Outils personnels
Vous êtes ici : Accueil Publications ePortfolio ePortfolio Proceedings ePortfolio 2007 Papers and abstracts Digital Identity and Privacy

Digital Identity and Privacy

Digital Identity and Privacy - DIP - (16th October 2007)

File Authorisation using Attributes from Multiple Authorities – A Study of Requirements
This paper presents the results of a survey of requirements for attribute aggregation in authorisation systems, gathered from an international community of security professionals. It then analyses these requirements against 4 generic models for attribute aggregation and makes some recommendations for future implementations.
File Increasing User Value through Professional Identity Profiles, Profile-based Connection Agents and Games
In this article authors present some improvements to profiles and knowledge management systems specialized in lifelong learning and career development that we believe are necessary in order to increase user value and motivation. First, authors reflect on the relevant information that should be provided in a “professional identity” profile in order to increase user value in the area of career development. Then social interaction is shown, in addition to solitary introspection, is necessary to provide users with the knowledge they need to make a career change. Authors also report on our exploration of agents and games that use profiles as a basis for connecting people.
File The Next Generation of Identity Federated Architectures
In this presentation author presents the latest reflections and developments in the field of digital identity management.
File Building HR-XML Compliant Systems on top of Liberty Alliance ID Management
The present document defines an ID-SIS Data Service based on the Data Services2 Template (DST 2.1) that enables the manifold benefits of ID-WSF to be used with HR-XML. The service, called ID-HR-XML, provides interfaces for creating, querying, modifying, and deleting HR-XML documents from a central repository (push or poll model) as well as subscribing to notifications about changes to the data (pull model). The web services interface follows the Liberty framework while the payload is HR-XML.30
File Overcoming the Limitations of k-anonymity Through Association Rule Hiding
The concept of k-anonymity has been proposed as an effective way to anonymise microdata, where every record in the anonymised microdata must be related to at least k other records or individuals. In this paper, author discusses this limitation of k-anonymity and propose an anonymisation approach to overcome this limitation by combining k-anonymisation with association rule hiding.
File Identity Representation in Digital Interactions
The "Active Identities" programme will focus on the opportunities that digital identities provide for individuals and organizations, while not losing sight of risks and threats. We will explore identity as a resource, a means for individuals to control their life and, for organizations a source of innovation and value creation.
File Balancing Privacy and Information Utility in Data Anonymisation
In order to protect the privacy of individuals in sensitive data that has been released for analysis, it is not sufficient to de-identify the data by removing explicit identifiers, such as names and addresses. The data must also be anonymised, so as to prevent compromising the privacy of individuals through the manipulation of the data and / or by matching it with other sources of data.
Actions sur le document