SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Downloaden Sie, um offline zu lesen
Privacy	
  and	
  Security	
  in	
  
                                        	
  
Mul1-­‐modal	
  User	
  Interface	
  Modeling	
  
                                             	
  
            for	
  Social	
  Media	
  
       Mohamed	
  Bourimi1,3,	
  Ricardo	
  Tesoriero2,	
  Pedro	
  G.	
  
        Villanueva2,	
  Fa<h	
  Karatas1,	
  Philipp	
  Schwarte1	
  
                                              	
  
        1University	
  of	
  Siegen,	
  Chair	
  for	
  IT	
  Security,	
  Germany	
  
    2Compu1ng	
  Systems	
  Department.	
  University	
  of	
  Cas1lla-­‐La	
  
                             Mancha,	
  Spain	
  
3FernUniversität	
  in	
  Hagen,	
  Coopera1ve	
  Systems	
  Group,	
  Germany	
  
Overview	
  

§  Background	
  and	
  Mo2va2on	
  
§  Problem	
  Statement(s)	
  
§  Requirements	
  Analysis	
  
§  Proposed	
  Approach	
  
§  Example	
  
§  Eclipse	
  Security	
  Model	
  Editor	
  
§  Future	
  Work	
  and	
  Conclusion	
  
Background	
  and	
  Mo2va2on	
  
§  Interdisciplinary	
  research	
  becoming	
  more	
  important	
  in	
  the	
  
    area	
  of	
  Social	
  Media	
  (Modeling):	
  
     1.  Human-­‐Comupter	
  Interac2on	
  (HCI)	
  è	
  Usability	
  
          Engineering	
  
     2.  Groupware	
  and	
  Social	
  SoQware	
  è	
  Distributed	
  Systems	
  
          SoQware	
  Engineering	
  Suppor2ng	
  Collabora2on	
  
     3.  Privacy	
  and	
  Security	
  Engineering	
  	
  
§  Modeling	
  as	
  one	
  of	
  the	
  important	
  steps	
  in	
  the	
  SoQware	
  
    Engineering	
  Process	
  could	
  help	
  in	
  considering	
  the	
  
    requirements	
  :	
  
     •  Early	
  Enforcement	
  (Bourimi	
  et	
  al.	
  AFFINE	
  	
  
         methodology,	
  HCSE2010)	
  
     •  Adequately	
  by	
  considering	
  social	
  factors,	
  too!	
  
         (which	
  is	
  not	
  part	
  	
  of	
  other	
  business	
  domains)	
  
Abuses,	
  risks	
  and	
  threats	
  when	
  using	
  Social	
  Media!	
  
§  Scandals	
  are	
  becoming	
  ordinary	
  (due	
  to	
  	
  
    accidental	
  or/and	
  inten2onal	
  abuses)	
  with	
  	
  
    fatal	
  consequences	
  in	
  some	
  situa2ons!!	
  

§  Iden2fica2on	
  remains	
  possible	
  with	
  an	
  error	
  	
  
    rate	
  of	
  just	
  12%	
  (Narayanan&Shama2kov	
  	
  
    2009)	
  	
  

§  Many	
  other	
  examples	
  for	
  loosing	
  privacy	
  and	
  	
  
    evolving	
  risks	
  and	
  threats	
  ..	
  
Problem	
  Statement(s)	
  
§  General	
  problem	
  statement:	
  Improving	
  the	
  
    modeling	
  of	
  systems	
  suppor<ng	
  social	
  interac<on	
  in	
  
    general	
  (considering	
  all	
  involved	
  research	
  fields	
  
    togetherè	
  Targe<ng	
  Synergy	
  Effect)	
  
§  Specific	
  problem	
  statement	
  (here):	
  Using	
  
    standard(s)	
  for	
  efficient	
  support	
  of	
  generated	
  user	
  
    interfaces	
  by	
  considering	
  mul<-­‐modality	
  (Web,	
  
    Mobile,	
  Desktop	
  etc.)	
  when	
  using	
  social	
  media	
  
    systems	
  (e.g.,	
  for	
  evalua<on	
  based	
  research,	
  
    frequent	
  provision/adap<on	
  of	
  prototypes	
  is	
  
    needed!)	
  
