Abstract
Identity providers are becoming popular for distributed authentication and distributed identity management. Users’ privacy attributes are stored at an identity provider and they are released to a service provider upon user’s consent. Since a broad range of privacy information of different sensitiveness can be exchanged in advanced web services, it is necessary to assist users by presenting potential risk on financial and personality damage, before releasing privacy attributes. In this paper, we present a model of privacy attribute ontology and risk evaluation method on this ontology. Then we formalize several matching problems which optimize similarity scores of matching solutions under several different types of risk constraints. We show sophisticated polynomial-time algorithms for solving these optimization problems.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Microsoft Developer Network (MSDN) CardSpace page, http://msdn.microsoft.com/CardSpace
Cohen, W., Ravikumar, P., Feinberg, S.: A Comparison of String Metrics for Matching Names and Records. In: Proc. KDD Workshop on Data Cleaning and Object Consolidation (2003)
Garey, M.R., Johnson, D.S.: Computers and Intractability - A Guide to the Theory of NP-Completeness. Freeman, New York (1979)
Kagal, L., Finin, T.W., Joshi, A.: A Policy Based Approach to Security for the Semantic Web. In: Fensel, D., Sycara, K.P., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 402–418. Springer, Heidelberg (2003)
Jutla, D.N., Bodorik, P.: Sociotechnical Architecture for Online Privacy. IEEE Security & Privacy 3(2), 29–39 (2005)
Japan Network Security Association, Surveys on Information Security Incidents (in Japanese) (2006), http://www.jnsa.org/result/2006/pol/insident/070720/
Kolari, P., Li Ding, S., Ganjugunte, L., Kagal, A.J., Finin, T.: Enhancing Web Privacy Protection through Declarative Policies. In: Proc. IEEE Workshop on Policy for Distributed Systems and Networks(POLICY 2005) (June 2005)
Kuhn, H.W.: The Hungarian Method for the Assignment Problem. Naval Research Logistics Quarterly 2, 83–97 (1955)
Li, W.-S., Clifton, C.: SEMINT: a Tool for Identifying Attribute Correspondences in Heterogeneous Database Using Neural Networks. Data Knowledge Eng. 33(1), 49–84 (2000)
Liberty Alliance Project Homepage, http://www.projectliberty.org/
OpenID Foundation, http://openid.net/
OWL Web Ontology Language Overview, W3C Recommendation 10 (February 2004), http://www.w3.org/TR/owl-features/
Patel, C., Supekar, K., Lee, Y.: OntoGenie: Extracting Ontlogy Instances from WWW. In: Proc. Huaman Language Technology for the Semantic Web and Web Services, ISWC 2003 (2003)
The Platform for Privacy Preferences 1.1 (P3P1.1) Specification, W3C Working Group Note (November 13, 2006)
Udrea, O., Getoor, L., Miller, R.J.: Leveraging Data and Structure in Ontology Integration. In: Proc. ACM SIGMOD 2007, pp. 449–460 (2007)
WordNet — a Lexical Database for the English Language, Princeton University, http://wordnet.princeton.edu/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Iwaihara, M., Murakami, K., Ahn, GJ., Yoshikawa, M. (2008). Risk Evaluation for Personal Identity Management Based on Privacy Attribute Ontology. In: Li, Q., Spaccapietra, S., Yu, E., Olivé, A. (eds) Conceptual Modeling - ER 2008. ER 2008. Lecture Notes in Computer Science, vol 5231. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-87877-3_15
Download citation
DOI: https://doi.org/10.1007/978-3-540-87877-3_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-87876-6
Online ISBN: 978-3-540-87877-3
eBook Packages: Computer ScienceComputer Science (R0)