David Bourget (Western Ontario)
David Chalmers (ANU, NYU)
Rafael De Clercq
Jack Alan Reynolds
Learn more about PhilPapers
Identity in the Information Society 3 (3):639-656 (2010)
Identity governance is an emerging concept for fine-grained conditional disclosure of identity information and enforcement of corresponding data handling policies. Although numerous technologies underlying identity management have been developed, people still have difficulty obtaining a clear picture of how their identity information is maintained, used, and propagated. An identity management framework is described for tracking the history of how a person’s identity information is handled after it is transferred across domains of control and for enforcing meta-policies related to managing identity information distributed over the Internet. With this framework, organizations that manage identity information can improve accountability for their data practices and thereby increase their trustworthiness. The framework also enables users to control and optimize the propagation of their identity information in a user-centric manner
|Keywords||Identity governance Policy enforcement Privacy protection User-centricity|
|Categories||categorize this paper)|
Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
|Through your library|
References found in this work BETA
No references found.
Citations of this work BETA
No citations found.
Similar books and articles
Theodora Varvarigou & Vassiliki Andronikou (2009). Identity Management in GRID Computing and Service Oriented Architectures: Research and Practice. [REVIEW] Identity in the Information Society 2 (2):95-98.
Hanna Krasnova, Oliver Günther, Sarah Spiekermann & Ksenia Koroleva (2009). Privacy Concerns and Identity in Online Social Networks. Identity in the Information Society 2 (1):39-63.
Adrian Rahaman & Martina Angela Sasse (2010). A Framework for the Lived Experience of Identity. Identity in the Information Society 3 (3):605-638.
Dawn Jutla (2010). Layering Privacy on Operating Systems, Social Networks, and Other Platforms by Design. Identity in the Information Society 3 (2):319-341.
Lothar Fritsch, Kristin Skeide Fuglerud & Ivar Solheim (2010). Towards Inclusive Identity Management. Identity in the Information Society 3 (3):515-538.
Dirk van Rooy & Jacques Bus (2010). Trust and Privacy in the Future Internet—a Research Perspective. Identity in the Information Society 3 (2):397-404.
Seda Gürses (2010). PETs and Their Users: A Critical Review of the Potentials and Limitations of the Privacy as Confidentiality Paradigm. [REVIEW] Identity in the Information Society 3 (3):539-563.
Noëmi Manders-Huits (2010). Practical Versus Moral Identities in Identity Management. Ethics and Information Technology 12 (1):43-55.
Thierry Nabeth (2009). Social Web and Identity: A Likely Encounter. [REVIEW] Identity in the Information Society 2 (1):1-5.
Raymond Tallis (2010). Machine Generated Contents Note: Introduction; 1. Identity of Meaning / Adrian Poole; 2. Identity and the Law / Lionel Bently; 3. Species-Identity / Peter Crane; 4. Mathematical Identity / Marcus Du Sautoy; 5. Immunological Identity / Philippa Marrack; 6. Visualizing Identity / Ludmilla Jordanova; 7. Musical Identity / Christopher Hogwood; 8. Identity and the Mind. [REVIEW] In Giselle Walker & E. S. Leedham-Green (eds.), Identity. Cambridge University Press
Giselle Walker & E. S. Leedham-Green (eds.) (2010). Identity. Cambridge University Press.
Ann Cavoukian, Scott Taylor & Martin E. Abrams (2010). Privacy by Design: Essential for Organizational Accountability and Strong Business Practices. [REVIEW] Identity in the Information Society 3 (2):405-413.
Jean-Yves Beziau (1996). Identity, Structure and Logic. Bulletin of the Section of Logic 25:89-9.
Giulio Galiero & Gabriele Giammatteo (2009). Trusting Third-Party Storage Providers for Holding Personal Information. A Context-Based Approach to Protect Identity-Related Data in Untrusted Domains. Identity in the Information Society 2 (2):99-114.
Peter Hustinx (2010). Privacy by Design: Delivering the Promises. [REVIEW] Identity in the Information Society 3 (2):253-255.
Added to index2010-11-18
Total downloads10 ( #215,417 of 1,700,306 )
Recent downloads (6 months)3 ( #206,271 of 1,700,306 )
How can I increase my downloads?