跳到主要內容

臺灣博碩士論文加值系統

(44.192.20.240) 您好!臺灣時間:2024/02/27 12:03
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:李采蓉
研究生(外文):Tsai-Rung Li
論文名稱:以P3P為基礎之個人化資訊隱私權協議
論文名稱(外文):P3P based Customized Information Privacy Contract
指導教授:曹承礎曹承礎引用關係
學位類別:碩士
校院名稱:國立臺灣大學
系所名稱:資訊管理學研究所
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2005
畢業學年度:95
語文別:中文
論文頁數:52
中文關鍵詞:隱私權P3PAPPEL隱私協商個人資訊
外文關鍵詞:PrivacyP3PAPPELPrivacy negotiationPersonal information
相關次數:
  • 被引用被引用:1
  • 點閱點閱:527
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:1
電子化服務的發展為我們的生活帶來了便利性,但個人資訊在網路上傳遞卻可能造成使用者隱私的威脅,故服務提供者對於使用者私密資訊的保護將影響人們使用電子化服務的意願。目前服務提供者皆會在網站上宣告隱私權政策,然而服務端所制訂的政策未必能夠滿足不同使用者的隱私需求,若能提供「個人化」的隱私協議,將更能獲得使用者的信任。由服務提供者與使用者進行協商以制訂個人化隱私協議是目前文獻中提出的方式。但協商的進行仍有不足之處,本研究加以分析,並提出了透過第三方依雙方隱私偏好的資訊公平仲裁出最佳的協議以改善協商的不足。此機制優點包括(1)減少時間與網路成本,增加協議產生的效率、(2)媒合失敗時,能夠提出最佳協議的內容,由使用者選擇是否接受、(3)遞增性的修改使用者隱私偏好以臻完善。本論文基於W3C所訂定的P3P及APPEL標準實做第三方的雛型系統以模擬資訊隱私協議的仲裁過程。未來服務提供者若能增加隱私權政策制訂上的彈性,應用本研究設計將能有效訂定出個人化的隱私協議。
Widespread increasing of using e-services brought convenience into our life. However, most online users concerned with the privacy invasion risk associated with revealing personal information without clear understanding of how this information is handled. Now the service provider declares his privacy policy on the web site, yet that can not necessarily satisfy all users’ privacy preference. Customized privacy contract is needed. Automated negotiation by the service provider’s and users’ agents is addressed to achieve this goal, but it’s not perfect way. Our research analyzes the shortages of negotiation and proposes a mechanism that the privacy contract is arbitrated by a trustworthy third party based on users’ privacy preference and services’ privacy descriptions. The advantage of this design includes (1) the decrease of time and the bandwidth cost, and the efficient creation of the privacy contract, (2) while users’ privacy preference and services’ privacy policies match fail, the third party propose the most suitable privacy contract to inquire users, (3) improve users’ privacy preference incrementally. We implement a prototype based on P3P and APPEL standard for running the arbitration process, and we expect the flexibility of making privacy contract provided by service providers in the future.
第一章 緒論 1
第一節 研究背景與動機 1
第二節 研究目的 4
第三節 研究架構 5
第二章 文獻探討 6
第一節 個人資訊的協商機制 6
2.1.1 Contextual e-Negotiation for the Handling of private Data in eCommerce on a Semantic Web [6] 6
2.1.2 Online Privacy Agent[2] 7
2.1.3 A privacy Negotiation Protocol for Web Services[3] 8
2.1.4 A Semantic based Privacy Framework for Web Services[4] 9
2.1.5 Towards automatic negotiation of privacy contracts for internet[7] 11
第二節 W3C技術 12
2.2.1 P3P(Platform for Privacy Preference)[24] 12
2.2.2 APPEL(A P3P Preference Exchange Language)[25] 13
2.2.3 User Agent Software 14
第三章 系統模型建構 17
第一節 系統目的 18
第二節 系統架構 18
3.2.1 系統概觀 18
3.2.2 名詞定義 20
3.2.3 隱私權政策與隱私偏好的媒合(Rule Evaluation) 24
3.2.4 隱私權政策與隱私偏好間距離的計算 25
3.2.5 強化隱私偏好(Rule Enhancement) 28
第三節 仲裁實例 28
第四章 雛形系統架構與實作 32
第一節 雛型系統架構 32
第二節 開發工具 37
第三節 雛形系統呈現 37
第四節 分析與討論 46
第五章 結論 48
第一節 研究總結 48
第二節 未來展望 49
參 考 文 獻 50
[1]A. Adams, “The implications of user’s privacy perception on communication and information privacy policies”, Proceedings of Telecommunications Policy Research Conference, Washington DC, 1999.
[2]J. Meyer, “How to Manage, Negotiate, and Transfer Personal Information on the Web.”, Almaden Research Center, IBM. ,1999
[3]K. El-Khatib, "A Privacy Negotiation Protocol for Web Services," Workshop on Collaboration Agents: Autonomous Agents for Collaborative Environments Halifax, Nova Scotia, Canada. October 13, 2003.
[4]A. Tumer, A. Dorgac, I. Toroslu, “A Semantic based Privacy Framework for Web Services” ,WWW 2003 - ESSW'' 03.
[5]Li Haifei, Ahn David, Hung Patrick C. K., “Algorithms for Automated Negotiations and Their Applications in Information Privacy”, 2004 IEEE International Conference on E-Commerce Technology (CEC''04)
[6]He Yingxin, N. Dawn Jutla “Contextual e-Negotiation for the Handling of Private Data in e-Commerce on a Semantic Web”, Proceedings of the 39th Annual Hawaii International Conference on System Sciences 2006 IEEE
[7]Bennicke Marcel’, Langendorfer Peter, “Towards Automatic Negotiation of Privacy Contracts for Internet Services” Proceedings. of 11th IEEE Conference on Computer Networks, IEEE Society Press, 2003.
[8]Palen & Dourish ”Unpacking privacy for a networked world” in Proc. Of CHI’03
[9]Lederer et al. “Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing” In Proceedings of CHI 2003. ACM Press
[10]Lederer at al. ”Personal privacy through understanding and action: five pitfalls for designers” Personal and Ubiquitous Computing 2004
[11]Olson at al. “Toward understanding preferences for sharing and privacy” In. Extended Abstracts of CHI 2005, ACM Press
[12]Consolvo at al. “Location Disclosure to social relations: why ,when, & what people want to share” In Proc. CHI, 2005.
[13]Patil Sameer, Lai Jennifer, ”Who Gets to Know What When: Configuring Privacy Permissions in an Awareness Application”, Proceedings of the ACM Conference on Human Factors in Computing Systems, CHI 2005
[14]S. Lederer, C. Beckman, A. Dey, and J. Mankoff. “Managing personal information disclosure in ubiquitous computing environments.”Technical Report IRB-TR-03-015, Intel Research, Berkeley, June 2003.
[15]MS Ackerman and L. Cranor. ” Privacy critics: UI components to safeguard users'' privacy” In ACM Conf. Human Factors in Computing Systems (CHI''99)
[16]Keith Irwin and Ting Yu and Keith Irwin: “Determining User Privacy Preferences by Asking the Right Questions: An Automated Approach”. To appear in ACM International Workshop on Privacy in Electronic Society (WPES), Alexandria, VA, November 2005.
[17]H. Taylor, Most people are “privacy pragmatists” who, while concerned about privacy, will sometimes trade it off for other benefits. The Harris Poll #17, March 19, 2003.
[18]B. Berendt, O. Günther, and S. Spiekermann, Privacy in E-Commerce: Stated Preferences vs. Actual Behavior. Communications of the ACM (to appear).
[19]S. Spiekermann, J. Grossklags, and B. Berendt, (2001). “E-privacy in 2nd generation E-Commerce: privacy preferences versus actual behavior”, Proceedings of EC’01: Third ACM Conference on Electronic Commerce, ACM, Tampa, Florida, 38-47.
[20]S. Mark Ackerman , Lorrie Faith Cranor , Joseph Reagle, Privacy in e-commerce: examining user scenarios and privacy preferences, Proceedings of the 1st ACM conference on Electronic commerce, p.1-8, November 03-05, 1999, Denver, Colorado, United States
[21] G. Tonti, Bradshaw, J. M., R. Jeffers, R. Montanari, N. Suri, & A. Uszok, (2003). Semantic Web languages for policy representation and reasoning: A comparison of KAoS, Rei, and Ponder. Submitted to the International Semantic Web Conference (ISWC 03). Sanibel Island, Florida,
[22]M. Paolucci, T. Kawamura, T. Payne, K. Sycara, "Semantic Matching of Web Services Capabilities", in Proc. of Intl. Semantic Web Conference, Sardinia, Italy, June 2002. “
[23]K. E. Seamons, M. Winslett, T. Yu, L. Yu, and R. Javis, “Protecting Privacy during On-line Trust Negotiation,” 2nd Workshop on Privacy Enhancing Technologies, San Francisco, April 2002
[24]W3C, “The Platform for Privacy Preferences 1.1 (P3P1.1) Specification”, see http://www.w3.org/TR/P3P11/
[25]W3C, “A P3P Preference Exchange Language 1.0 (APPEL1.0) “, see http://www.w3.org/TR/P3P-preferences/
[26]Protégé-OWL Editor, http://protege.stanford.edu/plugins/owl
[27]PrivacyBird at www.privacybird.com
[28]P3P software, http://www.w3.org/P3P/implementations.html
[29]JRC P3P resource centre, http://p3p.jrc.it/
[30]TRUSTe, http://www.truste.or
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