Designing privacy-enhancing mobile applications

0Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper evaluates the multi-paradigm modelling methodology for designing controlled anonymous applications, like applications that use trap-door anonymity. The methodology is applied to a class of mobile applications with strong security and privacy requirements. From this study, we detect the constraints in the existing methodology in the context of mobile applications, explore the solution space and define directions for research. Moreover, a first iteration of the realization of the existing design methodology is made. © 2012 IFIP International Federation for Information Processing.

Author supplied keywords

Cite

CITATION STYLE

APA

Decroix, K., De Decker, B., & Naessens, V. (2012). Designing privacy-enhancing mobile applications. In IFIP Advances in Information and Communication Technology (Vol. 375 AICT, pp. 157–170). Springer New York LLC. https://doi.org/10.1007/978-3-642-31668-5_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free