Data & Knowledge Engineering
Computers and Intractability: A Guide to the Theory of NP-Completeness
Computers and Intractability: A Guide to the Theory of NP-Completeness
Sociotechnical Architecture for Online Privacy
IEEE Security and Privacy
Enhancing Web Privacy Protection through Declarative Policies
POLICY '05 Proceedings of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks
Leveraging data and structure in ontology integration
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Protection of users' data confidentiality in cloud computing
Proceedings of the Second Asia-Pacific Symposium on Internetware
Trend analysis and recommendation of users' privacy settings on social networking services
SocInfo'11 Proceedings of the Third international conference on Social informatics
Hi-index | 0.00 |
Identity providers are becoming popular for distributed authentication and distributed identity management. Users' privacy attributes are stored at an identity provider and they are released to a service provider upon user's consent. Since a broad range of privacy information of different sensitiveness can be exchanged in advanced web services, it is necessary to assist users by presenting potential risk on financial and personality damage, before releasing privacy attributes. In this paper, we present a model of privacy attribute ontology and risk evaluation method on this ontology. Then we formalize several matching problems which optimize similarity scores of matching solutions under several different types of risk constraints. We show sophisticated polynomial-time algorithms for solving these optimization problems.