Requirements	
  Analysis:	
  „SocialTV	
  Case	
  Study“	
  
§  “Perfect	
  Labor”	
  in	
  our	
  case:	
  SocialTV	
  interdisciplinary	
  
    project	
  running	
  since	
  2009	
  (presented	
  @SocialCom	
  
    2010)	
  èhQp://www.uni-­‐siegen.de/T5/itsec/forschung/projekte/socialtv.html	
  
Requirements	
  Analysis:	
  Further	
  Gathered	
  Requirements	
  

§  R1:	
  	
  Reflec2ng	
  realis2c	
  SocialTV	
  situa2ons	
  (individual	
  
    and	
  group	
  interac2ons)	
  
§  R2:	
  	
  Allowing	
  for	
  flexible	
  parallel	
  interac2on	
  of	
  the	
  
    involved	
  people	
  
§  R3:	
  	
  Flexibility	
  in	
  terms	
  of	
  costs	
  emerging	
  from	
  
    adapta2ons	
  to	
  new	
  situa2ons	
  and	
  tests	
  
§  R4:	
  	
  Suppor2ng	
  thereby	
  secure	
  and	
  privacy-­‐
    preserving	
  interac2on	
  
Approach	
  
§  Approach	
  is	
  based	
  on	
  same	
  technologies	
  we	
  use	
  
    for	
  development	
  of	
  context-­‐aware	
  applica2ons	
  for	
  
    ubiquitous	
  compu2ng	
  environments	
  using	
  the	
  
    Model-­‐Driven	
  Architecture	
  (MDA):	
  
   •  Metamodling	
  and	
  UsiXML	
  	
  
        (Cameleon	
  Reference	
  Framework)	
  
   •  Eclipse	
  
   •  For	
  Security/Privacy	
  è	
  Security	
  	
  
        Metamodel	
  (next	
  slide)	
  
   	
  
   	
  
Approach	
  
§  For	
  Security/Privacy	
  è	
  Metamodel	
  
    oriented	
  to	
  PriS	
  (2008):	
  
          - Principals	
  (user	
  model)	
  
          - Resources	
  (domain	
  	
  
            model)	
  
          - Ac2vi2es	
  (task	
  model)	
  



   	
  
   	
  
Solu2on	
  sa2sfying	
  our	
  requirements	
  (R1-­‐R4)	
  
Approach:	
  Security	
  Metamodel	
  and	
  DSL
                                               	
  
Example	
  




Security model
Current	
  State:	
  Security	
  Modeling	
  Editor
                                                               	
  

§  Developed	
  using	
  the	
  Eclipse	
  plahorm	
  as	
  a	
  plugin	
  
    •  EMF	
  	
  
    •  GMF	
  
§  As	
  consequence	
  
    •  Metamodels	
  in	
  ECORE	
  format	
  
    •  Models	
  in	
  XMI	
  (OMG	
  standard	
  for	
  model	
  representa2ons)	
  
§  Main	
  Advantage	
  
    •  Genera2on	
  of	
  a	
  plahorm	
  independent	
  security	
  models	
  
§  OCL	
  Model	
  Valida2on	
  (i.e.	
  Aiributes)	
  
§  MOFScript	
  (Model	
  2	
  Text	
  transforma2on)	
  
First	
  Results	
  (Modeling)	
  

§  In	
  total,	
  we	
  conducted	
  interviews,	
  walkthroughs	
  and	
  
    collected	
  first	
  usage	
  experiences	
  of	
  the	
  current	
  modeling	
  
    framework	
  (including	
  the	
  first	
  primi2ve	
  version	
  of	
  the	
  
    Security	
  Metamodeling	
  Eclipse-­‐based	
  Editor)	
  with	
  21	
  
    par2cipants	
  from	
  the	
  educa2onal	
  and	
  industrial	
  field	
  
§  We	
  are	
  currently	
  suppor2ng	
  various	
  widgets	
  such	
  as	
  	
  fields	
  
    for	
  entering	
  different	
  data	
  (e.g.,	
  username	
  and	
  password),	
  
    combo	
  boxes,	
  etc.	
  (Official	
  Status	
  will	
  be	
  announced	
  this	
  
    week	
  in	
  a	
  presenta2on	
  for	
  OMG)	
  	
  
Experiences	
  (for	
  Current	
  Status)	
  

§  Requirements	
  resulted/s2ll	
  resul2ng	
  mainly	
  from	
  
     interdisciplinary	
  research	
  projects	
  è	
  Students	
  and	
  
     researchers	
  working	
  together	
  in	
  academic	
  evalua2on!	
  	
