(44.192.66.171) 您好!臺灣時間:2021/05/18 00:02
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:黃傳強
研究生(外文):Chuan-Chiang Huang
論文名稱:雲端服務之安全機制研究:協同合作、緊急存取、行動商務
論文名稱(外文):A Study of Security Mechanisms Supporting Collaboration, Emergency Access, and Mobile Commerce for Cloud Services
指導教授:詹進科詹進科引用關係陳育毅
指導教授(外文):Jinn-Ke JanYu-Yi Chen
口試委員:黃宗立張真誠林祝興
口試委員(外文):Tzonelih HwangChin-Chen ChangChu-Hsing Lin
口試日期:2016-06-29
學位類別:博士
校院名稱:國立中興大學
系所名稱:資訊科學與工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2016
畢業學年度:104
語文別:英文
論文頁數:89
中文關鍵詞:雲端服務協同合作緊急存取行動商務資訊安全
外文關鍵詞:Cloud ServiceCollaborationEmergency AccessMobile CommerceSecurity
相關次數:
  • 被引用被引用:1
  • 點閱點閱:391
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:1
在雲端運算環境下,雲端服務提供商提供了多樣化的雲端服務給使用者使用。為了吸引使用者使用雲端服務,雲端服務平台的安全與隱私問題將是重要的議題。因此我們認為應發展相關的安全機制,為群組協同合作、雲端照護服務與行動商務,提供更具隱私性的雲端服務安全保護機制。對於群組協同合作,我們提出了一個貢獻式群組金鑰協定,以達到群組秘密通訊。在這個設計中,群組的參與者可以在公開的網路環境中,進行安全的群組金鑰協商。為了將分享的資料進行加密,不會被洩露給雲端服務應用提供商以及沒有權限的使用者。然而,在我們的設計中,不論是有新的參與者加入或是舊的群組參與者離開,都能保證協同合作加密金鑰的安全性,因此,我們的設計為群組溝通,建立了強韌性。對於雲端照護服務,我們提出了一個緊急存取授權協定。病人的個人健康記錄往往能給予緊急醫生進行準確的緊急治療。當病人昏迷不醒時,病人無法授予緊急醫生做病人的個人健康記錄資料存取。因此,我們設計的緊急存取授權模式,確保了雲端照護服務中需要在緊急治療時,需要個人健康記錄的緊急存取需求。除此之外,我們也提供了病人在事後可以針對他的個人健康記錄的存取記錄進行稽核。提供事後緊急醫生不可否認曾經存取過病人的個人健康記錄,有效地提高了雲端照護服務的安全性。對於行動商務,我們植基於聯盟忠誠度提出了一個之安全電子發票為基礎的行動優惠?整合系統。我們的方法能夠讓消費者容易透過手機App收集電子發票以兌換紅利點數與行動優惠?。以商業角度而言,聯盟忠誠度將提供一些優點,如企業可以共享品牌、行銷費用操作成本、增加交叉銷售的機會,並降低實施忠誠度的費用。以消費者角度而言,聯盟夥伴因為提供各種獎勵將能刺激顧客的回購行為。我們的設計將在實用上使消費者更方便於收集和使用紅利點數。

In cloud computing environments, the cloud service provider offers various services to the users. For attracting the users to use the cloud services, the security and privacy of the cloud service platform will become an important topic. We proposed the related security mechanisms for providing the security protection of the cloud service. In the group collaboration, we proposed a secure group communication with contributory group key agreement. The participants of the collaboration can establish a group key over a public network for encrypting the shared data. As a member joining or leaving the group, there are more designs about secure transmission and precise verification for the group key. This design can provide group communication with more secure and robust. In the cloud healthcare service, we propose an emergency access authorization scheme for granting the access permission to emergency doctor. The patient’s personal health record(PHR) enables the doctor to give accurate emergency treatment. Because the patients may be unconscious during an emergency, the patient cannot grant the access permission to the doctor for obtaining the patient’s PHR. Our design proposes the emergency access scheme to make the emergency doctor can obtain the patient’s PHR access permission from the cloud service. Moreover, we also provide the patient to be able to audit his access log. The doctor cannot deny having made an access request. This design provides the security and privacy on the cloud healthcare service. In the mobile commerce, based on the concept of the coalition loyalty program, we propose an integrated system of electronic invoice and mobile coupon. The proposed scheme enables the customer to simply collect the e-invoices for redeeming the bonus points and then be used for redeeming the m-coupon via the smartphone application (App). From a business perspective, the coalition loyalty program offers a number of benefits such as the companies can share the branding, the marketing expense, the operational costs, the data ownership of the common loyalty currency and increase the cross-promotion opportunities. It also reduces the expense of the implementation loyalty program. Such the coalition loyalty program will be able to stimulate the repurchase behavior of customers for fast earning or accumulating the rewards since the coalition partners offer a variety of rewards. The scheme is more convenient and practical to collect and use the bonus points for the customers.

