...
Click the image to see the wireframes. (There are "click-throughs" on the screens to give you a simulated user experience; the instructions on the right-hand side indicate where most of the links are.)
Setting Policies and Terms
...
Click the image to see the wireframes.
Access Analytics
...
Click the image to see the wireframes.
UMA Trusted Claims
The UMA protocol supports the policy-driven ability of an AM to demand claims from a requesting party before authorization is granted. The claims may be self- asserted or third-party-asserted. This set of wireframes was developed to explore a person-to-person data sharing scenario in which the Authorizing User wants to restrict sharing to a specific Requesting Party identity. For such a policy to be meaningful it requires the AM to establish of trust of third- party identity claim issuers. The Wireframe includes the subject registration and the Claims Host registration as part of bootstrapping trust process.
Exploring visualization techniques to enhance Privacy Control UX for UMA
The study explores visualization techniques to enhance privacy control user experiece for UMA protocol, applied to Newcastle University's SmartAM project. The goal is to mitigate risks of lost of privacy and the exploitation of online personal data caused from user difficulty to maintain data control, correlate web resources and assign privileges for specific scope in the data sharing process. The approach introduces the Connection and Control bridge concepts and visualization tools for this purpose.
NCL_UMA_SmartAMUX_Study_part1.pdf (SmartAM UX study introduction, requirements, privacy control concepts)
NCL_UMA_SmartAMUX_Study_part2.pdf (UMA Connection concept/UX)
NCL_UMA_SmartAMUX_Study_part3.pdf (Control bridge concept/UX)