Privacy policies compliance across digital identity management systems

Anna C. Squicciarini, Alexei Czeskis, Abhilasha Bhargav-Spantzel

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Abstract

An emerging approach for protecting identities of individuals, while at the same time enhancing user convenience, is represented by federated identity management systems. In this paper we develop an approach to support privacy controlled sharing of identity attributes in federated environments. We present a wide range of strategies that enable users to trace their personal information across the federation and verify whether it has been managed according to their privacy preferences. Users can employ one or more of these strategies according to their goals and priorities. Additionally, we analyze the challenging issue of data, privacy policy, and preference updates in a federated system. Our algorithm allows users and federated service providers to control whether new versions of data and users' privacy references have been used, and detect possible inconsistencies.

Original languageEnglish (US)
Title of host publicationProceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, SPRINGL'08
Pages72-81
Number of pages10
DOIs
StatePublished - Dec 1 2008
EventSIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, SPRINGL'08 - Irvine, CA, United States
Duration: Nov 4 2008Nov 4 2008

Publication series

NameProceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, SPRINGL'08

Other

OtherSIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, SPRINGL'08
CountryUnited States
CityIrvine, CA
Period11/4/0811/4/08

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Information Systems
  • Software

Fingerprint Dive into the research topics of 'Privacy policies compliance across digital identity management systems'. Together they form a unique fingerprint.

  • Cite this

    Squicciarini, A. C., Czeskis, A., & Bhargav-Spantzel, A. (2008). Privacy policies compliance across digital identity management systems. In Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, SPRINGL'08 (pp. 72-81). (Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, SPRINGL'08). https://doi.org/10.1145/1503402.1503416