SlideShare uma empresa Scribd logo
1 de 21
Baixar para ler offline
Exploring Visualization Techniques to
                  Enhance Privacy Control UX for User-
                             Managed Access

                           Newcastle University

                        Domenico Catalano, Maciej Wolniak
                              and the Smart Team




21st July, 2011                         1                   V.3
Agenda

• Data sharing and online privacy
• SmartAM Information Ecology
• Enhance privacy control
 ‣ UMA Connection
 ‣ UMA Control bridge

• Future works
• User Experience
                        2
Data sharing
           Online Privacy is about sharing



                                 Reputational
               Historical                 Vocational

Biographical                                    Genealogical

Transactional                             Computational

          Biological                     Locational
                            Relational




                                3
The Paradigm
User Data sharing and online Privacy




                 4
SmartAM Information Ecology

                  Context




        Content             User




                     5
SmartAM Information Ecology
                                                     Context




• UMA/SmartAM Context                           Content        User




 ‣ Provide an advance system to allow internet user
   to protect and share online information
 ‣ Prevent of lost of user privacy
 ‣ Adhere to the international privacy regulations
 ‣ Secure online information (access control)


                         6
SmartAM Information Ecology
                                                     Context




•   UMA/SmartAM Content                         Content        User




    ‣ Authorizing User information
    ‣ Authorizing User’s Web resource info
    ‣ Authorization Policies
    ‣ Requesting Parties Information
    ‣ Analytics information (who, when, what)


                           7
SmartAM Information Ecology
                                                  Context




•   UMA/SmartAM User                         Content        User




    ‣ Internet User/Social networking user
    ‣ Company
    ‣ Developer
    ‣ Government
    ‣ Curios!!


                           8
SmartAM UX




    9
SmartAM states system
                                                                                                                                                          smartam UX Study
                                                                                                  Subject                                                 Possible actions and states of the system

                                                                   Authorizing User
                                                                      interaction
                                                                                                                        B1
                                                                                                       Initial state

                                       Requester
                                                                     Host Site                                                      AM
                                                                                                                                  Homepage

                                         APP
                                                                                                                        B2
                                                                        Host                                                                                   B5
                                                                                                                                             B4
                                                                                                         Privacy                                                                 Conceptual model


                                                                                                           Not
                                                                                                                                                            Learn
                                                                                                        registered                B3                                                    Dev
                                                                                                                                                            More
                                                                                                           User
                                                                      Resource
                                                                                           A1
                                                                                                                       A3
                                                                                                                                                                                           B9
                                                                                                                                                B7
                                                                                                                            B6
                                                                                                                                                          B8
                                                                      Protect &        Initial state                                                                                    Wiki
                                                                       Share

                                                                                                        A2

                                                                                                                                                                                       Consent
                                                                                                                                                C2                  Privileged
                                                                                      C1                                           User                                               App Actions
                                         Client                                                                                                                      App for
                                                   Initial state                                                                   Login                             MySelf
                                                                                                                                                                                        Policy
                                                                                                                                                                                       Definition


                                                                                                                       B10                             A4




                                                                                                                        User                  B11                          View
                                                                                                                       Welcome
                                                                                                                                                                         Resource
                                                                                                                        Page
Possible                   Visible                                                                                                                                                         A10
                                                                                                                                             Consent           A5
Actions                   Things                                                                                                             Default                             A9
           User intentions                                                                                                                    Policy
                 vs
             Required                                                                                                                                          A6                        A8
                                                                        Manage                   User                   Control              Resource                     Setting                   Resource
              Actions                                                   Contacts                Settings                Bridge               Registered                   Policy                     Shared



       State of System                                                                                                                                                  A7



                                                                                                                                                                        Connection



                                                                                                                       10
Understand the nature of data sharing
  policy in distributed environment

•   UMA model centralizes the authorization policies for all the
    Authorizing User's distributed web resource (protected resource).

•   The externalization of the policies introduces a new level of
    complexity because the user must (mentally) map the authorization
    structure for each resource, in more sophisticate one.

•   This new layer must be able to abstracting the existent, although it
    must be able to enhance the control on the information that will be
    shared.

•   Increasing of Protected resources and requesting parties could be
    mentally difficult for the user to maintain control in practice on the
    information.


                                  11
Risks



• Lost of Privacy
• Exploit of online personal Information
• Security breach

                      12
Enhance Privacy Control through
               visualization

• As result a context authorization policy and a
   governor system is definitely desirable.

• We introduce two new design concepts:
  ‣   UMA   Connection

  ‣   UMA   Control
               bridge
                        TM




• A visualization tool is necessary to facilitate the
   creation of the sharing policy and the control of the
   privacy.


                             13
UMA Connection
•   An UMA Connection defines a context of the data sharing policy.
    ‣   It’s a set of objects, including Contacts, authorized Apps and allowed actions
        on a specific resource.

    ‣   It can include access restrictions (i.e. period validity) and/or Trusted Claims
        request to restrict access based on subject’s information.

•   An UMA Connection is fundamental to enhance user control for
    what purpose the information will be revealed.

•   UMA Connection uses a visualization approach which helps user to
    define an appropriate context.

•   An Authorizing User can create a Connection for him-self or for
    others.

•   A Connection doesn’t incapsulate other connections.
                                         14
Structure of UMA Connection




             15
Visualizing UMA Connection


                   Resource
                                                                        Social
                                                                        Apps

                                                        Class
                                  Connection
                         Others


                                                                 Prof
                                        University


                                                      Contacts




UMA   Connection
                                                 16
UMA Control bridge

      • UMA Control bridge
        ‣   Is designed to adhere to the user-centric identity paradigm.

        ‣   Provides a primary user interface for control Resources,
            Connections, Apps and requesters.

        ‣   Provides a dashboard with main statistic information about
            connection, shared data, etc.

        ‣   Incorporates a single view of these main controls, including a
            notification bar for new access request.

        ‣   Provides 3-steps actions to get access to specific view, excluding
            optional view.

UMA   Control
         bridge
                  TM

                                       17
Maintain control on Information that will
              be revealed


                     Prof           Class


                      University                         Business

          Friend                     Personal Data
                   Collab                            Professional MySelf

      ProjectA
                            Self-Registration


                                                MySelf




                                      18
Future works



• Graph Algorithm
• Super Connection (Basket of Resources)
• Visualization techniques (HTML5)

                    19
User eXperience




       20
Thanks




  21

Mais conteúdo relacionado

Semelhante a Exploring Visualization Techniques to Enhance Privacy Control UX for User-Managed Access

Managing the Data Center with JBoss SOA-P
Managing the Data Center with JBoss SOA-PManaging the Data Center with JBoss SOA-P
Managing the Data Center with JBoss SOA-PColloquium
 
Mobile Monday Silicon Valley June 1st 09 V1
Mobile Monday Silicon Valley June 1st 09 V1Mobile Monday Silicon Valley June 1st 09 V1
Mobile Monday Silicon Valley June 1st 09 V1Tim Haysom
 
Future Business Models using Virtual Simulation and Augmentation
Future Business Models using Virtual Simulation and AugmentationFuture Business Models using Virtual Simulation and Augmentation
Future Business Models using Virtual Simulation and AugmentationBiju Shoolapani
 
2. FOMS _ FeedHenry_ Mícheál Ó Foghlú
2. FOMS _ FeedHenry_ Mícheál Ó Foghlú2. FOMS _ FeedHenry_ Mícheál Ó Foghlú
2. FOMS _ FeedHenry_ Mícheál Ó FoghlúFOMS011
 
Presentatie peter vink back to the future, TASS technology solutions
Presentatie peter vink   back to the future, TASS technology solutionsPresentatie peter vink   back to the future, TASS technology solutions
Presentatie peter vink back to the future, TASS technology solutions#devdate
 
Leadership Symposium on Digital Media in Healthcare
Leadership Symposium on Digital Media in HealthcareLeadership Symposium on Digital Media in Healthcare
Leadership Symposium on Digital Media in Healthcaresetstanford
 