致謝詞 i
中文摘要 ii
Abstract iii
Table of Contents v
List of Figures viii
Chapter 1. Introduction 1
1.1 Motivation 1
1.2 Objectives 12
1.3. Research Scopes 12
1.4. Organization 14
Chapter 2. Contributory Group Key Agreement for Secure Group Communication Based on Collaboration Service Platform 15
2.1 Preliminary 15
2.2 Related Work 17
2.2.1 Key Agreement Procedure 18
2.2.2 Join Procedure 20
2.2.3 Leave Procedure 23
2.3 The Weaknesses of Zhao et al. ’s DASGKA Protocol 24
2.3.1 The Issue of Backward Secrecy 24
2.3.2 The Issue of Forward Secrecy 25
2.4 Proposed Protocol 25
2.4.1 Key Agreement Phase 26
2.4.2 Member Joining Phase 32
2.4.3 Member Leaving Phase 36
2.5 Security Analysis 40
2.5.1 Passive Attack 40
2.5.2 Unknown Key-share 41
2.5.3 Key Freshness 41
2.5.4 Contributiveness 42
2.5.5 Backward Secrecy 42
2.5.6 Forward Secrecy 43
2.6 Summary 43
Chapter 3. Secure Emergency Access Authorization for Personally Controlled Online Health Records Based on Cloud Healthcare Service 45
3.1 Preliminary 45
3.2 Proposed Protocol 48
3.2.1 Initial Phase 48
3.2.2 Emergency Access Phase 51
3.2.3 Self-Renewal Phase 56
3.3 Security Analysis 57
3.3.1 Authentication 57
3.3.2 Replay Attack 58
3.3.3 Integrity 58
3.3.4 Non-repudiation 58
3.3.5 Effectiveness 59
3.3.6 Privacy 60
3.3.7 Database Intruders 60
3.4 Summary 60
Chapter 4. Secure Electronic Invoice based Mobile Coupon System 62
4.1 Preliminary 62
4.2 Proposed Protocol 64
4.2.1 Initial Phase 65
4.2.2 Issuing E-invoice Phase 67
4.2.3 Obtaining Bonus Points Phase 69
4.2.4 Obtaining or Giving M-coupon Phase 72
4.2.5 Redemption M-coupon Phase 74
4.3 Security Analysis 76
4.3.1 Preventing Unmatched Proof of Purchase 76
4.3.2 Protecting Unredeemed M-coupons 77
4.3.3 Preventing M-coupon Manipulation 77
4.3.4 Preventing Unauthorized Issuance of M-coupons 78
4.3.5 Preventing M-coupon Double Spending 78
4.4 Summary 78
Chapter 5. Conclusions and Future Works 80
Bibliography 83


[1] P. Mell and T. Grance, “SP 800-145: The NIST Definition of Cloud Computing,” Sep. 2011.
[2] F. Liu, J. Tong, J. Mao, R. Bohn, J. Messina, L. Badger, and D. Leaf, “SP 500-292: NIST Cloud Computing Reference Architecture,” Sep. 2011.
[3] METISfiles. Available at: http://www.themetisfiles.com/2014/06/cloudscape-spain. Accessed 19 May 2016.
[4] Techtarget. Available at: http://searchsap.techtarget.com/definition/ERP. Accessed 19 May 2016.
[5] N. Y. Sahin, “Cloud ERP Security: Guidelines for Evaluation,” Master’s thesis, Stockholm University, 2013.
[6] Whatis.com. Available at: http://whatis.techtarget.com/definition/Communications-as-a-Service-CaaS. Accessed 19 May 2016.
[7] Utilicomm Solutions. Available at: http://www.utilicomm.com/how-to-evaluate-uc-as-a-service-security. Accessed 19 May 2016.
[8] Techtarget. Available at: http://searchcrm.techtarget.com/definition/CRM. Accessed 19 May 2016.
[9] Toolbox.com. Available at: http://it.toolbox.com/blogs/insidecrm/5-security-vulnerabilities-for-saas-crm-systems-70592. Accessed 19 May 2016.
[10] Cisco, “Building a Collaboration Architecture for a Global Supply Chain,” 2010.
[11] Google Drive. Available at: https://www.google.com/intl/zh-TW/drive. Accessed 29 March 2016.
[12] Dropbox. Available at: https://www.dropbox.com. Accessed 29 March 2016.
[13] Mozy. Available at: https://mozy.com. Accessed 29 March 2016.
[14] Bitcasa. Available at: https://www.bitcasa.com. Accessed 29 March 2016.
[15] Memopal. Available at: http://www.memopal.com. Accessed 29 March 2016.
[16] M. Healey, “Why IT Needs To Push Data Sharing Efforts,” Jun. 2010.
[17] A Microsoft HealthVault. Available at: http://www.healthvault.com. Accessed 29 March 2016.
[18] M. Scholl, K. Stine, J. Hash, P. Bowen, A. Johnson, C. D. Smith, and D. I. Steinberg, “SP 800-66: An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule,” Oct. 2008.
[19] Online Project Management Reviews. Available at: http://online-project-management-review.toptenreviews.com/?cmpid=ttr-ustip. Accessed 19 May 2016.
[20] CDC Unified Process. Available at: http://www2.cdc.gov/cdcup/library/newsletter/CDC_UP_Newsletter_v2_i6.pdf. Accessed 19 May 2016.
[21] Clarizen. Available at: https://www.techopedia.com/definition/30583/workspace-as-a-service-waas. Accessed 19 May 2016.
[22] A. Rampell, “Why Online2Offline Commerce Is A Trillion Dollar Opportunity,” Aug. 2010.
[23] S. Balasubramanian, R. A. Peterson, and S. L. Jarvenpaa, “Exploring the Implications of M-Commerce for Markets and Marketing,” Journal of the Academy of Marketing Science, vol. 30, no. 4, pp. 348-361, 2002.
[24] T. M. Tsai, W. N. Wang, Y. T. Lin, and S. C. Choub, “An O2O Commerce Service Framework and its Effectiveness Analysis with Application to Proximity Commerce,” Procedia Manufacturing, Vo. 3, pp. 3498-3505, 2015.
[25] H. Y. Tseng, and J. T. Chang, “Electronic and Mobile Coupon Characteristics on Redemption Intentions,” The 10th International Conference on e-Business, Bangkok, Thailand, Nov. 23-24, 2015.
[26] B. Berman, “Developing an effective customer loyalty program,” California management review, vol. 49, no. 1, pp. 123-148, 2006.
[27] Michael T. Capizzi, and R. Ferguson, “Loyalty trends for the twenty-first century,” Journal of consumer marketing, vol. 22, no. 2, pp. 72-80, 2005.
[28] Techopedia. Available at: https://www.clarizen.com/project-management-solutions/security.html. Accessed 19 May 2016.
[29] Glasscubes. Available at: https://www.glasscubes.com/online-workspaces. Accessed 19 May 2016.
[30] Vertiscale. Available at: http://vertiscale.com/wp-content/uploads/2015/06/Vertiscale_WaaS_Defining_Security_Mobility_Healthcare.pdf. Accessed 19 May 2016.
[31] G. Balaiah, and V. Srinivasa Rao, “A protocol for authenticated group key transfer based on secret sharing,” International Journal of Advanced Engineering Sciences and Technologies, vol. 8, no. 2, pp. 256-260, 2011.
[32] L. Harn, and C. Lin, “Authenticated group key transfer protocol based on secret sharing,” IEEE Transactions on Computers, vol. 59, no. 6, pp. 842-846, 2010.
[33] C. Hsu, B. Zeng, G. Cui, and L. Chen, “A new secure authenticated group key transfer protocol,” Wireless Personal Communications, vol. 74, no. 2, pp. 457-467, 2014.
[34] Y. H. Park, Y. H. Park, and S. J. Moon, “Privacy-preserving ID-based key agreement protocols for cluster-based MANETs,” Int. J. Ad Hoc and Ubiquitous Computing, vol. 14, no. 2, pp.78-89, 2013.
[35] Sherman, and D. McGrew, “Key establishment in large dynamic groups using one-way function trees,” IEEE Transactions on Software Engineering, vol. 29, no. 5, pp. 444-458, 2003.
[36] T. Y. Wu, Y. M. Tseng, and C. W. Yu, “Two-round contributory group key exchange protocol for wireless network environments,” EURASIP Journal on Wireless Communications and Networking, 2011.
[37] X. Zou, and Y. Karandikar, “A novel conference key management solution for secure dynamic conferencing,” International Journal of Security and Networks, vol. 3, no. 1, pp. 47-53, 2008.
[38] R. Dutta, and R. Barua, “Constant round dynamic group key agreement,” Information Security 3650, pp. 74-88, 2005.
[39] R. Dutta, and R. Barua, “Provably secure constant round contributory group key agreement in dynamic setting,” IEEE Transactions on Information Theory, vol. 54, no. 5, pp. 2007-2025, 2008.
[40] I. Ingemarsson, D. T. Tang, and C. K.Wong, “A conference key distribution system,” IEEE Transactions on Information Theory, vol. 28, no. 5, pp. 714-720, 1982.
[41] H. J. Kim, S. M. Lee, and D. H. Lee, “Constant-round authenticated group key exchange for dynamic groups,” Advances in Cryptology, vol. 3329, pp. 245-259, 2004.
[42] Y. Kim, A. Perrig, and G. Tsudik, “Group key agreement efficient in communication,” IEEE Transactions on Computers, vol. 53, no. 7, pp. 905-921, 2004.
[43] Y. Kim, A. Perrig, and G. Tsudik, “Tree-based group key agreement,” ACM Transaction on Information and System Security, vol. 7, no. 1, pp. 60-96.
[44] K. Kumar, J. Nafeesa Begum, and V. Sumathy, “A novel approach towards cost effective region-based group key agreement protocol for secure group communication,” International Journal of Computer Science and Information Security, vol. 8, no. 2, pp. 65-74, 2010.
[45] L. Liao, and M. Manulis, “Tree-based group key agreement framework for mobile ad hoc networks,” Future Generation Computer Systems, vol. 23, no. 6, pp. 787-803, 2007.
[46] C. Li, and C. Xu, “Scalable group key exchange protocol with provable security,” The International Journal for Computation and Mathematics in Electrical and Electronic Engineering, vol. 32, no. 2, pp. 612-619, 2013.
[47] M. Steiner, G. Tsudik, and M. Waidner, “Key agreement in dynamic peer groups,” IEEE Transactions on Parallel and Distributed Systems, vol. 11, no. 8, pp. 769-780, 2000.
[48] Q. Wu, Y. Mu, W. Susilo, B. Qin, and J. Domingo-Ferrer, “Asymmetric Group Key Agreement,” 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009.
[49] X. Zhao, F. Zhang, and H. Tian, “Dynamic asymmetric group key agreement for ad hoc networks,” Ad Hoc Networks, vol. 9, no. 5, pp. 928-939, 2011.
[50] C. C. Chang, and C. Y. Chung, “An efficient session key generation protocol,” Proc. IEEE International Conference on Communication Technology, Beijing, China, pp. 203-207, 2003.
[51] I. R. Chen, J. H. Cho, and D. C. Wang, “Performance characteristics of region-based group key management in mobile ad hoc networks,” Proc. IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Taichung, Taiwan, pp.411-419, 2006.
[52] J. Pan, L. Cai, and X. S. Shen, “Promoting identity-based key management in wireless ad hoc networks,” Part II. Wireless Network Security, Springer Press, pp. 83-102, 2007.
[53] T. Bernard, and H. Fouchal, “Slot assignment over wireless sensor networks,” Proc. IEEE Global Telecommunications Conference, Houston, Texas, pp. 1-5, 2011.
[54] L. H. Yen, and K. H. Chi, “Maintaining a ring structure for mobile ad hoc computing,” Journal of Parallel and Distributed Computing, vol. 64, no. 12, pp. 1371-1379, 2004.
[55] S. Blake-Wilson, D. Johnson, and A. Menezes, “Key agreement protocols and their security analysis,” Proc. 6th IMA International Conference on Cryptography and Coding, pp. 30-45, 1997.
[56] U.S. Department of Health and Human Services, “Personal health records and the HIPAA privacy rule,” 2008.
[57] C. I. Señor, J. L. Fernández-Alemán, and A. Toval, “Are personal health records safe? a review of free web-accessible personal health record privacy policies,” Journal of Medical Internet Research, vol. 14, no. 4, 2012.
[58] D. A. Jones, J. P. Shipman, D. A. Plaut, and C. R. Selden, “Characteristics of personal health records: findings of the medical library association/national library of medicine joint electronic personal health record task force,” Journal of the Medical Library Association, vol. 98, no. 3, pp. 243-249, 2010.
[59] L. Fernandez-Luque, R. Karlsen, and J. Bonander, “ Review of extracting information from the social web for health personalization,” Journal of Medical Internet Research, vol. 13, no. 1, 2011.
[60] P. C. Tang, J. S. Ash, D. W. Bates, J. M. Overhage, and D. Z. Sands, “Personal health records: definitions, benefits, and strategies for overcoming barriers to adoption,” Journal of the American Medical Information Association, vol. 13, no. 2, pp.121-126, 2006.
[61] B. Adida, and I. S. Kohane, “GenePING: secure, scalable management of personal genomic data,” BMC Genomics, vol. 7, pp. 1-10, 2006.
[62] A. Wright, and D. F. Sittig, “Encryption characteristics of two USB-based personal health record devices,” Journal of the American Medical Information Association, vol. 14, no. 4, pp. 397-399, 2007.
[63] F. L. Maloneya, and A. Wright, “USB-based personal health records: an analysis of features and functionality,” International Journal of Medical Informatics, vol. 79, no. 2, pp. 97-111, 2010.
[64] W. S. Jian, S. Syed-Abdul, S. P. Sood, P. Lee, M. H. Hsu, C. H. Ho, Y. C. Li, and H. C. Wen, “Factors influencing consumer adoption of USB-based personal health records in Taiwan.,” BMC Health Services Research, vol. 12, pp. 1-8, 2012.
[65] J. L. Fernández-Alemán, C. L. Seva-Llor, A. Toval, S. Ouhbi, and L. Fernández-Luque, “Free web-based personal health records: an analysis of functionality,” Journal of Medical Systems, vol. 37, no. 6, 2012.
[66] M. Wang, C. Lau, F. A. Matsen, and Y. Kim, “ Personal health information management system and its application in referral management,” IEEE Transactions on Information Technology in Biomedicine, vol. 8, no. 3, pp. 287-297, 2004.
[67] H. Kharrazi, R. Chisholm, D. VanNasdale, and B. Thompson, “Mobile personal health records: an evaluation of features and functionality,” International Journal of Medical Informatics, vol. 81, no. 9, pp. 579-593, 2012.
[68] M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, “Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 1, pp. 131-143, 2013.
[69] K. T. Win, “Web-based personal health record systems evaluation,” International Journal of Healthcare Technology and Management, vol. 7, pp. 208-217, 2006.
[70] D. F. Sittig, “Personal health records on the internet: a snapshot of the pioneers at the end of the 20th century,” International Journal of Medical Informatics, vol. 65, pp. 1-6, 2002.
[71] B. Soubhagya, M. G. Venifa, and C. A. J. Jeya, “A homomorphic encryption technique for scalable and secure sharing of personal health record in cloud computing,” International Journal of Computer Applications, vol. 67, no. 11, pp. 40-44, 2013.