  
	
  
§  We	
  received	
  wishes	
  for	
  improvements	
  from	
  industrial	
  
     contacts	
  and	
  partners	
  in	
  other	
  projects	
  è	
  Interac2ve	
  TV	
  
     por2ng	
  (s2ll	
  needing	
  access	
  to	
  special	
  HW	
  suppor2ng	
  our	
  
     technologies	
  such	
  as	
  TVs	
  suppor2ng	
  HTML5	
  or	
  Android	
  
     Plahorm)	
  
Future	
  work	
  and	
  conclusion	
  
§  Future	
  work	
  is	
  primarily	
  focused	
  on:	
  
     •  Improving	
  the	
  Security	
  Metamodel	
  by	
  adding	
  itera2vely	
  
        further	
  security	
  and	
  privacy	
  requirements!	
  
     •  Improving	
  the	
  used	
  Security	
  Metamodling	
  Editor	
  for	
  
        easing	
  the	
  modeling	
  of	
  related	
  design/modeling/
        development	
  tasks	
  

§  This	
  needs	
  improving	
  the	
  underlying	
  UsiXML	
  framework	
  
    which	
  is	
  in	
  evolu2on	
  for	
  the	
  moment	
  for	
  mee2ng	
  standards	
  
    (OMG	
  /	
  W3C	
  proposals	
  submiied!)	
  
Thank you for
                 your attention!

        Privacy	
  and	
  Security	
  in	
  
                                        	
  
Mul1-­‐modal	
  User	
  Interface	
  Modeling	
  
                                             	
  
            for	
  Social	
  Media
                         	
  
                                  	
  
            Bourimi@wiwi.uni-­‐siegen.de	
  
                        	
  
         Mohamed.Bourimi@fernuni-­‐hagen.de  	
  
                        	
  
                        	
  
                          	
  
                        	
  

Weitere ähnliche Inhalte

Ähnlich wie Privacy and Security in Multi-modal User Interface Modeling for Social Media

Beyond security testing
Beyond security testingBeyond security testing
Beyond security testingCu Nguyen
 
Sheet1Country ACountry BProduct 110 Reds9 GreensProduct 22 Reds2.2.docx
Sheet1Country ACountry BProduct 110 Reds9 GreensProduct 22 Reds2.2.docxSheet1Country ACountry BProduct 110 Reds9 GreensProduct 22 Reds2.2.docx
Sheet1Country ACountry BProduct 110 Reds9 GreensProduct 22 Reds2.2.docxedgar6wallace88877
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricMark Underwood
 
Model driven process for real time embedded
Model driven process for real time embeddedModel driven process for real time embedded
Model driven process for real time embeddedcaijjournal
 
Introduction of software engineering
Introduction of software engineeringIntroduction of software engineering
Introduction of software engineeringBhagyashriMore10
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYShivananda Rai
 
Paper aegis 2
Paper aegis 2Paper aegis 2
Paper aegis 2satyres
 
Payette, Caceres, Anegbe _tim_review_june2015
Payette, Caceres, Anegbe _tim_review_june2015Payette, Caceres, Anegbe _tim_review_june2015
Payette, Caceres, Anegbe _tim_review_june2015Erika Caceres Lopez CSM
 
David vernon software_engineering_notes
David vernon software_engineering_notesDavid vernon software_engineering_notes
David vernon software_engineering_notesmitthudwivedi
 
Wouter Joosen, iMinds Security Department, iMinds The Conference 2013
Wouter Joosen, iMinds Security Department, iMinds The Conference 2013Wouter Joosen, iMinds Security Department, iMinds The Conference 2013
Wouter Joosen, iMinds Security Department, iMinds The Conference 2013imec
 
Security Introspection for Software Reuse
Security Introspection for Software ReuseSecurity Introspection for Software Reuse
Security Introspection for Software ReuseIRJET Journal
 
MSc-Course-Information-2023.pdf
MSc-Course-Information-2023.pdfMSc-Course-Information-2023.pdf
MSc-Course-Information-2023.pdfSasinduLakshan2
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...IEEEFINALSEMSTUDENTPROJECTS
 
A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation IJECEIAES
 
What is the future of cloud security linked in
What is the future of cloud security linked inWhat is the future of cloud security linked in
What is the future of cloud security linked inJonathan Spindel
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)Gerardo Pardo-Castellote
 

Ähnlich wie Privacy and Security in Multi-modal User Interface Modeling for Social Media (20)

Beyond security testing
Beyond security testingBeyond security testing
Beyond security testing
 