Semelhante a Exploring Visualization Techniques to Enhance Privacy Control UX for User-Managed Access (9)

On Semantics in Onto-DIY
On Semantics in Onto-DIYOn Semantics in Onto-DIY
On Semantics in Onto-DIY
 
A user centric vision for publishers
A user centric vision for publishersA user centric vision for publishers
A user centric vision for publishers
 
Managing the Data Center with JBoss SOA-P
Managing the Data Center with JBoss SOA-PManaging the Data Center with JBoss SOA-P
Managing the Data Center with JBoss SOA-P
 
Mobile Monday Silicon Valley June 1st 09 V1
Mobile Monday Silicon Valley June 1st 09 V1Mobile Monday Silicon Valley June 1st 09 V1
Mobile Monday Silicon Valley June 1st 09 V1
 
Future Business Models using Virtual Simulation and Augmentation
Future Business Models using Virtual Simulation and AugmentationFuture Business Models using Virtual Simulation and Augmentation
Future Business Models using Virtual Simulation and Augmentation
 
2. FOMS _ FeedHenry_ Mícheál Ó Foghlú
2. FOMS _ FeedHenry_ Mícheál Ó Foghlú2. FOMS _ FeedHenry_ Mícheál Ó Foghlú
2. FOMS _ FeedHenry_ Mícheál Ó Foghlú
 
IT Governance Portals
IT Governance   PortalsIT Governance   Portals
IT Governance Portals
 
Presentatie peter vink back to the future, TASS technology solutions
Presentatie peter vink   back to the future, TASS technology solutionsPresentatie peter vink   back to the future, TASS technology solutions
Presentatie peter vink back to the future, TASS technology solutions
 
Leadership Symposium on Digital Media in Healthcare
Leadership Symposium on Digital Media in HealthcareLeadership Symposium on Digital Media in Healthcare
Leadership Symposium on Digital Media in Healthcare
 

Mais de Domenico Catalano

Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAProtecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMADomenico Catalano
 
UMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenarioUMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenarioDomenico Catalano
 
Enterprise Mobility: Secure Containerization
Enterprise Mobility: Secure ContainerizationEnterprise Mobility: Secure Containerization
Enterprise Mobility: Secure ContainerizationDomenico Catalano
 
User-Access Manager: Key to Life Management Platform
User-Access Manager: Key to Life Management PlatformUser-Access Manager: Key to Life Management Platform
User-Access Manager: Key to Life Management PlatformDomenico Catalano
 
Securing Internet Payment Systems
Securing Internet Payment SystemsSecuring Internet Payment Systems
Securing Internet Payment SystemsDomenico Catalano
 

Mais de Domenico Catalano (7)

Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAProtecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMA
 
UMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenarioUMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenario
 
Enterprise Mobility: Secure Containerization
Enterprise Mobility: Secure ContainerizationEnterprise Mobility: Secure Containerization
Enterprise Mobility: Secure Containerization
 
User-Access Manager: Key to Life Management Platform
User-Access Manager: Key to Life Management PlatformUser-Access Manager: Key to Life Management Platform
User-Access Manager: Key to Life Management Platform
 
Uma sec council_june_22_v4
Uma sec council_june_22_v4Uma sec council_june_22_v4
Uma sec council_june_22_v4
 
Securing Internet Payment Systems
Securing Internet Payment SystemsSecuring Internet Payment Systems
Securing Internet Payment Systems
 
UMA Trusted Claims
UMA Trusted ClaimsUMA Trusted Claims
UMA Trusted Claims
 

Último

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Último (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Exploring Visualization Techniques to Enhance Privacy Control UX for User-Managed Access

