{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T09:03:52Z","timestamp":1774083832511,"version":"3.50.1"},"reference-count":58,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2017,9,11]],"date-time":"2017-09-11T00:00:00Z","timestamp":1505088000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61421091"],"award-info":[{"award-number":["61421091"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","award":["201606010240"],"award-info":[{"award-number":["201606010240"]}],"id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CSR-1526237, CNS-1564009"],"award-info":[{"award-number":["CSR-1526237, CNS-1564009"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"publisher","award":["FA8750-15-2-0281"],"award-info":[{"award-number":["FA8750-15-2-0281"]}],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2017,9,11]]},"abstract":"<jats:p>Smartphone app developers often access and use privacy-sensitive data to create apps with rich and meaningful interactions. However, it can be challenging for auditors and end-users to know what granularity of data is being used and how, thereby hindering assessment of potential risks. Furthermore, developers lack easy ways of offering transparency to users regarding how personal data is processed, even if their intentions are to make their apps more privacy friendly. To address these challenges, we introduce PrivacyStreams, a functional programming model for accessing and processing personal data as a stream. PrivacyStreams is designed to make it easy for developers to make use of personal data while simultaneously making it easier to analyze how that personal data is processed and what granularity of data is actually used. We present the design and implementation of PrivacyStreams, as well as several user studies and experiments to demonstrate its usability, utility, and support for privacy.<\/jats:p>","DOI":"10.1145\/3130941","type":"journal-article","created":{"date-parts":[[2017,9,11]],"date-time":"2017-09-11T12:12:26Z","timestamp":1505131946000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["PrivacyStreams"],"prefix":"10.1145","volume":"1","author":[{"given":"Yuanchun","family":"Li","sequence":"first","affiliation":[{"name":"Peking University, China"}]},{"given":"Fanglin","family":"Chen","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, USA"}]},{"given":"Toby Jia-Jun","family":"Li","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, USA"}]},{"given":"Yao","family":"Guo","sequence":"additional","affiliation":[{"name":"Peking University, China"}]},{"given":"Gang","family":"Huang","sequence":"additional","affiliation":[{"name":"Peking University, China"}]},{"given":"Matthew","family":"Fredrikson","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, USA"}]},{"given":"Yuvraj","family":"Agarwal","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, USA"}]},{"given":"Jason I.","family":"Hong","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,9,11]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464460"},{"key":"e_1_2_1_2_1","volume-title":"Funf open sensing framework. (2011). Retrieved","author":"Aharony Nadav","year":"2017","unstructured":"Nadav Aharony , Alan Gardner , and Cody Sumter . 2011. Funf open sensing framework. (2011). Retrieved July 1, 2017 from http:\/\/funf.org\/ Nadav Aharony, Alan Gardner, and Cody Sumter. 2011. Funf open sensing framework. (2011). Retrieved July 1, 2017 from http:\/\/funf.org\/"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124881"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23006"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357134"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1176617.1176622"},{"key":"e_1_2_1_8_1","volume-title":"NET Language-Integrated Query. (2007). Retrieved","author":"Box Don","year":"2017","unstructured":"Don Box and Anders Hejlsberg . 2007. LINQ : . NET Language-Integrated Query. (2007). Retrieved July 1, 2017 from https:\/\/msdn.microsoft.com\/en-us\/library\/bb308959.aspx Don Box and Anders Hejlsberg. 2007. LINQ: .NET Language-Integrated Query. (2007). Retrieved July 1, 2017 from https:\/\/msdn.microsoft.com\/en-us\/library\/bb308959.aspx"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.4108\/icst.pervasivehealth.2013.252148"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370288"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2935334.2935349"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664266"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0098790"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.14778\/2367502.2367562"},{"key":"e_1_2_1_15_1","volume-title":"AAAI Workshop: Modern Artificial Intelligence for Health Analytics.","author":"Doryab Afsaneh","year":"2014","unstructured":"Afsaneh Doryab , Jun-Ki Min , Jason Wiese , John Zimmerman , and Jason I Hong . 2014 . Detection of Behavior Change in People with Depression .. In AAAI Workshop: Modern Artificial Intelligence for Health Analytics. Afsaneh Doryab, Jun-Ki Min, Jason Wiese, John Zimmerman, and Jason I Hong. 2014. Detection of Behavior Change in People with Depression.. In AAAI Workshop: Modern Artificial Intelligence for Health Analytics."},{"key":"e_1_2_1_16_1","volume-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201910)","author":"Enck William","year":"1924","unstructured":"William Enck , Peter Gilbert , Byung-Gon Chun , Landon P. Cox , Jaeyeon Jung , Patrick McDaniel , and Anmol N. Sheth . 2010. TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones . In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201910) . USENIX Association, Berkeley, CA, USA, 393--407. http:\/\/dl.acm.org\/citation.cfm?id= 1924 943.1924971 William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. 2010. TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201910). USENIX Association, Berkeley, CA, USA, 393--407. http:\/\/dl.acm.org\/citation.cfm?id=1924943.1924971"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660343"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2580944"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.3389\/fict.2015.00006"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.37"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2940343.2940346"},{"key":"e_1_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Michael I Gordon Deokhwan Kim Jeff H Perkins Limei Gilham Nguyen Nguyen and Martin C Rinard. 2015. Information Flow Analysis of Android Applications in DroidSafe.. In NDSS. Citeseer.  