English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 94986/125531 (76%)
Visitors : 31014044      Online Users : 483
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 理學院 > 資訊科學系 > 學位論文 >  Item 140.119/49165
    Please use this identifier to cite or link to this item: http://nccur.lib.nccu.edu.tw/handle/140.119/49165

    Title: 個人隱私揭露意願之推論
    Intention reasoning of personal privacy disclosure
    Authors: 吳建輝
    Wu, Chien Hui
    Contributors: 胡毓忠
    Hu, Yuh Jong
    Wu, Chien Hui
    Keywords: 語意網
    Date: 2009
    Issue Date: 2010-12-08 02:00:30 (UTC+8)
    Abstract: 對社會網路而言,使用者對使用者之間的隱私揭露會有不同程度的意願,然而目前的社會網路並沒有提供使用者一個良好的環境去撰寫屬於自己的隱私揭露規則。W3C對於Web Privacy的部份提出了P3P這個解決方案。此研究利用W3C所發佈的P3P與APPEL做為基礎平台讓使用者去撰寫屬於自己的隱私揭露規則,以控制使用者的隱私資料;而由於P3P與APPEL的設計並不具有語意,所以加入Semantic Web使其不會產生語意模糊不清的情況。而為了能讓使用者快速的瞭解一個人之可信任程度,本研究以Google的Page Rank演算法進行修改,設計一名為個人信任指數 (Personal Trust Rank,PTR)找出此平台中任一人之可信任的指數,以此去評估一個人是否是可信任狀態;最後找出兩個人之間的隱私揭露是否產生衝突,同時讓使用者可利用PTR設立門檻以達到Access Control之能力,據此以達成保護個人隱私之目標。
    In the social network, people have different privacy disclosure intention. However, it is not an easy way for a user to declare his/her own privacy disclosure policy, we adopt the P3P/APPEL languages to solve this problem. A user`s privacy policy is shown as APPEL and a server’s privacy declaration statement is expressed as P3P. However, P3P and APPEL are XML-based so they might have semantic inconsistency and ambiguity in the privacy policy representations. We resolve these issues by using the semantic web technologies to enable the privacy policy enforcement. To decide whether a person is trustworthy, we modify the Google`s Page Rank algorithm for Personal Trust Rank ( PTR ) to evaluate a person’s trust. Finally a reasoning engine is used to find out if there are any privacy disclosure inconsistencies between users.
    Reference: [1] A.F. Westin,”Science,Privacy,and Freedom: Issues and Proposals for the 1970.”,Columbia Law Review,1966
    [2] A.I. Anton, Ninghui Li, Ting Yu. “A Semantic-Based Approach to Privacy Languages.” Technical Report TR 2003-28, CERIAS, November 2003.
    [3] AT&T “Privacy Bird.” http://privacybird.com
    [4] C. Duma, A. Herzog, N. Shahmehri. “Privacy in the SemanticWeb: What Policy Languages Have to Offer”. Eighth IEEE International Workshop on Policies for Distributed Systems and Networks, 2007
    [5] L. Cranor , M. Langheinrich and M. Marchiori“A P3P Preference Exchange Language 1.0 (APPEL 1.0),” W3C Working Draft, www.w3.org/TR/P3P-preferences, April 15, 2002
    [6] D. N. Jutla, P. Bodorik, Y. Zhang,”PeCAN: An architecture for users’ privacy-aware electronic commerce contexts on the semantic web”,Information Systems,2006,Vol. 31,pp. 295-320
    [7] D. Simon,”Europe to US: No Privacy,No trade.”,Wired Magazine,1998,http://www.wired.com/wired/archive/6.05/europe_pr.html
    [8] H. Hochheiser,”The Platform for privacy preference as a social protocol: An examination within the U.S. policy context”,ACM Transactions on Internet Technology,November 2002,Vol. 2,No. 4
    [9] Horrocks, I., et al., “OWL rules: A proposal and prototype implementation” Journal of Web Semantics: Science, Services and Agents on the World Wide Web 3. 2005, pp. 23-40.
    [10] Horrocks, I., et al. “SWRL: A Semantic Web Rule Language Combining OWL and RuleML.” , Acknowledged W3C Member Submission,MAY 21,2004
    [11] John R. Searle,”Speech acts:an essay in the philosophy of language”,Cambridge University Press,1969
    [12] K. Cameron,”The Laws of Identity.”,Architect of Identity,Microsoft Corporation,2005,http://www.identityblog.com
    [13] L. Kagal. “Rei: A policy language for the me-centric project.“Technical report, HP Laboratories Palo Alto, September 2002.
    [14] L. Kagal, T. Finin, and A. Joshi. “A policy-based approach to security for the semantic web.” 2nd International Semantic Web Conference (ISWC’03), LNCS 2870, pages 402–418.
    [15] L. Page, S. Brin, R. Motwani, T. “The PageRank citation rank-
    ing: Bringing order to the web. Technical report, Stanford Digital Library Technologies
    [16] Mary J. Culnan,”Protecting Privacy Online: Is Self-Regulation Working?”,Journal of Public Policy & Marketing,2000,Vol. 19,pp. 20-26
    [17] M. K. Smith, C. Wetly, D. L. McGuiness,”OWL Web Ontology Language Guide.”,World Wide Web Consortium,2004,http://www.w3.org/TR/owl-guide/
    [18] P. Kolari, L. Ding, S. Ganjugunte, L. Kagal, A. Joshi, and T. Finin. “Enhancing Web Privacy Protection through Declarative Policies”. Eighth IEEE International Workshop on Policies for Distributed Systems and Networks,2005
    [19] R. Agrawal, J. Kiernan, R. Srikant, Yirong Xu,”An XPath-based Preference Language for P3P.”, 12th international conference on World Wide Web,2003,pages 629-639
    [20] R.O. Marson,”Four ethical issues of the information age”,Management Information Systems Quarterly,1986,Vol. 10,No. 1, pp. 5-12
    [21] S. Warren,L.D. Brandeis,”The Right to Privacy”,Harvard Law Review,1890
    [22] The friend of a friend(FOAF) project,” http://www.foaf-project.org/
    [23] T.R Gruber,”A Translation Approach to Portable Ontology Specifications”, Knowledge Acquisition, 1993, Vol.5,pp.199—220
    [24] W3C. “Platform for Privacy Preferences (P3P) Project”.
    [25] W3C.” Rules Interchange Format Working Group”.
    Description: 碩士
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0096753029
    Data Type: thesis
    Appears in Collections:[資訊科學系] 學位論文

    Files in This Item:

    File SizeFormat

    All items in 政大典藏 are protected by copyright, with all rights reserved.

    社群 sharing

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback