Risk evaluation for personal identity management based on privacy attribute ontology

Mizuho Iwaihara*, Kohei Murakami, Gail Joon Ahn, Masatoshi Yoshikawa

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)


Identity providers are becoming popular for distributed authentication and distributed identity management. Users' privacy attributes are stored at an identity provider and they are released to a service provider upon user's consent. Since a broad range of privacy information of different sensitiveness can be exchanged in advanced web services, it is necessary to assist users by presenting potential risk on financial and personality damage, before releasing privacy attributes. In this paper, we present a model of privacy attribute ontology and risk evaluation method on this ontology. Then we formalize several matching problems which optimize similarity scores of matching solutions under several different types of risk constraints. We show sophisticated polynomial-time algorithms for solving these optimization problems.

Original languageEnglish
Title of host publicationConceptual Modeling - ER 2008 - 27th International Conference on Conceptual Modeling, Proceedings
PublisherSpringer Verlag
Number of pages16
ISBN (Print)3540878769, 9783540878766
Publication statusPublished - 2008
Externally publishedYes
Event27th International Conference on Conceptual Modeling, ER 2008 - Barcelona, Spain
Duration: 2008 Oct 202008 Oct 24

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5231 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference27th International Conference on Conceptual Modeling, ER 2008

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)


Dive into the research topics of 'Risk evaluation for personal identity management based on privacy attribute ontology'. Together they form a unique fingerprint.

Cite this