Michael I Gordon Deokhwan Kim Jeff H Perkins Limei Gilham Nguyen Nguyen and Martin C Rinard. 2015. Information Flow Analysis of Android Applications in DroidSafe.. In NDSS. Citeseer.","DOI":"10.14722\/ndss.2015.23089"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568301"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23045"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1055021"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509541"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2873587.2873602"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971693"},{"key":"e_1_2_1_29_1","volume-title":"2015 IEEE\/ACM International Symposium on Low Power Electronics and Design (ISLPED). 321--326","author":"Li Yuanchun","year":"2015","unstructured":"Yuanchun Li , Yao Guo , Junjun Kong , and Xiangqun Chen . 2015 . Fixing sensor-related energy bugs through automated sensing policy instrumentation . In 2015 IEEE\/ACM International Symposium on Low Power Electronics and Design (ISLPED). 321--326 . Yuanchun Li, Yao Guo, Junjun Kong, and Xiangqun Chen. 2015. Fixing sensor-related energy bugs through automated sensing policy instrumentation. In 2015 IEEE\/ACM International Symposium on Low Power Electronics and Design (ISLPED). 321--326."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.8"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464449"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971724"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971676"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557220"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441810"},{"key":"e_1_2_1_37_1","volume-title":"USENIX Security Symposium. Washington, D.C., 527--542","author":"Pandita Rahul","year":"2013","unstructured":"Rahul Pandita , Xusheng Xiao , Wei Yang , William Enck , and Tao Xie . 2013 . WHYPER: Towards Automating Risk Assessment of Mobile Applications .. In USENIX Security Symposium. Washington, D.C., 527--542 . Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, and Tao Xie. 2013. WHYPER: Towards Automating Risk Assessment of Mobile Applications.. In USENIX Security Symposium. Washington, D.C., 527--542."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2804252"},{"key":"e_1_2_1_39_1","volume-title":"PrivacyStreams API documentation. (2016). Retrieved","year":"2017","unstructured":"PrivacyStreams. 2016. PrivacyStreams API documentation. (2016). Retrieved July 1, 2017 from https:\/\/privacystreams.github.io\/ PrivacyStreams. 2016. PrivacyStreams API documentation. (2016). Retrieved July 1, 2017 from https:\/\/privacystreams.github.io\/"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660287"},{"key":"e_1_2_1_41_1","volume-title":"An API for asynchronous programming with observable streams. (2017). Retrieved","author":"X.","year":"2017","unstructured":"Reactive X. 2017. An API for asynchronous programming with observable streams. (2017). Retrieved July 1, 2017 from http:\/\/reactivex.io\/ ReactiveX. 2017. An API for asynchronous programming with observable streams. (2017). Retrieved July 1, 2017 from http:\/\/reactivex.io\/"},{"key":"e_1_2_1_42_1","volume-title":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops. 670--675","author":"Ruge L.","unstructured":"L. Ruge , B. Altakrouri , and A. Schrader . 2013. SoundOfTheCity - Continuous noise monitoring for a healthy city . In 2013 IEEE International Conference on Pervasive Computing and Communications Workshops. 670--675 . L. Ruge, B. Altakrouri, and A. Schrader. 2013. SoundOfTheCity - Continuous noise monitoring for a healthy city. In 2013 IEEE International Conference on Pervasive Computing and Communications Workshops. 670--675."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/302979.303126"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884855"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632074"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978343"},{"key":"e_1_2_1_47_1","volume-title":"Processing Data with Java SE 8 Streams. (2014). Retrieved","author":"Urma Raoul-Gabriel","year":"2017","unstructured":"Raoul-Gabriel Urma . 2014. Processing Data with Java SE 8 Streams. (2014). Retrieved July 1, 2017 from http:\/\/www.oracle.com\/technetwork\/articles\/java\/ma14-java-se- 8-streams-2177646.html Raoul-Gabriel Urma. 2014. Processing Data with Java SE 8 Streams. (2014). Retrieved July 1, 2017 from http:\/\/www.oracle.com\/technetwork\/articles\/java\/ma14-java-se- 8-streams-2177646.html"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/781995.782008"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858120"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020581"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2805833"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632054"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2804251"},{"key":"e_1_2_1_54_1","volume-title":"USENIX Security","volume":"15","author":"Wijesekera Primal","year":"2015","unstructured":"Primal Wijesekera , Arjun Baokar , Ashkan Hosseini , Serge Egelman , David Wagner , and Konstantin Beznosov . 2015 . Android Permissions Remystified: A Field Study on Contextual Integrity .. In USENIX Security , Vol. 15 . Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David Wagner, and Konstantin Beznosov. 2015. Android Permissions Remystified: A Field Study on Contextual Integrity.. In USENIX Security, Vol. 15."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103669"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516676"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522737"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3130941","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3130941","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3130941","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:19Z","timestamp":1750212799000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3130941"}},"subtitle":["Enabling Transparency in Personal Data Processing for Mobile Apps"],"short-title":[],"issued":{"date-parts":[[2017,9,11]]},"references-count":58,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,9,11]]}},"alternative-id":["10.1145\/3130941"],"URL":"https:\/\/doi.org\/10.1145\/3130941","relation":{},"ISSN":["2474-9567"],"issn-type":[{"value":"2474-9567","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,9,11]]},"assertion":[{"value":"2017-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-07-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-09-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}