[72] A. Sunyaev, D. Chornyi, C. Mauro, and H. Krcmar, “Evaluation framework for personal health records: Microsoft HealthVault vs. Google Health,” Proceeding of the 43rd Hawaii International Conference on System Sciences, Jan. 5-8,2010.
[73] M. N. Huda, S. Yamada, and N. Sonehara, “Privacy-aware access to patient-controlled personal health records in emergency situations,” 3rd International Conference on Pervasive Computing Technologies for Healthcare, Apr. 1-3, 2009.
[74] T. Chen, and S. Zhong, “Emergency access authorization for personally controlled online health care data,” Journal of Medical Systems, vol. 36, no. 1, pp. 291-300, 2010.
[75] S. L. Keoh, M. Asim, S. S. Kumar, and P. Lenoir, “Secure spontaneous emergency access to personal health record,” 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use, 2011.
[76] B. Sharp, and A. Sharp, “Loyalty programs and their impact on repeat-purchase loyalty patterns,” International journal of research in marketing, vol. 14, no. 5, pp. 473-486, 1997.
[77] Y. Liu, “The long-term impact of loyalty programs on consumer purchase behavior and loyalty,” Journal of marketing, vol. 71, no. 4, pp. 19-35, 2007.
[78] R. Kivetz, and I. Simonson, “Earning the right to indulge: effort as a determinant of customer preferences toward frequency program rewards,” Journal of marketing research, vol. 39, no. 2, pp. 155-70, 2002.
[79] Praveen K. Kopalle, and Scott A. Neslin, “The economic viability of frequency reward programs in a strategic competitive environment,” Review of marketing science, vol. 1, no. 1, 2003.
[80] F. F. Reichheld, and W. Earl Sasser, “Zero defections: quality comes to services,” Harvard business review, vol. 68, no. 5, pp. 105-111, 1990.
[81] J. A. Bellizzi, and T. Bristol, “An assessment of supermarket loyalty cards in one major US market,” Journal of consumer marketing, vol. 21, no. 2, pp. 144-154, 2004.
[82] K. Kathy, “Using loyalty programs to attract consumers to value-added businesses,” College of agricultural sciences, Pennsylvania state university, Dec. 2006.
[83] L. Glossary, “Loyalty program,” Electronic merchant systems, Aug. 2011.
[84] R. Lacey, and J. Z. Sneath, “Customer loyalty programs: are they fair to consumers?,” Journal of Consumer Marketing, vol. 23, no. 7, pp. 458-464, 2006.
[85] J. Nunes, and X. Dreze, “Your loyalty program is betraying you,” Harvard business review, vol. 84, no. 4, pp. 124, 2006.
[86] Starbucks “My starbucks rewards program,” available at: http://www.starbucks.com/card/rewards/rewards-program-ts-and-cs. Accessed 29 March 2016.
[87] A. Chaudhuri, and Morris B. Holbrook, “The chain of effects from brand trust and brand affect to brand performance: the role of brand loyalty,” Journal of marketing, vol. 65, no. 2, pp. 81-93, 2001.
[88] C. Blundo, S. Cimato, and A. De Bonis, “Secure e-coupons,” Electronic commerce research, vol. 5, no. 1, pp. 117-139, 2005.
[89] C. C. Chang, C. C. Wu, and I. C. Lin, “A secure e-coupon system for mobile users,” International journal of computer science and network security, vol. 6, no.1, 2006.
[90] S. Dominikus, and M. Aigner, “mCoupons: An application for near field communication (NFC),” 21st International conference on advanced information networking and applications workshops, pp. 421-428, Ont, May. 21-23, 2007.
[91] S. W. Park, and I. Y. Lee, “Efficient mCoupon authentication scheme for smart poster environments based on low-cost NFC,” International journal of security and its applications, vol. 7, no. 5, pp. 131-138, 2013.
[92] S. C. Hsueh, and J. M. Chen, “Sharing secure m-coupons for peer-generated targeting via eWOM communications,” Electronic commerce research and applications, vol. 9, no. 4, pp. 283-293, 2010.


QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top