Holzmann. Design and Validation of Computer Protocols. Prentice Hall, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. 17.S. E. Hudson and I. Smith. Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems. In Computer Supported Cooperative Work, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. 18.D. Li and R. R. Muntz. Coca: Collaborative objects coordination architecture. In Proceedings of ACM CSCW, Nov. 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. 19.D. Li and R. R. Muntz. A collaboration specification language. In Proceedings of the 2nd USENIX Conference on Domain Specific Languages, Oct 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. 20.Z. Manna and A. Pnueli. The Temporal Logic of Reactive and Concurrent Systems, Specification. Springer- Verlag, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. 21.M. Mantei, R. Baecker, A. Sellen, W. Buxton, T. Milligan, , and B. Wellman. Experience in the use of a media space. In Proceedings of the CHI'91 Conference on Human Factors in Computing Systems, pages 203-208, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. 22.S. E. McDaniel, G. M. Olson, and J. C. Magee. Identifying and analyzing multiple threads in computermediated and face-to-face conversations. In Computer Supported Cooperative Work, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. 23.T. Nomura, K. Hayashi, T. Hazama, and S. Gudmundson. Interlocus: Workspace configuration mechanisms for activity awareness. In Computer Supported Cooperative Work, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. 24.L. Palen. Social, individual, and technological issues for groupware calendar systems. In CHI'99, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. 25.W. Prinz. Nessie: An awareness environment for cooperative settings. In European Conference on Computer Supported Cooperative Work, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. 26.R. S. Sandhu, E. J. Coyne, H. L. Feinstein, , and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, Feb. 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. 27.H. Shen and P. Dewan. Access control for collaborative systems. In Proc. of ACM Conf. on CSCW, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. 28.M. Vardi and P. Wolper. An automata-theoretic approach to automatic program verification. In First Symposium on Logic in Computer Science, pages 322-331, June 1986.Google ScholarGoogle Scholar
  29. 29.R. Want, A. Hopper, V. Falcao, and J. Gibbons. The active badge location system. ACM Transactions on Information Systems, 10(1):91-102, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. 30.E. Zaret. Upstart in the instant messager war. MSNBC, 1999.Google ScholarGoogle Scholar
  31. 31.Q. A. Zhao and J. T. Stasko. Evaluating image filtering based techniques in media space applications. In Proceedings of ACM CSCW, Nov 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Ensuring privacy in presence awareness: an automated verification approach

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              CSCW '00: Proceedings of the 2000 ACM conference on Computer supported cooperative work
              December 2000
              346 pages
              ISBN:1581132220
              DOI:10.1145/358916

              Copyright © 2000 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 December 2000

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • Article

              Acceptance Rates

              CSCW '00 Paper Acceptance Rate36of199submissions,18%Overall Acceptance Rate2,235of8,521submissions,26%

              Upcoming Conference

              CSCW '24

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader