SlideShare uma empresa Scribd logo
1 de 21
Baixar para ler offline
Exploring Visualization Techniques to
                  Enhance Privacy Control UX for User-
                             Managed Access

                           Newcastle University

                        Domenico Catalano, Maciej Wolniak
                              and the Smart Team




21st July, 2011                         1                   V.3
Agenda

• Data sharing and online privacy
• SmartAM Information Ecology
• Enhance privacy control
 ‣ UMA Connection
 ‣ UMA Control bridge

• Future works
• User Experience
                        2
Data sharing
           Online Privacy is about sharing



                                 Reputational
               Historical                 Vocational

Biographical                                    Genealogical

Transactional                             Computational

          Biological                     Locational
                            Relational




                                3
The Paradigm
User Data sharing and online Privacy




                 4
SmartAM Information Ecology

                  Context




        Content             User




                     5
SmartAM Information Ecology
                                                     Context




• UMA/SmartAM Context                           Content        User




 ‣ Provide an advance system to allow internet user
   to protect and share online information
 ‣ Prevent of lost of user privacy
 ‣ Adhere to the international privacy regulations
 ‣ Secure online information (access control)


                         6
SmartAM Information Ecology
                                                     Context




•   UMA/SmartAM Content                         Content        User




    ‣ Authorizing User information
    ‣ Authorizing User’s Web resource info
    ‣ Authorization Policies
    ‣ Requesting Parties Information
    ‣ Analytics information (who, when, what)


                           7
SmartAM Information Ecology
                                                  Context




•   UMA/SmartAM User                         Content        User




    ‣ Internet User/Social networking user
    ‣ Company
    ‣ Developer
    ‣ Government
    ‣ Curios!!


                           8
SmartAM UX




    9
SmartAM states system
                                                                                                                                                          smartam UX Study
                                                                                                  Subject                                                 Possible actions and states of the system

                                                                   Authorizing User
                                                                      interaction
                                                                                                                        B1
                                                                                                       Initial state

                                       Requester
                                                                     Host Site                                                      AM
                                                                                                                                  Homepage

                                         APP
                                                                                                                        B2
                                                                        Host                                                                                   B5
                                                                                                                                             B4
                                                                                                         Privacy                                                                 Conceptual model


                                                                                                           Not
                                                                                                                                                            Learn
                                                                                                        registered                B3                                                    Dev
                                                                                                                                                            More
                                                                                                           User
                                                                      Resource
                                                                                           A1
                                                                                                                       A3
                                                                                                                                                                                           B9
                                                                                                                                                B7
                                                                                                                            B6
                                                                                                                                                          B8
                                                                      Protect &        Initial state                                                                                    Wiki
                                                                       Share

                                                                                                        A2

                                                                                                                                                                                       Consent
                                                                                                                                                C2                  Privileged
                                                                                      C1                                           User                                               App Actions
                                         Client                                                                                                                      App for
                                                   Initial state                                                                   Login                             MySelf
                                                                                                                                                                                        Policy
                                                                                                                                                                                       Definition


                                                                                                                       B10                             A4




                                                                                                                        User                  B11                          View
                                                                                                                       Welcome
                                                                                                                                                                         Resource
                                                                                                                        Page
Possible                   Visible                                                                                                                                                         A10
                                                                                                                                             Consent           A5
Actions                   Things                                                                                                             Default                             A9
           User intentions                                                                                                                    Policy
                 vs
             Required                                                                                                                                          A6                        A8
                                                                        Manage                   User                   Control              Resource                     Setting                   Resource
              Actions                                                   Contacts                Settings                Bridge               Registered                   Policy                     Shared



       State of System                                                                                                                                                  A7



                                                                                                                                                                        Connection



                                                                                                                       10
Understand the nature of data sharing
  policy in distributed environment

•   UMA model centralizes the authorization policies for all the
    Authorizing User's distributed web resource (protected resource).

•   The externalization of the policies introduces a new level of
    complexity because the user must (mentally) map the authorization
    structure for each resource, in more sophisticate one.

•   This new layer must be able to abstracting the existent, although it
    must be able to enhance the control on the information that will be
    shared.

•   Increasing of Protected resources and requesting parties could be
    mentally difficult for the user to maintain control in practice on the
    information.


                                  11
Risks



• Lost of Privacy
• Exploit of online personal Information
• Security breach

                      12
Enhance Privacy Control through
               visualization

• As result a context authorization policy and a
   governor system is definitely desirable.

• We introduce two new design concepts:
  ‣   UMA   Connection

  ‣   UMA   Control
               bridge
                        TM




• A visualization tool is necessary to facilitate the
   creation of the sharing policy and the control of the
   privacy.


                             13
UMA Connection
•   An UMA Connection defines a context of the data sharing policy.
    ‣   It’s a set of objects, including Contacts, authorized Apps and allowed actions
        on a specific resource.

    ‣   It can include access restrictions (i.e. period validity) and/or Trusted Claims
        request to restrict access based on subject’s information.

•   An UMA Connection is fundamental to enhance user control for
    what purpose the information will be revealed.

•   UMA Connection uses a visualization approach which helps user to
    define an appropriate context.

•   An Authorizing User can create a Connection for him-self or for
    others.

•   A Connection doesn’t incapsulate other connections.
                                         14
Structure of UMA Connection




             15
Visualizing UMA Connection


                   Resource
                                                                        Social
                                                                        Apps

                                                        Class
                                  Connection
                         Others


                                                                 Prof
                                        University


                                                      Contacts




UMA   Connection
                                                 16
UMA Control bridge

      • UMA Control bridge
        ‣   Is designed to adhere to the user-centric identity paradigm.

        ‣   Provides a primary user interface for control Resources,
            Connections, Apps and requesters.

        ‣   Provides a dashboard with main statistic information about
            connection, shared data, etc.

        ‣   Incorporates a single view of these main controls, including a
            notification bar for new access request.

        ‣   Provides 3-steps actions to get access to specific view, excluding
            optional view.

UMA   Control
         bridge
                  TM

                                       17
Maintain control on Information that will
              be revealed


                     Prof           Class


                      University                         Business

          Friend                     Personal Data
                   Collab                            Professional MySelf

      ProjectA
                            Self-Registration


                                                MySelf




                                      18
Future works



• Graph Algorithm
• Super Connection (Basket of Resources)
• Visualization techniques (HTML5)

                    19
User eXperience




       20
Thanks




  21

Mais conteúdo relacionado

Semelhante a Exploring Visualization Techniques to Enhance Privacy Control UX for User-Managed Access

Managing the Data Center with JBoss SOA-P
Managing the Data Center with JBoss SOA-PManaging the Data Center with JBoss SOA-P
Managing the Data Center with JBoss SOA-PColloquium
 
Mobile Monday Silicon Valley June 1st 09 V1
Mobile Monday Silicon Valley June 1st 09 V1Mobile Monday Silicon Valley June 1st 09 V1
Mobile Monday Silicon Valley June 1st 09 V1Tim Haysom
 
Future Business Models using Virtual Simulation and Augmentation
Future Business Models using Virtual Simulation and AugmentationFuture Business Models using Virtual Simulation and Augmentation
Future Business Models using Virtual Simulation and AugmentationBiju Shoolapani
 
2. FOMS _ FeedHenry_ Mícheál Ó Foghlú
2. FOMS _ FeedHenry_ Mícheál Ó Foghlú2. FOMS _ FeedHenry_ Mícheál Ó Foghlú
2. FOMS _ FeedHenry_ Mícheál Ó FoghlúFOMS011
 
Presentatie peter vink back to the future, TASS technology solutions
Presentatie peter vink   back to the future, TASS technology solutionsPresentatie peter vink   back to the future, TASS technology solutions
Presentatie peter vink back to the future, TASS technology solutions#devdate
 
Leadership Symposium on Digital Media in Healthcare
Leadership Symposium on Digital Media in HealthcareLeadership Symposium on Digital Media in Healthcare
Leadership Symposium on Digital Media in Healthcaresetstanford
 

Semelhante a Exploring Visualization Techniques to Enhance Privacy Control UX for User-Managed Access (9)

On Semantics in Onto-DIY
On Semantics in Onto-DIYOn Semantics in Onto-DIY
On Semantics in Onto-DIY
 
A user centric vision for publishers
A user centric vision for publishersA user centric vision for publishers
A user centric vision for publishers
 
Managing the Data Center with JBoss SOA-P
Managing the Data Center with JBoss SOA-PManaging the Data Center with JBoss SOA-P
Managing the Data Center with JBoss SOA-P
 
Mobile Monday Silicon Valley June 1st 09 V1
Mobile Monday Silicon Valley June 1st 09 V1Mobile Monday Silicon Valley June 1st 09 V1
Mobile Monday Silicon Valley June 1st 09 V1
 
Future Business Models using Virtual Simulation and Augmentation
Future Business Models using Virtual Simulation and AugmentationFuture Business Models using Virtual Simulation and Augmentation
Future Business Models using Virtual Simulation and Augmentation
 
2. FOMS _ FeedHenry_ Mícheál Ó Foghlú
2. FOMS _ FeedHenry_ Mícheál Ó Foghlú2. FOMS _ FeedHenry_ Mícheál Ó Foghlú
2. FOMS _ FeedHenry_ Mícheál Ó Foghlú
 
IT Governance Portals
IT Governance   PortalsIT Governance   Portals
IT Governance Portals
 
Presentatie peter vink back to the future, TASS technology solutions
Presentatie peter vink   back to the future, TASS technology solutionsPresentatie peter vink   back to the future, TASS technology solutions
Presentatie peter vink back to the future, TASS technology solutions
 
Leadership Symposium on Digital Media in Healthcare
Leadership Symposium on Digital Media in HealthcareLeadership Symposium on Digital Media in Healthcare
Leadership Symposium on Digital Media in Healthcare
 

Mais de Domenico Catalano

Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAProtecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMADomenico Catalano
 
UMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenarioUMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenarioDomenico Catalano
 
Enterprise Mobility: Secure Containerization
Enterprise Mobility: Secure ContainerizationEnterprise Mobility: Secure Containerization
Enterprise Mobility: Secure ContainerizationDomenico Catalano
 
User-Access Manager: Key to Life Management Platform
User-Access Manager: Key to Life Management PlatformUser-Access Manager: Key to Life Management Platform
User-Access Manager: Key to Life Management PlatformDomenico Catalano
 
Securing Internet Payment Systems
Securing Internet Payment SystemsSecuring Internet Payment Systems
Securing Internet Payment SystemsDomenico Catalano
 

Mais de Domenico Catalano (7)

Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAProtecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMA
 
UMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenarioUMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenario
 
Enterprise Mobility: Secure Containerization
Enterprise Mobility: Secure ContainerizationEnterprise Mobility: Secure Containerization
Enterprise Mobility: Secure Containerization
 
User-Access Manager: Key to Life Management Platform
User-Access Manager: Key to Life Management PlatformUser-Access Manager: Key to Life Management Platform
User-Access Manager: Key to Life Management Platform
 
Uma sec council_june_22_v4
Uma sec council_june_22_v4Uma sec council_june_22_v4
Uma sec council_june_22_v4
 
Securing Internet Payment Systems
Securing Internet Payment SystemsSecuring Internet Payment Systems
Securing Internet Payment Systems
 
UMA Trusted Claims
UMA Trusted ClaimsUMA Trusted Claims
UMA Trusted Claims
 

Último

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Último (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Exploring Visualization Techniques to Enhance Privacy Control UX for User-Managed Access

