Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Information Sharing and User Privacy in the Third-party Identity Management Landscape
Linköping University, Department of Computer and Information Science, Database and information techniques. Linköping University, The Institute of Technology. (ADIT)
Linköping University, Department of Computer and Information Science, Database and information techniques. Linköping University, The Institute of Technology. (ADIT)
NICTA, Australia.
Linköping University, Department of Computer and Information Science, IISLAB - Laboratory for Intelligent Information Systems. Linköping University, Department of Computer and Information Science, Database and information techniques. Linköping University, The Institute of Technology. (ADIT)
2015 (English)In: Proc. ACM Conference on Data and Application Security and Privacy (ACM CODASPY), ACM Digital Library, 2015, 151-153 p.Conference paper, Poster (with or without abstract) (Refereed)
Abstract [en]

Third-party identity management services enable cross-site information sharing, making Web access seamless but also raise significant privacy implications for the users. Using a combination of manual analysis of identified third-party identity management relationships and targeted case studies we capture how the protocol usage and third-party selection is changing, profile what information is requested to be shared (and actions to be performed) between websites, and identify privacy issues and practical problems that occur when using multiple accounts (associated with these services). The study highlights differences in the privacy leakage risks associated with different classes of websites, and shows that the use of multiple third-party websites, in many cases, can cause the user to lose (at least) partial control over which information is shared/posted on their behalf.

Place, publisher, year, edition, pages
ACM Digital Library, 2015. 151-153 p.
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:liu:diva-117542DOI: 10.1145/2699026.2699131ISBN: 978-1-4503-3191-3 (print)OAI: oai:DiVA.org:liu-117542DiVA: diva2:809428
Conference
ACM CODASPY
Available from: 2015-05-04 Created: 2015-05-04 Last updated: 2017-03-16Bibliographically approved

Open Access in DiVA

fulltext(200 kB)18 downloads
File information
File name FULLTEXT04.pdfFile size 200 kBChecksum SHA-512
d77a39aadf1edb464cc4f9b6a31fda66bfb554df588708dd7e4504d3868b4f4206a17a5d82eab3b2d3527f117da2003937ddcc6eb451d9f9c8766e68767bd1bc
Type fulltextMimetype application/pdf

Other links

Publisher's full text

Search in DiVA

By author/editor
Vapen, AnnaCarlsson, NiklasShahmehri, Nahid
By organisation
Database and information techniquesThe Institute of TechnologyIISLAB - Laboratory for Intelligent Information Systems
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 206 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 188 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf