Crafting Requirements for Mobile and Pervasive Emergency Response based on Privacy and Security by Design Principles

According to fundamental principles of the Privacy by Design approach, the consultation of privacy issues should be embedded into analysis and design of information systems, from the early stages o ...

[1]  Max Mühlhäuser,et al.  Multilaterally Secure Ubiquitous Auditing , 2010, Intelligent Networking, Collaborative Systems and Applications.

[2]  Nalini Venkatasubramanian,et al.  On-Demand Information Portals for Disaster Situations , 2007, 2007 IEEE Intelligence and Security Informatics.

[3]  Antonio Kung,et al.  Privacy Verification Using Ontologies , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.

[4]  Gustas Remigijus,et al.  Pragmatic-Driven Approach for Service-Oriented Analysis and Design , 2008 .

[5]  Felix Flentge,et al.  Designing Context-Aware HCI for Collaborative Emergency Management , 2008 .

[6]  Apostolos P. Fournaris Trust Ensuring Crisis Management Hardware Module , 2010, Inf. Secur. J. A Glob. Perspect..

[7]  Prima Gustiené Development of a new service-oriented modelling method for information systems analysis and design , 2010 .

[8]  James A. Landay,et al.  Siren: Context-aware Computing for Firefighting , 2004, Pervasive.

[9]  B. W. Murgatroyd End to end encryption in public safety TETRA networks , 2003 .

[10]  Alexander V. Smirnov,et al.  Ubiquitous Computing for Personalized Decision Support in Emergency , 2011, Int. J. Inf. Syst. Crisis Response Manag..

[11]  H. Raghav Rao,et al.  Framework for Analyzing Critical Incident Management Systems (CIMS) , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[12]  David J. Phillips Beyond Privacy: Confronting Locational Surveillance in Wireless Communication , 2003 .

[13]  Murray E. Jennex,et al.  Emergency Response Systems: The Utility Y2k Experience , 2004 .

[14]  Andreas Haeberlen,et al.  CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable , 2009, NDSS.

[15]  Xiang Yao,et al.  The Design of a Dynamic Emergency Response Management Information System (DERMIS) , 2004 .

[16]  Prima Gustiené,et al.  How Models and Methods for Analysis and Design of Information Systems can be Improved to Better Support Communication and Learning , 2010 .

[17]  Mahadev Satyanarayanan,et al.  Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..

[18]  Max Mühlhäuser,et al.  MundoMessage: enabling trustworthy ubiquitous emergency communication , 2011, ICUIMC '11.

[19]  John A. Zachman,et al.  Enterprise Architecture: The Issue of the Century , 2001 .

[20]  Bashar Nuseibeh,et al.  Requirements engineering: a roadmap , 2000, ICSE '00.

[21]  Hui Xiong,et al.  Secure information sharing and analysis for effective emergency management , 2008, DG.O.

[22]  Achim D. Brucker,et al.  Information Flow in Disaster Management Systems , 2010, 2010 International Conference on Availability, Reliability and Security.

[23]  Nalini Venkatasubramanian,et al.  Project rescue: challenges in responding to the unexpected , 2003, IS&T/SPIE Electronic Imaging.

[24]  Johann Cas,et al.  Privacy in pervasive computing environments - a contradiction in terms? , 2005, IEEE Technology and Society Magazine.

[25]  Hermann Hellwagner,et al.  Information and Communication Systems for Mobile Emergency Response , 2008, UNISCON.

[26]  Jungwoo Ryoo,et al.  A comparison and classification framework for disaster information management systems , 2006 .

[27]  P. Ehlert INTELLIGENT USER INTERFACES Introduction and survey , 2003 .

[28]  Achim D. Brucker,et al.  Attribute-Based Encryption with Break-Glass , 2010, WISTP.

[29]  Stefan G. Weber Harnessing Pseudonyms with Implicit Attributes for Privacy-Respecting Mission Log Analysis , 2009, 2009 International Conference on Intelligent Networking and Collaborative Systems.

[30]  Max Mühlhäuser,et al.  Towards an Architecture for Balancing Privacy and Traceability in Ubiquitous Computing Environments , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[31]  M. Turoff,et al.  Session details: Emergency response information systems: emerging trends and technologies , 2007 .

[32]  Jan L. G. Dietz,et al.  Enterprise ontology - theory and methodology , 2006 .

[33]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[34]  Stefan G. Weber,et al.  Inherent Tradeoffs in Ubiquitous Computing Services , 2007, GI Jahrestagung.

[35]  Costas Lambrinoudakis,et al.  Protecting privacy and anonymity in pervasive computing: trends and perspectives , 2006, Telematics Informatics.

[36]  Zhou Wang,et al.  MIKoBOS - A Mobile Information and Communication System for Emergency Response , 2006 .

[37]  Chris W. Johnson Complexity, Structured Chaos and the Importance of Information Management for Mobile Computing in the UK Floods of 2007 , 2008, Mobile Response.

[38]  Thomas Kirste,et al.  Design Challenges for an Integrated Disaster Management Communication and Information System , 2002 .

[39]  Carmela Troncoso,et al.  Engineering Privacy by Design , 2011 .

[40]  Remigijus Gustas,et al.  Conceptual Modeling Method for Separation of Concerns and Integration of Structure and Behavior , 2012, Int. J. Inf. Syst. Model. Des..

[41]  Christoph Endres,et al.  A task-based messaging approach to facilitate staff work , 2010, ISCRAM.

[42]  Marit Hansen,et al.  Identity and Privacy Issues Throughout Life , 2011, Privacy and Identity Management for Life.

[43]  Hans-Werner Gellersen,et al.  Location and Navigation Support for Emergency Responders: A Survey , 2010, IEEE Pervasive Computing.

[44]  Stefan G. Weber Multilaterally Secure Pervasive Cooperation - Privacy Protection, Accountability and Secure Communication for the Age of Pervasive Computing , 2012, Cryptology and Information Security Series.

[45]  M. Goodchild,et al.  Successful Response Starts with a Map: Improving Geospatial Support for Disaster Management , 2007 .

[46]  Stefan G. Weber Securing First Response Coordination with Dynamic Attribute-Based Encryption , 2009, 2009 World Congress on Privacy, Security, Trust and the Management of e-Business.