{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T23:10:47Z","timestamp":1654125047919},"reference-count":36,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10,1]]},"abstract":"<p>In pervasive computing environments, personal information is typically expressed in digital forms. Daily activities and personal preferences with regard to pervasive computing applications are easily associated with personal identities. Privacy protection is a serious challenge. The fundamental problem is the lack of a mechanism to help people expose appropriate amounts of their identity information when accessing pervasive computing applications. In this paper, the authors propose the Hierarchical Identity model, which enables the expression of one\u2019s identity information ranging from precise detail to vague identity information. The authors model privacy exposure as an extensive game. By finding subgame perfect equilibria in the game, the approach achieves optimal exposure. It finds the most general identity information that a user should expose and which the service provider would accept. The authors\u2019 experiments show that their models can reduce unnecessary identity exposure effectively.<\/p>","DOI":"10.4018\/jisp.2010100101","type":"journal-article","created":{"date-parts":[[2011,2,15]],"date-time":"2011-02-15T21:03:28Z","timestamp":1297803808000},"page":"1-20","source":"Crossref","is-referenced-by-count":0,"title":["A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments"],"prefix":"10.4018","volume":"4","author":[{"given":"Feng W.","family":"Zhu","sequence":"first","affiliation":[{"name":"The University of Alabama in Huntsville, USA"}]},{"given":"Sandra","family":"Carpenter","sequence":"additional","affiliation":[{"name":"The University of Alabama in Huntsville, USA"}]},{"given":"Wei","family":"Zhu","sequence":"additional","affiliation":[{"name":"Intergraph Co., USA"}]},{"given":"Matt","family":"Mutka","sequence":"additional","affiliation":[{"name":"Michigan State University, USA"}]}],"member":"2432","reference":[{"key":"jisp.2010100101-0","doi-asserted-by":"crossref","unstructured":"Bauer, D., Blough, D. M., et al. (2008). Minimum Information disclosure with Efficiently Verifiable Credentials. In Proceedings of the 4th Workshop on Digital Identity Management, Alexandria, VA.","DOI":"10.1145\/1456424.1456428"},{"key":"jisp.2010100101-1","first-page":"47","article-title":"Location Privacy in Pervasive Computing.","author":"A.Beresford","year":"2003","journal-title":"IEEE Pervasive Computing \/ IEEE Computer Society [and] IEEE Communications Society"},{"key":"jisp.2010100101-2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318565"},{"key":"jisp.2010100101-3","doi-asserted-by":"crossref","unstructured":"Bhargav-Spantzel, A., Squicciarini, A., et al. (2007). Trust Negotiation in Identity Management. IEEE Security & Privacy, 55-63.","DOI":"10.1109\/MSP.2007.46"},{"issue":"3","key":"jisp.2010100101-4","doi-asserted-by":"crossref","first-page":"269","DOI":"10.3233\/JCS-2006-14303","article-title":"Establishing and Protecting Digital Identity in Federation Systems.","volume":"14","author":"A.Bhargav-Spantzel","year":"2006","journal-title":"Journal of Computer Security"},{"key":"jisp.2010100101-5","author":"M.Bishop","year":"2003","journal-title":"Computer Security"},{"key":"jisp.2010100101-6","doi-asserted-by":"crossref","unstructured":"Bonatti, P., & Samarati, P. (2000). Regulating service access and information release on the Web. In Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece.","DOI":"10.1145\/352600.352620"},{"key":"jisp.2010100101-7","doi-asserted-by":"crossref","unstructured":"Camenisch, J., & Herreweghen, E. V. (2002). Design and Implementation of idemix Anonymous Credential System. In Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC.","DOI":"10.1145\/586110.586114"},{"key":"jisp.2010100101-8","doi-asserted-by":"crossref","unstructured":"Campbell, R., Al-Muhtadi, J., et al. (2002). Towards Security and Privacy for Pervasive Computing. Paper presented at the International Symposium on Software Security, Tokyo.","DOI":"10.1007\/3-540-36532-X_1"},{"key":"jisp.2010100101-9","author":"D.Chappell","year":"2006","journal-title":"Introducing Windows CardSpace"},{"key":"jisp.2010100101-10","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"jisp.2010100101-11","doi-asserted-by":"publisher","DOI":"10.1145\/4372.4373"},{"key":"jisp.2010100101-12","unstructured":"Cranor, L., Dobbs, B., et al. (2006). The Platform for Privacy Preferences 1.1 (P3P1.1) Specification. W3C."},{"key":"jisp.2010100101-13","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.19.1.20.16944"},{"key":"jisp.2010100101-14","article-title":"Designing a Social Protocol: Lessons Learned from the Platform for Privacy Preferences Project","author":"L. F.Cranor","year":"1998","journal-title":"Telephony, the Internet, and the Media"},{"key":"jisp.2010100101-15","doi-asserted-by":"crossref","unstructured":"Dyson, E. (2006). Privacy Protection: Time to Think and Act Locally and Globally. First Monday.","DOI":"10.5210\/fm.v0i0.1591"},{"key":"jisp.2010100101-16","unstructured":"Ferg, B., Fitzpatrick, B., et al. (2007). OpenID Authentication 2.0."},{"key":"jisp.2010100101-17","unstructured":"Gellman, R.(2002). Privacy, Consumers, and Costs: How The Lack of Privacy Costs Consumers and Why Business Studies of Privacy Costs are Biased and Incomplete."},{"key":"jisp.2010100101-18","doi-asserted-by":"crossref","unstructured":"Gruteser, M., & Grunwald, D. (2003). Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. Paper presented at the 1st International Conference on Mobile Systems, Applications and Services, New York.","DOI":"10.1145\/1066116.1189037"},{"key":"jisp.2010100101-19","doi-asserted-by":"crossref","unstructured":"Hong, J., & Landay, J. (2004). An Architecture for Privacy-Sensitive Ubiquitous Computing. Paper presented at the 2nd International Conference on Mobile Systems, Applications, and Services, Boston.","DOI":"10.1145\/990064.990087"},{"key":"jisp.2010100101-20","doi-asserted-by":"crossref","unstructured":"Langheinrich, M. (2001). Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems. In Ubicomp 2001 Proceedings (LNCS 2201, pp. 273-291. Langheinrich, M. (2002). A Privacy Awareness System for Ubiquitous Computing Environments. Paper presentd at the 4th International Conference on Ubiquitous Computing, G\u00f6teborg, Sweden.","DOI":"10.1007\/3-540-45427-6_23"},{"key":"jisp.2010100101-21","doi-asserted-by":"publisher","DOI":"10.1023\/A:1018777802208"},{"key":"jisp.2010100101-22","unstructured":"Merkle, R. C. (1989). A Certified Digital Signature. In Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology."},{"key":"jisp.2010100101-23","unstructured":"NativeForest.org. (2009). Native Forest Netwok's Guide to Stopping Junk Mail."},{"key":"jisp.2010100101-24","author":"M.Osborne","year":"2004","journal-title":"An Introduction to Game Theory"},{"key":"jisp.2010100101-25","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.4.7.696-706"},{"key":"jisp.2010100101-26","author":"N.Ragouzis","year":"2006","journal-title":"Security Assertion Markup Language (SAML) V2.0 Technical Overview"},{"key":"jisp.2010100101-27","author":"R.Sandhu","year":"1996","journal-title":"Role-Based Access Control Models"},{"key":"jisp.2010100101-28","doi-asserted-by":"crossref","unstructured":"Snekkenes, E. (2001). Concepts for Personal Location Privacy Policies. In Proceedings of the 3rd ACM Conference on Electronic Commerce, Tampa, FL.","DOI":"10.1145\/501158.501164"},{"key":"jisp.2010100101-29","doi-asserted-by":"publisher","DOI":"10.1023\/B:BTTJ.0000047125.97546.4a"},{"issue":"3","key":"jisp.2010100101-30","doi-asserted-by":"crossref","DOI":"10.1145\/1266977.1266981","article-title":"PP-Trust-X: A system for Privacy Preserving Trust Negotiations.","volume":"10","author":"A.Squicciarini","year":"2007","journal-title":"ACM Transactions on Information and System Security"},{"key":"jisp.2010100101-31","author":"R.Thibadeau","year":"2000","journal-title":"Privacy Server Protocol: Short Summary"},{"key":"jisp.2010100101-32","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2002.1067734"},{"key":"jisp.2010100101-33","doi-asserted-by":"crossref","unstructured":"Zhu, F., Carpenter, S., et al. (2009). Understanding and Minimizing Identity Exposure in Ubiquitous Computing Environments. In Proceedings of the 2009 International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (Mobiquitous 2009), Toronto, ON, Canada.","DOI":"10.4108\/ICST.MOBIQUITOUS2009.6853"},{"key":"jisp.2010100101-34","unstructured":"Zhu, F., Mutka, M., et al. (2006). The Master Key: A Private Authentication Approach for Pervasive Computing Environments. In Proceedings of the 2006 IEEE Annual Conference on Pervasive Computing and Communications."},{"key":"jisp.2010100101-35","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1075"}],"container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=50494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T22:56:55Z","timestamp":1654124215000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jisp.2010100101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2010,10,1]]},"references-count":36,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,10]]}},"URL":"https:\/\/doi.org\/10.4018\/jisp.2010100101","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"value":"1930-1650","type":"print"},{"value":"1930-1669","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,10,1]]}}}