Skip to main content

Risk Evaluation for Personal Identity Management Based on Privacy Attribute Ontology

  • Conference paper
Conceptual Modeling - ER 2008 (ER 2008)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5231))

Included in the following conference series:

Abstract

Identity providers are becoming popular for distributed authentication and distributed identity management. Users’ privacy attributes are stored at an identity provider and they are released to a service provider upon user’s consent. Since a broad range of privacy information of different sensitiveness can be exchanged in advanced web services, it is necessary to assist users by presenting potential risk on financial and personality damage, before releasing privacy attributes. In this paper, we present a model of privacy attribute ontology and risk evaluation method on this ontology. Then we formalize several matching problems which optimize similarity scores of matching solutions under several different types of risk constraints. We show sophisticated polynomial-time algorithms for solving these optimization problems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Microsoft Developer Network (MSDN) CardSpace page, http://msdn.microsoft.com/CardSpace

  2. Cohen, W., Ravikumar, P., Feinberg, S.: A Comparison of String Metrics for Matching Names and Records. In: Proc. KDD Workshop on Data Cleaning and Object Consolidation (2003)

    Google Scholar 

  3. Garey, M.R., Johnson, D.S.: Computers and Intractability - A Guide to the Theory of NP-Completeness. Freeman, New York (1979)

    MATH  Google Scholar 

  4. Kagal, L., Finin, T.W., Joshi, A.: A Policy Based Approach to Security for the Semantic Web. In: Fensel, D., Sycara, K.P., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 402–418. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  5. Jutla, D.N., Bodorik, P.: Sociotechnical Architecture for Online Privacy. IEEE Security & Privacy 3(2), 29–39 (2005)

    Article  Google Scholar 

  6. Japan Network Security Association, Surveys on Information Security Incidents (in Japanese) (2006), http://www.jnsa.org/result/2006/pol/insident/070720/

  7. Kolari, P., Li Ding, S., Ganjugunte, L., Kagal, A.J., Finin, T.: Enhancing Web Privacy Protection through Declarative Policies. In: Proc. IEEE Workshop on Policy for Distributed Systems and Networks(POLICY 2005) (June 2005)

    Google Scholar 

  8. Kuhn, H.W.: The Hungarian Method for the Assignment Problem. Naval Research Logistics Quarterly 2, 83–97 (1955)

    Article  MathSciNet  MATH  Google Scholar 

  9. Li, W.-S., Clifton, C.: SEMINT: a Tool for Identifying Attribute Correspondences in Heterogeneous Database Using Neural Networks. Data Knowledge Eng. 33(1), 49–84 (2000)

    Article  MATH  Google Scholar 

  10. Liberty Alliance Project Homepage, http://www.projectliberty.org/

  11. OpenID Foundation, http://openid.net/

  12. OWL Web Ontology Language Overview, W3C Recommendation 10 (February 2004), http://www.w3.org/TR/owl-features/

  13. Patel, C., Supekar, K., Lee, Y.: OntoGenie: Extracting Ontlogy Instances from WWW. In: Proc. Huaman Language Technology for the Semantic Web and Web Services, ISWC 2003 (2003)

    Google Scholar 

  14. The Platform for Privacy Preferences 1.1 (P3P1.1) Specification, W3C Working Group Note (November 13, 2006)

    Google Scholar 

  15. Udrea, O., Getoor, L., Miller, R.J.: Leveraging Data and Structure in Ontology Integration. In: Proc. ACM SIGMOD 2007, pp. 449–460 (2007)

    Google Scholar 

  16. WordNet — a Lexical Database for the English Language, Princeton University, http://wordnet.princeton.edu/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Iwaihara, M., Murakami, K., Ahn, GJ., Yoshikawa, M. (2008). Risk Evaluation for Personal Identity Management Based on Privacy Attribute Ontology. In: Li, Q., Spaccapietra, S., Yu, E., Olivé, A. (eds) Conceptual Modeling - ER 2008. ER 2008. Lecture Notes in Computer Science, vol 5231. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-87877-3_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-87877-3_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-87876-6

  • Online ISBN: 978-3-540-87877-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics