Risk evaluation for personal identity management based on privacy attribute ontology

Mizuho Iwaihara, Kohei Murakami, Gail-Joon Ahn, Masatoshi Yoshikawa

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

Identity providers are becoming popular for distributed authentication and distributed identity management. Users' privacy attributes are stored at an identity provider and they are released to a service provider upon user's consent. Since a broad range of privacy information of different sensitiveness can be exchanged in advanced web services, it is necessary to assist users by presenting potential risk on financial and personality damage, before releasing privacy attributes. In this paper, we present a model of privacy attribute ontology and risk evaluation method on this ontology. Then we formalize several matching problems which optimize similarity scores of matching solutions under several different types of risk constraints. We show sophisticated polynomial-time algorithms for solving these optimization problems.

Original languageEnglish (US)
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages183-198
Number of pages16
Volume5231 LNCS
DOIs
StatePublished - 2008
Event27th International Conference on Conceptual Modeling, ER 2008 - Barcelona, Spain
Duration: Oct 20 2008Oct 24 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5231 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other27th International Conference on Conceptual Modeling, ER 2008
CountrySpain
CityBarcelona
Period10/20/0810/24/08

Fingerprint

Identity Management
Risk Evaluation
Privacy
Ontology
Attribute
Web services
Authentication
Matching Problem
Evaluation Method
Polynomials
Polynomial-time Algorithm
Web Services
Damage
Optimise
Optimization Problem
Necessary
Range of data

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Iwaihara, M., Murakami, K., Ahn, G-J., & Yoshikawa, M. (2008). Risk evaluation for personal identity management based on privacy attribute ontology. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5231 LNCS, pp. 183-198). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5231 LNCS). https://doi.org/10.1007/978-3-540-87877-3-15

Risk evaluation for personal identity management based on privacy attribute ontology. / Iwaihara, Mizuho; Murakami, Kohei; Ahn, Gail-Joon; Yoshikawa, Masatoshi.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5231 LNCS 2008. p. 183-198 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5231 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Iwaihara, M, Murakami, K, Ahn, G-J & Yoshikawa, M 2008, Risk evaluation for personal identity management based on privacy attribute ontology. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 5231 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 5231 LNCS, pp. 183-198, 27th International Conference on Conceptual Modeling, ER 2008, Barcelona, Spain, 10/20/08. https://doi.org/10.1007/978-3-540-87877-3-15
Iwaihara M, Murakami K, Ahn G-J, Yoshikawa M. Risk evaluation for personal identity management based on privacy attribute ontology. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5231 LNCS. 2008. p. 183-198. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-540-87877-3-15
Iwaihara, Mizuho ; Murakami, Kohei ; Ahn, Gail-Joon ; Yoshikawa, Masatoshi. / Risk evaluation for personal identity management based on privacy attribute ontology. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5231 LNCS 2008. pp. 183-198 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{14f41b62a1004e13bfad5539b3d998da,
title = "Risk evaluation for personal identity management based on privacy attribute ontology",
abstract = "Identity providers are becoming popular for distributed authentication and distributed identity management. Users' privacy attributes are stored at an identity provider and they are released to a service provider upon user's consent. Since a broad range of privacy information of different sensitiveness can be exchanged in advanced web services, it is necessary to assist users by presenting potential risk on financial and personality damage, before releasing privacy attributes. In this paper, we present a model of privacy attribute ontology and risk evaluation method on this ontology. Then we formalize several matching problems which optimize similarity scores of matching solutions under several different types of risk constraints. We show sophisticated polynomial-time algorithms for solving these optimization problems.",
author = "Mizuho Iwaihara and Kohei Murakami and Gail-Joon Ahn and Masatoshi Yoshikawa",
year = "2008",
doi = "10.1007/978-3-540-87877-3-15",
language = "English (US)",
isbn = "3540878769",
volume = "5231 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "183--198",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - Risk evaluation for personal identity management based on privacy attribute ontology

AU - Iwaihara, Mizuho

AU - Murakami, Kohei

AU - Ahn, Gail-Joon

AU - Yoshikawa, Masatoshi

PY - 2008

Y1 - 2008

N2 - Identity providers are becoming popular for distributed authentication and distributed identity management. Users' privacy attributes are stored at an identity provider and they are released to a service provider upon user's consent. Since a broad range of privacy information of different sensitiveness can be exchanged in advanced web services, it is necessary to assist users by presenting potential risk on financial and personality damage, before releasing privacy attributes. In this paper, we present a model of privacy attribute ontology and risk evaluation method on this ontology. Then we formalize several matching problems which optimize similarity scores of matching solutions under several different types of risk constraints. We show sophisticated polynomial-time algorithms for solving these optimization problems.

AB - Identity providers are becoming popular for distributed authentication and distributed identity management. Users' privacy attributes are stored at an identity provider and they are released to a service provider upon user's consent. Since a broad range of privacy information of different sensitiveness can be exchanged in advanced web services, it is necessary to assist users by presenting potential risk on financial and personality damage, before releasing privacy attributes. In this paper, we present a model of privacy attribute ontology and risk evaluation method on this ontology. Then we formalize several matching problems which optimize similarity scores of matching solutions under several different types of risk constraints. We show sophisticated polynomial-time algorithms for solving these optimization problems.

UR - http://www.scopus.com/inward/record.url?scp=57049121757&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=57049121757&partnerID=8YFLogxK

U2 - 10.1007/978-3-540-87877-3-15

DO - 10.1007/978-3-540-87877-3-15

M3 - Conference contribution

AN - SCOPUS:57049121757

SN - 3540878769

SN - 9783540878766

VL - 5231 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 183

EP - 198

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

ER -