Information revelation and privacy in online social networks
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Automatic Compliance of Privacy Policies in Federated Digital Identity Management
POLICY '08 Proceedings of the 2008 IEEE Workshop on Policies for Distributed Systems and Networks
Controlled sharing of identity attributes for better privacy
COLCOM '07 Proceedings of the 2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing
An Ontology-Based Architecture for Federated Identity Management
AINA '09 Proceedings of the 2009 International Conference on Advanced Information Networking and Applications
Identity Management: A Primer
Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition
Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition
Privacy-enhanced user-centric identity management
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A Consistency Model for Identity Information in Distributed Systems
COMPSAC '10 Proceedings of the 2010 IEEE 34th Annual Computer Software and Applications Conference
NBIS '11 Proceedings of the 2011 14th International Conference on Network-Based Information Systems
D-FOAF: distributed identity management with access rights delegation
ASWC'06 Proceedings of the First Asian conference on The Semantic Web
Hi-index | 0.00 |
This paper describes the experience of IBM in creating digital identities for internal and external Web users to support social computing. IBM has sought to deploy pervasive personalization and social computing capabilities on its external Web site but finds itself faced with a number of legacy and disconnected user information systems never intended for this use. IBM has implemented a new Web user identity and profile system that draws from these existing master sources using Web services to present uniform and consistent user information to Web applications. It also provides a mechanism for the collection of user opt-in and privacy choices and provides mechanisms that ensure users' privacy choices are respected. This paper describes the motivating business need and presents the solution architecture, followed by a summary of the results, important but unfulfilled requirements, and a brief outlook for the future of profiling.