( 您好!臺灣時間:2024/02/27 12:03
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::


研究生(外文):Tsai-Rung Li
論文名稱(外文):P3P based Customized Information Privacy Contract
外文關鍵詞:PrivacyP3PAPPELPrivacy negotiationPersonal information
  • 被引用被引用:1
  • 點閱點閱:527
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:1
Widespread increasing of using e-services brought convenience into our life. However, most online users concerned with the privacy invasion risk associated with revealing personal information without clear understanding of how this information is handled. Now the service provider declares his privacy policy on the web site, yet that can not necessarily satisfy all users’ privacy preference. Customized privacy contract is needed. Automated negotiation by the service provider’s and users’ agents is addressed to achieve this goal, but it’s not perfect way. Our research analyzes the shortages of negotiation and proposes a mechanism that the privacy contract is arbitrated by a trustworthy third party based on users’ privacy preference and services’ privacy descriptions. The advantage of this design includes (1) the decrease of time and the bandwidth cost, and the efficient creation of the privacy contract, (2) while users’ privacy preference and services’ privacy policies match fail, the third party propose the most suitable privacy contract to inquire users, (3) improve users’ privacy preference incrementally. We implement a prototype based on P3P and APPEL standard for running the arbitration process, and we expect the flexibility of making privacy contract provided by service providers in the future.
第一章 緒論 1
第一節 研究背景與動機 1
第二節 研究目的 4
第三節 研究架構 5
第二章 文獻探討 6
第一節 個人資訊的協商機制 6
2.1.1 Contextual e-Negotiation for the Handling of private Data in eCommerce on a Semantic Web [6] 6
2.1.2 Online Privacy Agent[2] 7
2.1.3 A privacy Negotiation Protocol for Web Services[3] 8
2.1.4 A Semantic based Privacy Framework for Web Services[4] 9
2.1.5 Towards automatic negotiation of privacy contracts for internet[7] 11
第二節 W3C技術 12
2.2.1 P3P(Platform for Privacy Preference)[24] 12
2.2.2 APPEL(A P3P Preference Exchange Language)[25] 13
2.2.3 User Agent Software 14
第三章 系統模型建構 17
第一節 系統目的 18
第二節 系統架構 18
3.2.1 系統概觀 18
3.2.2 名詞定義 20
3.2.3 隱私權政策與隱私偏好的媒合(Rule Evaluation) 24
3.2.4 隱私權政策與隱私偏好間距離的計算 25
3.2.5 強化隱私偏好(Rule Enhancement) 28
第三節 仲裁實例 28
第四章 雛形系統架構與實作 32
第一節 雛型系統架構 32
第二節 開發工具 37
第三節 雛形系統呈現 37
第四節 分析與討論 46
第五章 結論 48
第一節 研究總結 48
第二節 未來展望 49
參 考 文 獻 50
[1]A. Adams, “The implications of user’s privacy perception on communication and information privacy policies”, Proceedings of Telecommunications Policy Research Conference, Washington DC, 1999.
[2]J. Meyer, “How to Manage, Negotiate, and Transfer Personal Information on the Web.”, Almaden Research Center, IBM. ,1999
[3]K. El-Khatib, "A Privacy Negotiation Protocol for Web Services," Workshop on Collaboration Agents: Autonomous Agents for Collaborative Environments Halifax, Nova Scotia, Canada. October 13, 2003.
[4]A. Tumer, A. Dorgac, I. Toroslu, “A Semantic based Privacy Framework for Web Services” ,WWW 2003 - ESSW'' 03.
[5]Li Haifei, Ahn David, Hung Patrick C. K., “Algorithms for Automated Negotiations and Their Applications in Information Privacy”, 2004 IEEE International Conference on E-Commerce Technology (CEC''04)
[6]He Yingxin, N. Dawn Jutla “Contextual e-Negotiation for the Handling of Private Data in e-Commerce on a Semantic Web”, Proceedings of the 39th Annual Hawaii International Conference on System Sciences 2006 IEEE
[7]Bennicke Marcel’, Langendorfer Peter, “Towards Automatic Negotiation of Privacy Contracts for Internet Services” Proceedings. of 11th IEEE Conference on Computer Networks, IEEE Society Press, 2003.
[8]Palen & Dourish ”Unpacking privacy for a networked world” in Proc. Of CHI’03
[9]Lederer et al. “Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing” In Proceedings of CHI 2003. ACM Press
[10]Lederer at al. ”Personal privacy through understanding and action: five pitfalls for designers” Personal and Ubiquitous Computing 2004
[11]Olson at al. “Toward understanding preferences for sharing and privacy” In. Extended Abstracts of CHI 2005, ACM Press
[12]Consolvo at al. “Location Disclosure to social relations: why ,when, & what people want to share” In Proc. CHI, 2005.
[13]Patil Sameer, Lai Jennifer, ”Who Gets to Know What When: Configuring Privacy Permissions in an Awareness Application”, Proceedings of the ACM Conference on Human Factors in Computing Systems, CHI 2005
[14]S. Lederer, C. Beckman, A. Dey, and J. Mankoff. “Managing personal information disclosure in ubiquitous computing environments.”Technical Report IRB-TR-03-015, Intel Research, Berkeley, June 2003.
[15]MS Ackerman and L. Cranor. ” Privacy critics: UI components to safeguard users'' privacy” In ACM Conf. Human Factors in Computing Systems (CHI''99)
[16]Keith Irwin and Ting Yu and Keith Irwin: “Determining User Privacy Preferences by Asking the Right Questions: An Automated Approach”. To appear in ACM International Workshop on Privacy in Electronic Society (WPES), Alexandria, VA, November 2005.
[17]H. Taylor, Most people are “privacy pragmatists” who, while concerned about privacy, will sometimes trade it off for other benefits. The Harris Poll #17, March 19, 2003.
[18]B. Berendt, O. Günther, and S. Spiekermann, Privacy in E-Commerce: Stated Preferences vs. Actual Behavior. Communications of the ACM (to appear).
[19]S. Spiekermann, J. Grossklags, and B. Berendt, (2001). “E-privacy in 2nd generation E-Commerce: privacy preferences versus actual behavior”, Proceedings of EC’01: Third ACM Conference on Electronic Commerce, ACM, Tampa, Florida, 38-47.
[20]S. Mark Ackerman , Lorrie Faith Cranor , Joseph Reagle, Privacy in e-commerce: examining user scenarios and privacy preferences, Proceedings of the 1st ACM conference on Electronic commerce, p.1-8, November 03-05, 1999, Denver, Colorado, United States
[21] G. Tonti, Bradshaw, J. M., R. Jeffers, R. Montanari, N. Suri, & A. Uszok, (2003). Semantic Web languages for policy representation and reasoning: A comparison of KAoS, Rei, and Ponder. Submitted to the International Semantic Web Conference (ISWC 03). Sanibel Island, Florida,
[22]M. Paolucci, T. Kawamura, T. Payne, K. Sycara, "Semantic Matching of Web Services Capabilities", in Proc. of Intl. Semantic Web Conference, Sardinia, Italy, June 2002. “
[23]K. E. Seamons, M. Winslett, T. Yu, L. Yu, and R. Javis, “Protecting Privacy during On-line Trust Negotiation,” 2nd Workshop on Privacy Enhancing Technologies, San Francisco, April 2002
[24]W3C, “The Platform for Privacy Preferences 1.1 (P3P1.1) Specification”, see http://www.w3.org/TR/P3P11/
[25]W3C, “A P3P Preference Exchange Language 1.0 (APPEL1.0) “, see http://www.w3.org/TR/P3P-preferences/
[26]Protégé-OWL Editor, http://protege.stanford.edu/plugins/owl
[27]PrivacyBird at www.privacybird.com
[28]P3P software, http://www.w3.org/P3P/implementations.html
[29]JRC P3P resource centre, http://p3p.jrc.it/
[30]TRUSTe, http://www.truste.or
第一頁 上一頁 下一頁 最後一頁 top