Privacy requirements in identity management solutions

Abhilasha Bhargav-Spantzel, Anna C. Squicciarini, Matthew Young, Elisa Bertino

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations


In this paper we highlight the need for privacy of user data used in digital identity management systems. We investigate the issues from the individual, business, and government perspectives. We provide surveys related to the growing problem of identity theft and the sociological concerns of individuals with respect to the privacy of their identity data. We show the privacy concerns, especially with respect to health and biometric data, where the loss of privacy of that data may have serious consequences. Moreover, we also discuss how privacy concerns change according to the individual's disposition to provide the data. Voluntary disclosure of personal information is more acceptable to users than if information disclosure is involuntary, like in the case of surveillance. Finally, we highlight the shortcomings of current identity management systems with respect to the current privacy needs and motivate the need of hardened importance of privacy enabling functionalities in such systems.

Original languageEnglish (US)
Title of host publicationHuman Interface and the Management of Information
Subtitle of host publicationInteracting in Information Environments - Symposium on Human Interface 2007. Held as Part of HCI International 2007, Proceedings
PublisherSpringer Verlag
Number of pages9
EditionPART 2
ISBN (Print)9783540733539
StatePublished - 2007
EventSymposium on Human Interface 2007 - Beijing, China
Duration: Jul 22 2007Jul 27 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberPART 2
Volume4558 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


OtherSymposium on Human Interface 2007

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science


Dive into the research topics of 'Privacy requirements in identity management solutions'. Together they form a unique fingerprint.

Cite this