MDE Diploma
MDE DiplomaMDE Diploma
MDE Diploma
 
Sheet1Country ACountry BProduct 110 Reds9 GreensProduct 22 Reds2.2.docx
Sheet1Country ACountry BProduct 110 Reds9 GreensProduct 22 Reds2.2.docxSheet1Country ACountry BProduct 110 Reds9 GreensProduct 22 Reds2.2.docx
Sheet1Country ACountry BProduct 110 Reds9 GreensProduct 22 Reds2.2.docx
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
 
Model driven process for real time embedded
Model driven process for real time embeddedModel driven process for real time embedded
Model driven process for real time embedded
 
Introduction of software engineering
Introduction of software engineeringIntroduction of software engineering
Introduction of software engineering
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
 
Paper aegis 2
Paper aegis 2Paper aegis 2
Paper aegis 2
 
Payette, Caceres, Anegbe _tim_review_june2015
Payette, Caceres, Anegbe _tim_review_june2015Payette, Caceres, Anegbe _tim_review_june2015
Payette, Caceres, Anegbe _tim_review_june2015
 
Module 1.pdf
Module 1.pdfModule 1.pdf
Module 1.pdf
 
David vernon software_engineering_notes
David vernon software_engineering_notesDavid vernon software_engineering_notes
David vernon software_engineering_notes
 
Wouter Joosen, iMinds Security Department, iMinds The Conference 2013
Wouter Joosen, iMinds Security Department, iMinds The Conference 2013Wouter Joosen, iMinds Security Department, iMinds The Conference 2013
Wouter Joosen, iMinds Security Department, iMinds The Conference 2013
 
Security Introspection for Software Reuse
Security Introspection for Software ReuseSecurity Introspection for Software Reuse
Security Introspection for Software Reuse
 
Software engineering the product
Software engineering the productSoftware engineering the product
Software engineering the product
 
MSc-Course-Information-2023.pdf
MSc-Course-Information-2023.pdfMSc-Course-Information-2023.pdf
MSc-Course-Information-2023.pdf
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
 
A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation
 
What is the future of cloud security linked in
What is the future of cloud security linked inWhat is the future of cloud security linked in
What is the future of cloud security linked in
 
Br36413417
Br36413417Br36413417
Br36413417
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
 

Kürzlich hochgeladen

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Kürzlich hochgeladen (20)