  • 1. Exploring Visualization Techniques to Enhance Privacy Control UX for User- Managed Access Newcastle University Domenico Catalano, Maciej Wolniak and the Smart Team 21st July, 2011 1 V.3
  • 2. Agenda • Data sharing and online privacy • SmartAM Information Ecology • Enhance privacy control ‣ UMA Connection ‣ UMA Control bridge • Future works • User Experience 2
  • 3. Data sharing Online Privacy is about sharing Reputational Historical Vocational Biographical Genealogical Transactional Computational Biological Locational Relational 3
  • 4. The Paradigm User Data sharing and online Privacy 4
  • 5. SmartAM Information Ecology Context Content User 5
  • 6. SmartAM Information Ecology Context • UMA/SmartAM Context Content User ‣ Provide an advance system to allow internet user to protect and share online information ‣ Prevent of lost of user privacy ‣ Adhere to the international privacy regulations ‣ Secure online information (access control) 6
  • 7. SmartAM Information Ecology Context • UMA/SmartAM Content Content User ‣ Authorizing User information ‣ Authorizing User’s Web resource info ‣ Authorization Policies ‣ Requesting Parties Information ‣ Analytics information (who, when, what) 7
  • 8. SmartAM Information Ecology Context • UMA/SmartAM User Content User ‣ Internet User/Social networking user ‣ Company ‣ Developer ‣ Government ‣ Curios!! 8
  • 10. SmartAM states system smartam UX Study Subject Possible actions and states of the system Authorizing User interaction B1 Initial state Requester Host Site AM Homepage APP B2 Host B5 B4 Privacy Conceptual model Not Learn registered B3 Dev More User Resource A1 A3 B9 B7 B6 B8 Protect & Initial state Wiki Share A2 Consent C2 Privileged C1 User App Actions Client App for Initial state Login MySelf Policy Definition B10 A4 User B11 View Welcome Resource Page Possible Visible A10 Consent A5 Actions Things Default A9 User intentions Policy vs Required A6 A8 Manage User Control Resource Setting Resource Actions Contacts Settings Bridge Registered Policy Shared State of System A7 Connection 10
  • 11. Understand the nature of data sharing policy in distributed environment • UMA model centralizes the authorization policies for all the Authorizing User's distributed web resource (protected resource). • The externalization of the policies introduces a new level of complexity because the user must (mentally) map the authorization structure for each resource, in more sophisticate one. • This new layer must be able to abstracting the existent, although it must be able to enhance the control on the information that will be shared. • Increasing of Protected resources and requesting parties could be mentally difficult for the user to maintain control in practice on the information. 11
  • 12. Risks • Lost of Privacy • Exploit of online personal Information • Security breach 12
  • 13. Enhance Privacy Control through visualization • As result a context authorization policy and a governor system is definitely desirable. • We introduce two new design concepts: ‣ UMA Connection ‣ UMA Control bridge TM • A visualization tool is necessary to facilitate the creation of the sharing policy and the control of the privacy. 13
  • 14. UMA Connection • An UMA Connection defines a context of the data sharing policy. ‣ It’s a set of objects, including Contacts, authorized Apps and allowed actions on a specific resource. ‣ It can include access restrictions (i.e. period validity) and/or Trusted Claims request to restrict access based on subject’s information. • An UMA Connection is fundamental to enhance user control for what purpose the information will be revealed. • UMA Connection uses a visualization approach which helps user to define an appropriate context. • An Authorizing User can create a Connection for him-self or for others. • A Connection doesn’t incapsulate other connections. 14
  • 15. Structure of UMA Connection 15
  • 16. Visualizing UMA Connection Resource Social Apps Class Connection Others Prof University Contacts UMA Connection 16
  • 17. UMA Control bridge • UMA Control bridge ‣ Is designed to adhere to the user-centric identity paradigm. ‣ Provides a primary user interface for control Resources, Connections, Apps and requesters. ‣ Provides a dashboard with main statistic information about connection, shared data, etc. ‣ Incorporates a single view of these main controls, including a notification bar for new access request. ‣ Provides 3-steps actions to get access to specific view, excluding optional view. UMA Control bridge TM 17
  • 18. Maintain control on Information that will be revealed Prof Class University Business Friend Personal Data Collab Professional MySelf ProjectA Self-Registration MySelf 18
  • 19. Future works • Graph Algorithm • Super Connection (Basket of Resources) • Visualization techniques (HTML5) 19