  • 1. Exploring Visualization Techniques to Enhance Privacy Control UX for User- Managed Access Newcastle University Domenico Catalano, Maciej Wolniak and the Smart Team 21st July, 2011 1 V.3
  • 2. Agenda • Data sharing and online privacy • SmartAM Information Ecology • Enhance privacy control ‣ UMA Connection ‣ UMA Control bridge • Future works • User Experience 2
  • 3. Data sharing Online Privacy is about sharing Reputational Historical Vocational Biographical Genealogical Transactional Computational Biological Locational Relational 3
  • 4. The Paradigm User Data sharing and online Privacy 4
  • 5. SmartAM Information Ecology Context Content User 5
  • 6. SmartAM Information Ecology Context • UMA/SmartAM Context Content User ‣ Provide an advance system to allow internet user to protect and share online information ‣ Prevent of lost of user privacy ‣ Adhere to the international privacy regulations ‣ Secure online information (access control) 6
  • 7. SmartAM Information Ecology Context • UMA/SmartAM Content Content User ‣ Authorizing User information ‣ Authorizing User’s Web resource info ‣ Authorization Policies ‣ Requesting Parties Information ‣ Analytics information (who, when, what) 7
  • 8. SmartAM Information Ecology Context • UMA/SmartAM User Content User ‣ Internet User/Social networking user ‣ Company ‣ Developer ‣ Government ‣ Curios!! 8
  • 10. SmartAM states system smartam UX Study Subject Possible actions and states of the system Authorizing User interaction B1 Initial state Requester Host Site AM Homepage APP B2 Host B5 B4 Privacy Conceptual model Not Learn registered B3 Dev More User Resource A1 A3 B9 B7 B6 B8 Protect & Initial state Wiki Share A2 Consent C2 Privileged C1 User App Actions Client App for Initial state Login MySelf Policy Definition B10 A4 User B11 View Welcome Resource Page Possible Visible A10 Consent A5 Actions Things Default A9 User intentions Policy vs Required A6 A8 Manage User Control Resource Setting Resource Actions Contacts Settings Bridge Registered Policy Shared State of System A7 Connection 10
  • 11. Understand the nature of data sharing policy in distributed environment • UMA model centralizes the authorization policies for all the Authorizing User's distributed web resource (protected resource). • The externalization of the policies introduces a new level of complexity because the user must (mentally) map the authorization structure for each resource, in more sophisticate one. • This new layer must be able to abstracting the existent, although it must be able to enhance the control on the information that will be shared. • Increasing of Protected resources and requesting parties could be mentally difficult for the user to maintain control in practice on the information. 11
  • 12. Risks • Lost of Privacy • Exploit of online personal Information • Security breach 12
  • 13. Enhance Privacy Control through visualization • As result a context authorization policy and a governor system is definitely desirable. • We introduce two new design concepts: ‣ UMA Connection ‣ UMA Control bridge TM • A visualization tool is necessary to facilitate the creation of the sharing policy and the control of the privacy. 13
  • 14. UMA Connection • An UMA Connection defines a context of the data sharing policy. ‣ It’s a set of objects, including Contacts, authorized Apps and allowed actions on a specific resource. ‣ It can include access restrictions (i.e. period validity) and/or Trusted Claims request to restrict access based on subject’s information. • An UMA Connection is fundamental to enhance user control for what purpose the information will be revealed. • UMA Connection uses a visualization approach which helps user to define an appropriate context. • An Authorizing User can create a Connection for him-self or for others. • A Connection doesn’t incapsulate other connections. 14
  • 15. Structure of UMA Connection 15
  • 16. Visualizing UMA Connection Resource Social Apps Class Connection Others Prof University Contacts UMA Connection 16
  • 17. UMA Control bridge • UMA Control bridge ‣ Is designed to adhere to the user-centric identity paradigm. ‣ Provides a primary user interface for control Resources, Connections, Apps and requesters. ‣ Provides a dashboard with main statistic information about connection, shared data, etc. ‣ Incorporates a single view of these main controls, including a notification bar for new access request. ‣ Provides 3-steps actions to get access to specific view, excluding optional view. UMA Control bridge TM 17
  • 18. Maintain control on Information that will be revealed Prof Class University Business Friend Personal Data Collab Professional MySelf ProjectA Self-Registration MySelf 18
  • 19. Future works • Graph Algorithm • Super Connection (Basket of Resources) • Visualization techniques (HTML5) 19