Privacy-enhanced User-Centric Identity Management

被引:0
|
作者
Ahn, Gail-Joon [1 ]
Ko, Moonam [2 ]
Shehab, Mohamed [2 ]
机构
[1] Arizona State Univ, Tempe, AZ 85287 USA
[2] Univ N Carolina, Charlotte, NC USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
User-centric identity management approaches have received significant attention for managing private and critical identity attributes from the user's perspective. User-centric identity management allows users to control their own digital identities. Users are allowed to select their credentials when responding to an authentication or attribute requester and it gives users more rights and responsibility over their identity information. However, current user-centric approaches mainly focus on interoperable architectures between existing identity management systems and privacy issues have not been considered in depth. In this paper, we propose a category-based privacy preference approach to enhance the privacy of user-centric identity management systems. In addition, we present our proof-of-concept prototype of our approach in the Identity Metasystem.
引用
下载
收藏
页码:998 / +
页数:2
相关论文
共 50 条
  • [31] Ontology-based Risk Evaluation in User-centric Identity Management
    Ahn, Gail-Joon
    Sekar, Pradeep
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [32] Personalized identity agent for User-Centric IdM
    Kim, Seung-Hyun
    Ko, Han-Gyu
    Choi, Daeseon
    Kim, Soo Hyung
    Jin, Seunghun
    10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, : 1308 - +
  • [33] Towards privacy in enterprise directory services: A user-centric approach to attribute management
    Claycomb, William
    Shin, Dongwan
    Hareland, Della
    41ST ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2007, : 212 - +
  • [34] User-Centric Handling of Identity Agent Compromise
    Mashima, Daisuke
    Ahamad, Mustaque
    Kannan, Swagath
    COMPUTER SECURITY - ESORICS 2009, PROCEEDINGS, 2009, 5789 : 19 - 36
  • [35] User-centric thermal management for smartphones
    Song W.
    Kim J.
    Journal of Computing Science and Engineering, 2018, 12 (04) : 157 - 169
  • [36] Assessing Privacy Risks in Android: A User-Centric Approach
    Mylonas, Alexios
    Theoharidou, Marianthi
    Gritzalis, Dimitris
    RISK ASSESSMENT AND RISK-DRIVEN TESTING, RISK 2013, 2014, 8418 : 21 - 37
  • [37] Cloud Computing Privacy Issues and User-Centric Solution
    Lijo, V. P.
    Kalady, Saidalavi
    COMPUTER NETWORKS AND INTELLIGENT COMPUTING, 2011, 157 : 448 - 456
  • [38] A user-centric approach to information management
    Chakravarthy, S
    Liuzzi, R
    Wong, L
    IC-AI'2000: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 1-III, 2000, : 287 - 292
  • [39] User-Centric Protection and Privacy in Smart Surveillance Systems
    Vagts, Hauke
    Krempel, Erik
    Beyerer, Juergen
    FUTURE SECURITY, 2012, 318 : 237 - +
  • [40] Tangible Privacy: Towards User-Centric Sensor Designs for Bystander Privacy
    Ahmad I.
    Farzan R.
    Kapadia A.
    Lee A.J.
    1600, Association for Computing Machinery (04):