Self-service Privacy: User-Centric Privacy for Network-Centric Identity

  • Jose M. del Alamo
  • Miguel A. Monjas
  • Juan C. Yelmo
  • Beatriz San Miguel
  • Ruben Trapero
  • Antonio M. Fernandez
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 321)


User privacy has become a hot topic within the identity management arena. However, the field still lacks comprehensive frameworks even though most identity management solutions include built-in privacy features. This study explores how best to set up a single control point for users to manage privacy policies for their personal information, which may be distributed (scattered) across a set of network-centric identity management systems. Our goal is a user-centric approach to privacy management. As the number of schemas and frameworks is very high, we chose to validate our findings with a prototype based on the Liberty Alliance architecture and protocols.


Privacy identity management user-centric network-centric user control 


  1. 1.
    Bonneau, J., Preibusch, S.: The Privacy Jungle: On the Market for Data Protection in Social Networks. In: the 8th Workshop on the Economics of Information Security, WEIS 2009 (2009)Google Scholar
  2. 2.
    Liberty Alliance Project,
  3. 3.
  4. 4.
    Cantor, S., et al.: Assertions and protocols for the OASIS Security Assertion Markup Language (SAML) Version 2.0. OASIS Standard. OASIS Security Services TC (2005)Google Scholar
  5. 5.
    Goodner, M., Nadalin, A. (eds.): Web Services Federation Language (WS-Federation) Version 1.2. OASIS Standard. OASIS Web Services Federation (WSFED) TC (2009)Google Scholar
  6. 6.
    Kainulainen, J., Ranganathan, A. (eds.): Liberty ID-WSF Data Services Template Specification, Version 2.1. Liberty Alliance Project (2006)Google Scholar
  7. 7.
    Bhargav-Spantzely, A., Camenisch, J., Gross, T., Sommer, D.: User centricity: A taxonomy and open issues. In: The Second ACM Workshop on Digital Identity Management (DIM 2006), pp. 493–527. IOS Press, Amsterdam (2007)Google Scholar
  8. 8.
    OpenID Web site,
  9. 9.
    Light-Weight Identity Web site,
  10. 10.
    Jones, M., McIntosh, M. (eds.): Identity Metasystem Interoperability Version 1.0. OASIS Standard. Identity Metasystem Interoperability (IMI) TC (2009)Google Scholar
  11. 11.
    Information Card Foundation,
  12. 12.
  13. 13.
  14. 14.
    Alrodhan, W.A., Mitchell, C.J.: Addressing privacy issues in Cardspace. In: The Third International Symposium on Information Assurance and Security, pp. 285–291. IEEE Computer Society, Washington (2007)Google Scholar
  15. 15.
    Moses, T. (ed.): Extensible Access Control Markup Language (XACML), Version 2.0. OASIS Standard. OASIS eXtensible Access Control Markup Language (XACML) TC (2005)Google Scholar
  16. 16.
    Aarts, R., Madsen, P. (eds.): Liberty Id-WSF Interaction Service Specification, Version 2.0-errata-v1.0. Liberty Alliance Project (2007)Google Scholar
  17. 17.
  18. 18.
    Sun’s XACML Implementation,
  19. 19.
    Madsen, P. (ed.): Liberty IGF Privacy Constraints Specification, Version 1.0. Liberty Alliance Project (2009)Google Scholar
  20. 20.
    Leenes, R., Schallaböck, J., Hansen, M.: PRIME White Paper, Version 3. PRIME Project (2008)Google Scholar
  21. 21.
    Hewlett-Packard Development Company: HP Virtual Identity and Profile Broker. Hewlett-Packard (2007)Google Scholar
  22. 22.
  23. 23.
    Article 29 of the Data Protection Working Party, The Future of Privacy - Joint contribution to the Consultation of the European Commission on the legal framework for the fundamental right to protection of personal data, 02356/09/EN (December 01, 2009)Google Scholar

Copyright information

© IFIP 2010

Authors and Affiliations

  • Jose M. del Alamo
    • 1
  • Miguel A. Monjas
    • 2
  • Juan C. Yelmo
    • 1
  • Beatriz San Miguel
    • 1
  • Ruben Trapero
    • 1
  • Antonio M. Fernandez
    • 1
  1. 1.Universidad Politécnica de MadridMadridSpain
  2. 2.Technology and Innovation UnitMadrid R&D CenterEricsson

Personalised recommendations