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

Privacy and Security in Multi-modal User Interface Modeling for Social Media

  • 1. Privacy  and  Security  in     Mul1-­‐modal  User  Interface  Modeling     for  Social  Media   Mohamed  Bourimi1,3,  Ricardo  Tesoriero2,  Pedro  G.   Villanueva2,  Fa<h  Karatas1,  Philipp  Schwarte1     1University  of  Siegen,  Chair  for  IT  Security,  Germany   2Compu1ng  Systems  Department.  University  of  Cas1lla-­‐La   Mancha,  Spain   3FernUniversität  in  Hagen,  Coopera1ve  Systems  Group,  Germany  
  • 2. Overview   §  Background  and  Mo2va2on   §  Problem  Statement(s)   §  Requirements  Analysis   §  Proposed  Approach   §  Example   §  Eclipse  Security  Model  Editor   §  Future  Work  and  Conclusion  
  • 3. Background  and  Mo2va2on   §  Interdisciplinary  research  becoming  more  important  in  the   area  of  Social  Media  (Modeling):   1.  Human-­‐Comupter  Interac2on  (HCI)  è  Usability   Engineering   2.  Groupware  and  Social  SoQware  è  Distributed  Systems   SoQware  Engineering  Suppor2ng  Collabora2on   3.  Privacy  and  Security  Engineering     §  Modeling  as  one  of  the  important  steps  in  the  SoQware   Engineering  Process  could  help  in  considering  the   requirements  :   •  Early  Enforcement  (Bourimi  et  al.  AFFINE     methodology,  HCSE2010)   •  Adequately  by  considering  social  factors,  too!   (which  is  not  part    of  other  business  domains)  
  • 4. Abuses,  risks  and  threats  when  using  Social  Media!   §  Scandals  are  becoming  ordinary  (due  to     accidental  or/and  inten2onal  abuses)  with     fatal  consequences  in  some  situa2ons!!   §  Iden2fica2on  remains  possible  with  an  error     rate  of  just  12%  (Narayanan&Shama2kov     2009)     §  Many  other  examples  for  loosing  privacy  and     evolving  risks  and  threats  ..  
  • 5. Problem  Statement(s)   §  General  problem  statement:  Improving  the   modeling  of  systems  suppor<ng  social  interac<on  in   general  (considering  all  involved  research  fields   togetherè  Targe<ng  Synergy  Effect)   §  Specific  problem  statement  (here):  Using   standard(s)  for  efficient  support  of  generated  user   interfaces  by  considering  mul<-­‐modality  (Web,   Mobile,  Desktop  etc.)  when  using  social  media   systems  (e.g.,  for  evalua<on  based  research,   frequent  provision/adap<on  of  prototypes  is   needed!)  
  • 6. Requirements  Analysis:  „SocialTV  Case  Study“   §  “Perfect  Labor”  in  our  case:  SocialTV  interdisciplinary   project  running  since  2009  (presented  @SocialCom   2010)  èhQp://www.uni-­‐siegen.de/T5/itsec/forschung/projekte/socialtv.html  
  • 7. Requirements  Analysis:  Further  Gathered  Requirements   §  R1:    Reflec2ng  realis2c  SocialTV  situa2ons  (individual   and  group  interac2ons)   §  R2:    Allowing  for  flexible  parallel  interac2on  of  the   involved  people   §  R3:    Flexibility  in  terms  of  costs  emerging  from   adapta2ons  to  new  situa2ons  and  tests   §  R4:    Suppor2ng  thereby  secure  and  privacy-­‐ preserving  interac2on  
  • 8. Approach   §  Approach  is  based  on  same  technologies  we  use   for  development  of  context-­‐aware  applica2ons  for   ubiquitous  compu2ng  environments  using  the   Model-­‐Driven  Architecture  (MDA):   •  Metamodling  and  UsiXML     (Cameleon  Reference  Framework)   •  Eclipse   •  For  Security/Privacy  è  Security     Metamodel  (next  slide)      
  • 9. Approach   §  For  Security/Privacy  è  Metamodel   oriented  to  PriS  (2008):   - Principals  (user  model)   - Resources  (domain     model)   - Ac2vi2es  (task  model)      
  • 10. Solu2on  sa2sfying  our  requirements  (R1-­‐R4)  
  • 13. Current  State:  Security  Modeling  Editor   §  Developed  using  the  Eclipse  plahorm  as  a  plugin   •  EMF     •  GMF   §  As  consequence   •  Metamodels  in  ECORE  format   •  Models  in  XMI  (OMG  standard  for  model  representa2ons)   §  Main  Advantage   •  Genera2on  of  a  plahorm  independent  security  models   §  OCL  Model  Valida2on  (i.e.  Aiributes)   §  MOFScript  (Model  2  Text  transforma2on)  
  • 14. First  Results  (Modeling)   §  In  total,  we  conducted  interviews,  walkthroughs  and   collected  first  usage  experiences  of  the  current  modeling   framework  (including  the  first  primi2ve  version  of  the   Security  Metamodeling  Eclipse-­‐based  Editor)  with  21   par2cipants  from  the  educa2onal  and  industrial  field   §  We  are  currently  suppor2ng  various  widgets  such  as    fields   for  entering  different  data  (e.g.,  username  and  password),   combo  boxes,  etc.  (Official  Status  will  be  announced  this   week  in  a  presenta2on  for  OMG)    
  • 15. Experiences  (for  Current  Status)   §  Requirements  resulted/s2ll  resul2ng  mainly  from   interdisciplinary  research  projects  è  Students  and   researchers  working  together  in  academic  evalua2on!       §  We  received  wishes  for  improvements  from  industrial   contacts  and  partners  in  other  projects  è  Interac2ve  TV   por2ng  (s2ll  needing  access  to  special  HW  suppor2ng  our   technologies  such  as  TVs  suppor2ng  HTML5  or  Android   Plahorm)  
  • 16. Future  work  and  conclusion   §  Future  work  is  primarily  focused  on:   •  Improving  the  Security  Metamodel  by  adding  itera2vely   further  security  and  privacy  requirements!   •  Improving  the  used  Security  Metamodling  Editor  for   easing  the  modeling  of  related  design/modeling/ development  tasks   §  This  needs  improving  the  underlying  UsiXML  framework   which  is  in  evolu2on  for  the  moment  for  mee2ng  standards   (OMG  /  W3C  proposals  submiied!)  
  • 17. Thank you for your attention! Privacy  and  Security  in     Mul1-­‐modal  User  Interface  Modeling     for  Social  Media     Bourimi@wiwi.uni-­‐siegen.de     Mohamed.Bourimi@fernuni-­‐hagen.de