Usage Guide
The download bundle comes with two preinstalled examples.
  1. The first example is a track sharing mobile application for runners and other outdoor activity. Similar examples of such application include B.iCycle (http://b-icycle.com/), MyTracks (mytracks.appspot.com/) etc. Typically, such applications enable a group of runners to share live GPS tracks and performance statistics with fellow runners and other agents such as their fitness instructors and physicians.
  2. The second example is a participatory sensing system that helps drivers spend less time looking for parking spaces in a city centre. Typical examples include Google Open Spot (openspot.googlelabs.com/) and Roadify (www.roadify.com/). We focus on key functionalities that enable drivers to post, request and display the fuel-optimal, shortest, or fastest routes to an empty parking space.
Generally, using Caprice involves the following steps:
(See example screenshots for each step by clicking the associated link)
  1. Step 1 (e.g.):Build a domain model consisting of context attributes and learned inference rules.
  2. Step 2 (e.g.): Initialise a repository of privacy policies.
  3. Step 3 (e.g.): Build a finite state machine and associate policies to state transitions.
  4. Step 4 (e.g.): Build a group of interacting agents and associate a FSM instance to each agent.
  5. Step 5 (e.g.):
    1. Configure adaptation rules based specifying mitigation actions based on threat severity.
    2. Configure meta-adaptation rules based on the frequency of reoccurrence of previously mitigated privacy threat.
  6. Step 6 (e.g.): Based on Step 4 and 5, Caprice emulates a group interaction process. This involves simulating a sequence of message transfers between different agents across different operational context instances. For each message transfer, the associated operational context is analysed to discover if privacy is threatened as a result of the interaction. If privacy is threatened, Caprice also suggests appropriate mitigation action based on the severity of the threat.

Last edited May 15, 2012 at 2:58 PM by omoronyia, version 42

Comments

No comments yet.