Architecting Interoperable Privacy within User-Centric Federated Digital Identity Systems: Overview of a Service-Oriented Implementation Framework Ghazi Ben Ayed1, Solange Ghernaouti-Hélie1 1

Information Systems Institute, Faculty of Business and Economics, University of Lausanne, CH-1015, Lausanne, Switzerland {Ghazi.Benayed, Sgh}@unil.ch

Abstract. With the emergence of service-oriented economy, distributed systems and cloud computing, thus the development of service oriented architecture and the adoption open standards become a mean to assure interoperability. Privacy could play a key role for digital identity protection and security. We suggest an implementation framework, Privacy-as-a-Set-ofServices (PaaSS) framework, which could help information system’s security team to implement digital identity privacy requirements into a set of services. The framework relays on the idea that digital identity privacy business interoperability should be taken into consideration from the outset of the project in order to be able to provide technical interoperability. Business interoperability is a set of requirements that are drawn from global, domestic and business-specific privacy policies, however, technical interoperability is offered through the adoption of open standards and implementation of a set of services and service’s interfaces that could accommodate SOA. The framework is in accordance of model-driven architecture (MDA) approach and it is composed of five layers and three mapping gateways. Inter- & intra-layers iterations are consequence of SOA delivery lifecycle and strategies alignment. Keywords: SOA, Privacy, Digital identity, Implementation framework.

1 Introduction The digital society is being criminalized. The fraudulent use of individual identity has increased at an alarming rate, thus effective privacy and identity management can play a key role to secure participation in digital society. When privacy is compromised, security of the individual, the organization or the country could be threatened. The dramatic increase in identity theft and other types of digital identity is unlikely to end soon. Security, identity theft, incorrect computer records, credit rating destruction, privacy, online purchasing and banking, loss of identity, misuse of personal information, phishing, identity cards, behavioral monitoring and tracking, etc. The list of concerns is long and people still feel concerned and worried about the digital world, security and loss of control. Criminal forces have organized themselves internationally to trick users into releasing valuable information through phishing

Architecting Interoperable Privacy within User-Centric ...

systems and cloud computing, thus the development of service oriented architecture and the adoption open standards become a mean to assure interoperability.

8KB Sizes 0 Downloads 98 Views

Recommend Documents

Toward Interoperable Data Synchronization with ...
application to be selected from a catalog. Alternatively, for preexisting synchronization ... IBM Thomas J. Watson Research Center. {ncohen,apu}@us.ibm.com.

Cheap privacy filter 14 inch Laptop Privacy Screens Anti Privacy ...
Cheap privacy filter 14 inch Laptop Privacy Screens A ... Monitor 31.0df17.4cm Privacy Anti-Spy Screen 16-9.pdf. Cheap privacy filter 14 inch Laptop Privacy ...

Developing Interoperable Business Processes Using Web Services ...
Abstract. A Web service is an accessible application that other appli- cations and humans can discover and trigger to satisfy various needs. Thus, Web services ...

Towards Voluntary Interoperable Open Access ...
Nov 22, 2009 - Access to earth observation data has become critically important for the .... contained on the CD from the Internet, liability exposure could be as high as $1.5 ...... Price: €710,000 for five year period and unlimited number.

Interoperable metadata for a federation of learning ... - EFITA
There is no one all-encompassing metadata standard to be used in all applications. ... 'Information Technology for Learning, Education and Training (ITLET)' ...

Interoperable metadata for a federation of learning ... - EFITA
Keywords: learning object, metadata, application profile, portal ... 'Information Technology for Learning, Education and Training (ITLET)' (ISO/IEC JTC1 SC36,.

PRIVACY POLICY.pdf
Page 1 of 1. PRIVACY POLICY.pdf. PRIVACY POLICY.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying PRIVACY POLICY.pdf. Page 1 of 1.

Privacy Policy.pdf
[email protected]. Telephone number: (877) 8-CAESAR. Effective as of January 01, 2017. Page 3 of 3. Privacy Policy.pdf. Privacy Policy.pdf. Open.

User Privacy o User Privacy on Social Networking ...
As users are enjoying this new style of networking, privacy concerns are also attracting increasing public attention due to reports about privacy breaches on social networking sites. A significant amount of work for privacy protection on OSN(Online S

Privacy Cookie.pdf
I cookie sono dei file di testo che i siti visitati inviano al browser dell'utente e che. vengono memorizzati per poi essere ritrasmessi al sito alla visita successiva. 2.

Privacy Act Statement - USAREC
AUTHORITY: Collection of this information is authorized by 10 USC, sections 503 and 3013. PRINCIPAL PURPOSE: Information collected will be used to ...

Privacy Final
Sep 20, 2002 - personal information made possible by information technology. ..... Rachels, base their defense of privacy on grounds unrelated to autonomy, ...

PRIVACY POLICY.pdf
PRIVACY POLICY.pdf. PRIVACY POLICY.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying PRIVACY POLICY.pdf. Page 1 of 1.

Privacy Policy
Apr 17, 2017 - Your privacy matters to Google, so whether you are new to Google or a long- ... identifiers, and mobile network information including phone number). ... telephony log information, such as your phone number, calling-party number, ... Pa

Privacy-enhanced display device
Jan 15, 2009 - 5,463,428 A 10/1995 Ligtg? et al'. Darrell L. Lelgh ... 5,963,371 A 10/1999 Needham et al. .... This is a particular problem for laptop computers.

Privacy Policy.pdf
CalOPPA is the first state law in the nation to require commercial websites and online services. to post a privacy policy. The law's reach stretches well beyond ...