{"id":"https://openalex.org/W1969638703","doi":"https://doi.org/10.4018/jisp.2010100101","title":"A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments","display_name":"A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments","publication_year":2010,"publication_date":"2010-10-01","ids":{"openalex":"https://openalex.org/W1969638703","doi":"https://doi.org/10.4018/jisp.2010100101","mag":"1969638703"},"language":"en","primary_location":{"id":"doi:10.4018/jisp.2010100101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jisp.2010100101","pdf_url":null,"source":{"id":"https://openalex.org/S191782446","display_name":"International Journal of Information Security and Privacy","issn_l":"1930-1650","issn":["1930-1650","1930-1669"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security and Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066727108","display_name":"Feng Zhu","orcid":"https://orcid.org/0000-0003-3542-3989"},"institutions":[{"id":"https://openalex.org/I82495205","display_name":"University of Alabama in Huntsville","ror":"https://ror.org/02zsxwr40","country_code":"US","type":"education","lineage":["https://openalex.org/I82495205"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Feng W. Zhu","raw_affiliation_strings":["The University of Alabama in Huntsville, USA","The University of Alabama in Huntsville, USA,"],"affiliations":[{"raw_affiliation_string":"The University of Alabama in Huntsville, USA","institution_ids":["https://openalex.org/I82495205"]},{"raw_affiliation_string":"The University of Alabama in Huntsville, USA,","institution_ids":["https://openalex.org/I82495205"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008283506","display_name":"Sandra Carpenter","orcid":"https://orcid.org/0000-0002-4627-9831"},"institutions":[{"id":"https://openalex.org/I82495205","display_name":"University of Alabama in Huntsville","ror":"https://ror.org/02zsxwr40","country_code":"US","type":"education","lineage":["https://openalex.org/I82495205"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sandra Carpenter","raw_affiliation_strings":["The University of Alabama in Huntsville, USA","The University of Alabama in Huntsville, USA,"],"affiliations":[{"raw_affiliation_string":"The University of Alabama in Huntsville, USA","institution_ids":["https://openalex.org/I82495205"]},{"raw_affiliation_string":"The University of Alabama in Huntsville, USA,","institution_ids":["https://openalex.org/I82495205"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062200322","display_name":"Wei Zhu","orcid":"https://orcid.org/0000-0003-4818-709X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wei Zhu","raw_affiliation_strings":["Intergraph Co., USA","Intergraph Co., USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Intergraph Co., USA","institution_ids":[]},{"raw_affiliation_string":"Intergraph Co., USA#TAB#","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009845048","display_name":"Matt W. Mutka","orcid":"https://orcid.org/0000-0002-7381-8095"},"institutions":[{"id":"https://openalex.org/I87216513","display_name":"Michigan State University","ror":"https://ror.org/05hs6h993","country_code":"US","type":"education","lineage":["https://openalex.org/I87216513"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Matt Mutka","raw_affiliation_strings":["Michigan State University, USA","Michigan State University, , USA"],"affiliations":[{"raw_affiliation_string":"Michigan State University, USA","institution_ids":["https://openalex.org/I87216513"]},{"raw_affiliation_string":"Michigan State University, , USA","institution_ids":["https://openalex.org/I87216513"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5066727108"],"corresponding_institution_ids":["https://openalex.org/I82495205"],"apc_list":null,"apc_paid":null,"fwci":0.451,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.7081953,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"4","issue":"4","first_page":"1","last_page":"20"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8767838478088379},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.7682314515113831},{"id":"https://openalex.org/keywords/ubiquitous-computing","display_name":"Ubiquitous computing","score":0.6179510951042175},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.5547533631324768},{"id":"https://openalex.org/keywords/digital-identity","display_name":"Digital identity","score":0.5495185852050781},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.4926372170448303},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.4767219126224518},{"id":"https://openalex.org/keywords/personal-identity","display_name":"Personal identity","score":0.4635426700115204},{"id":"https://openalex.org/keywords/identity-management","display_name":"Identity management","score":0.4598136842250824},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45106202363967896},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4210863411426544},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.3674970269203186},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3510759770870209},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.1529574990272522},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.1332886815071106}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8767838478088379},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.7682314515113831},{"id":"https://openalex.org/C172195944","wikidata":"https://www.wikidata.org/wiki/Q541265","display_name":"Ubiquitous