TY - GEN
T1 - Ontology-based risk evaluation in user-centric identity management
AU - Ahn, Gail-Joon
AU - Sekar, Pradeep
N1 - Copyright:
Copyright 2011 Elsevier B.V., All rights reserved.
PY - 2011
Y1 - 2011
N2 - Recent trends in the area of identity management have evolved from a traditional identification solution to a distributed user-centric identity management mechanism. The major goal of user-centric identity management is to enable the users to have control over their own digital identities. Even though existing identity management systems attempt to offer user-centricity where users possess complete control on their identity disclosure, however, it does not signify the consequences of the users' behavior. It is necessary to assist the users on the risk involved in disclosing their identity attributes. In this paper, we propose a risk-aware mechanism to help the users decide the degree of identity disclosure risk using ontology-based evaluation and privacy preference evaluation. We demonstrate the feasibility of our approach on dynamic online social networks where the user's identity plays a major role for access control and privacy management.
AB - Recent trends in the area of identity management have evolved from a traditional identification solution to a distributed user-centric identity management mechanism. The major goal of user-centric identity management is to enable the users to have control over their own digital identities. Even though existing identity management systems attempt to offer user-centricity where users possess complete control on their identity disclosure, however, it does not signify the consequences of the users' behavior. It is necessary to assist the users on the risk involved in disclosing their identity attributes. In this paper, we propose a risk-aware mechanism to help the users decide the degree of identity disclosure risk using ontology-based evaluation and privacy preference evaluation. We demonstrate the feasibility of our approach on dynamic online social networks where the user's identity plays a major role for access control and privacy management.
UR - http://www.scopus.com/inward/record.url?scp=80052174427&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=80052174427&partnerID=8YFLogxK
U2 - 10.1109/icc.2011.5962948
DO - 10.1109/icc.2011.5962948
M3 - Conference contribution
AN - SCOPUS:80052174427
SN - 9781612842332
T3 - IEEE International Conference on Communications
BT - 2011 IEEE International Conference on Communications, ICC 2011
T2 - 2011 IEEE International Conference on Communications, ICC 2011
Y2 - 5 June 2011 through 9 June 2011
ER -