Risk evaluation for personal identity management based on privacy attribute ontology

Mizuho Iwaihara, Kohei Murakami, Gail Joon Ahn, Masatoshi Yoshikawa

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

Identity providers are becoming popular for distributed authentication and distributed identity management. Users' privacy attributes are stored at an identity provider and they are released to a service provider upon user's consent. Since a broad range of privacy information of different sensitiveness can be exchanged in advanced web services, it is necessary to assist users by presenting potential risk on financial and personality damage, before releasing privacy attributes. In this paper, we present a model of privacy attribute ontology and risk evaluation method on this ontology. Then we formalize several matching problems which optimize similarity scores of matching solutions under several different types of risk constraints. We show sophisticated polynomial-time algorithms for solving these optimization problems.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages183-198
Number of pages16
Volume5231 LNCS
DOIs
Publication statusPublished - 2008
Externally publishedYes
Event27th International Conference on Conceptual Modeling, ER 2008 - Barcelona
Duration: 2008 Oct 202008 Oct 24

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5231 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other27th International Conference on Conceptual Modeling, ER 2008
CityBarcelona
Period08/10/2008/10/24

    Fingerprint

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Iwaihara, M., Murakami, K., Ahn, G. J., & Yoshikawa, M. (2008). Risk evaluation for personal identity management based on privacy attribute ontology. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5231 LNCS, pp. 183-198). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5231 LNCS). https://doi.org/10.1007/978-3-540-87877-3-15