Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Click the image to see the wireframes. (There are "click-throughs" on the screens to give you a simulated user experience; the instructions on the right-hand side indicate where most of the links are.)

Image RemovedImage Added

Setting Policies and Terms

...

Click the image to see the wireframes.

Image RemovedImage Added

Access Analytics

...

Click the image to see the wireframes.

Image RemovedImage Added

UMA Trusted Claims

The UMA protocol supports the policy-driven ability of an AM to demand claims from a requesting party before authorization is granted. The claims may be self- asserted or third-party-asserted. This set of wireframes was developed to explore a person-to-person data sharing scenario in which the Authorizing User wants to restrict sharing to a specific Requesting Party identity. For such a policy to be meaningful it requires the AM to establish of trust of third- party identity claim issuers. The Wireframe includes the subject registration and the Claims Host registration as part of bootstrapping trust process.

Exploring visualization techniques to enhance Privacy Control UX for UMA

The study explores visualization techniques to enhance privacy control user experiece for UMA protocol, applied to Newcastle University's SmartAM project. The goal is to mitigate risks of lost of privacy and the exploitation of online personal data caused from user difficulty to maintain data control, correlate web resources and assign privileges for specific scope in the data sharing process. The approach introduces the Connection and Control bridge concepts and visualization tools for this purpose.

NCL_UMA_SmartAMUX_Study_part1.pdf (SmartAM UX study introduction, requirements,  privacy control concepts)

NCL_UMA_SmartAMUX_Study_part2.pdf (UMA Connection concept/UX)

NCL_UMA_SmartAMUX_Study_part3.pdf (Control bridge concept/UX)