Risk evaluation for personal identity management based on privacy attribute ontology

Mizuho Iwaihara, Kohei Murakami, Gail-Joon Ahn, Masatoshi Yoshikawa

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Abstract

Identity providers are becoming popular for distributed authentication and distributed identity management. Users' privacy attributes are stored at an identity provider and they are released to a service provider upon user's consent. Since a broad range of privacy information of different sensitiveness can be exchanged in advanced web services, it is necessary to assist users by presenting potential risk on financial and personality damage, before releasing privacy attributes. In this paper, we present a model of privacy attribute ontology and risk evaluation method on this ontology. Then we formalize several matching problems which optimize similarity scores of matching solutions under several different types of risk constraints. We show sophisticated polynomial-time algorithms for solving these optimization problems.

Original languageEnglish (US)
Title of host publicationConceptual Modeling - ER 2008 - 27th International Conference on Conceptual Modeling, Proceedings
PublisherSpringer Verlag
Pages183-198
Number of pages16
ISBN (Print)3540878769, 9783540878766
DOIs
StatePublished - 2008
Event27th International Conference on Conceptual Modeling, ER 2008 - Barcelona, Spain
Duration: Oct 20 2008Oct 24 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5231 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other27th International Conference on Conceptual Modeling, ER 2008
Country/TerritorySpain
CityBarcelona
Period10/20/0810/24/08

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Risk evaluation for personal identity management based on privacy attribute ontology'. Together they form a unique fingerprint.

Cite this