computing","level":2,"score":0.6179510951042175},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.5547533631324768},{"id":"https://openalex.org/C2779813694","wikidata":"https://www.wikidata.org/wiki/Q528053","display_name":"Digital identity","level":3,"score":0.5495185852050781},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.4926372170448303},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.4767219126224518},{"id":"https://openalex.org/C47188148","wikidata":"https://www.wikidata.org/wiki/Q2254571","display_name":"Personal identity","level":3,"score":0.4635426700115204},{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.4598136842250824},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45106202363967896},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4210863411426544},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.3674970269203186},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3510759770870209},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.1529574990272522},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.1332886815071106},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C17235551","wikidata":"https://www.wikidata.org/wiki/Q3236990","display_name":"Self","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C27206212","wikidata":"https://www.wikidata.org/wiki/Q34178","display_name":"Theology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/jisp.2010100101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jisp.2010100101","pdf_url":null,"source":{"id":"https://openalex.org/S191782446","display_name":"International Journal of Information Security and Privacy","issn_l":"1930-1650","issn":["1930-1650","1930-1669"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security and Privacy","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jisp00:v:4:y:2010:i:4:p:1-20","is_oa":false,"landing_page_url":"https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jisp.2010100101","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4399999976158142,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W28824544","https://openalex.org/W1501620459","https://openalex.org/W1543670101","https://openalex.org/W1566345534","https://openalex.org/W1588263607","https://openalex.org/W1689629105","https://openalex.org/W1968556863","https://openalex.org/W1990815933","https://openalex.org/W2001998603","https://openalex.org/W2031418633","https://openalex.org/W2031618446","https://openalex.org/W2033820870","https://openalex.org/W2055612971","https://openalex.org/W2056773559","https://openalex.org/W2059768261","https://openalex.org/W2065657677","https://openalex.org/W2081076889","https://openalex.org/W2082584444","https://openalex.org/W2096670213","https://openalex.org/W2103647628","https://openalex.org/W2112358122","https://openalex.org/W2113738519","https://openalex.org/W2116347193","https://openalex.org/W2120846431","https://openalex.org/W2138161680","https://openalex.org/W2146524685","https://openalex.org/W2146637672","https://openalex.org/W2157539922","https://openalex.org/W2159364396","https://openalex.org/W2166602595","https://openalex.org/W2340406763","https://openalex.org/W4230443625","https://openalex.org/W4246157826","https://openalex.org/W6633819675"],"related_works":["https://openalex.org/W4308433763","https://openalex.org/W3035518953","https://openalex.org/W2898512050","https://openalex.org/W4377818785","https://openalex.org/W4386213623","https://openalex.org/W3110872243","https://openalex.org/W4236961386","https://openalex.org/W4385282342","https://openalex.org/W2150958676","https://openalex.org/W4246096667"],"abstract_inverted_index":{"In":[0,59],"pervasive":[1,20,56],"computing":[2,21,57],"environments,":[3],"personal":[4,15,27],"information":[5,53,76,113],"is":[6,31,38],"typically":[7],"expressed":[8],"in":[9,99],"digital":[10],"forms.":[11],"Daily":[12],"activities":[13],"and":[14,119],"preferences":[16],"with":[17,26],"regard":[18],"to":[19,44,81],"applications":[22],"are":[23],"easily":[24],"associated":[25],"identities.":[28],"Privacy":[29],"protection":[30],"a":[32,42,115],"serious":[33],"challenge.":[34],"The":[35,85,126],"fundamental":[36],"problem":[37],"the":[39,62,65,71,100,102,109,121],"lack":[40],"of":[41,50,73],"mechanism":[43],"help":[45],"people":[46],"expose":[47,118],"appropriate":[48],"amounts":[49],"their":[51,131],"identity":[52,75,83,112,136],"when":[54],"accessing":[55],"applications.":[58],"this":[60],"paper,":[61],"authors":[63,86],"propose":[64],"Hierarchical":[66],"Identity":[67],"model,":[68],"which":[69,120],"enables":[70],"expression":[72],"one\u2019s":[74],"ranging":[77],"from":[78],"precise":[79],"detail":[80],"vague":[82],"information.":[84],"model":[87],"privacy":[88],"exposure":[89,137],"as":[90],"an":[91],"extensive":[92],"game.":[93],"By":[94],"finding":[95],"subgame":[96],"perfect":[97],"equilibria":[98],"game,":[101],"approach":[103],"achieves":[104],"optimal":[105],"exposure.":[106],"It":[107],"finds":[108],"most":[110],"general":[111],"that":[114,130],"user":[116],"should":[117],"service":[122],"provider":[123],"would":[124],"accept.":[125],"authors\u2019":[127],"experiments":[128],"show":[129],"models":[132],"can":[133],"reduce":[134],"unnecessary":[135],"effectively.":[138]},"counts_by_year":[{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
