政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/49165
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 109948/140897 (78%)
Visitors : 46089351      Online Users : 1260
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/49165


    Title: 個人隱私揭露意願之推論
    Intention reasoning of personal privacy disclosure
    Authors: 吳建輝
    Wu, Chien Hui
    Contributors: 胡毓忠
    Hu, Yuh Jong
    吳建輝
    Wu, Chien Hui
    Keywords: 語意網
    Date: 2009
    Issue Date: 2010-12-08 02:00:30 (UTC+8)
    Abstract: 對社會網路而言,使用者對使用者之間的隱私揭露會有不同程度的意願,然而目前的社會網路並沒有提供使用者一個良好的環境去撰寫屬於自己的隱私揭露規則。W3C對於Web Privacy的部份提出了P3P這個解決方案。此研究利用W3C所發佈的P3P與APPEL做為基礎平台讓使用者去撰寫屬於自己的隱私揭露規則,以控制使用者的隱私資料;而由於P3P與APPEL的設計並不具有語意,所以加入Semantic Web使其不會產生語意模糊不清的情況。而為了能讓使用者快速的瞭解一個人之可信任程度,本研究以Google的Page Rank演算法進行修改,設計一名為個人信任指數 (Personal Trust Rank,PTR)找出此平台中任一人之可信任的指數,以此去評估一個人是否是可信任狀態;最後找出兩個人之間的隱私揭露是否產生衝突,同時讓使用者可利用PTR設立門檻以達到Access Control之能力,據此以達成保護個人隱私之目標。
    In the social network, people have different privacy disclosure intention. However, it is not an easy way for a user to declare his/her own privacy disclosure policy, we adopt the P3P/APPEL languages to solve this problem. A user"s privacy policy is shown as APPEL and a server’s privacy declaration statement is expressed as P3P. However, P3P and APPEL are XML-based so they might have semantic inconsistency and ambiguity in the privacy policy representations. We resolve these issues by using the semantic web technologies to enable the privacy policy enforcement. To decide whether a person is trustworthy, we modify the Google"s Page Rank algorithm for Personal Trust Rank ( PTR ) to evaluate a person’s trust. Finally a reasoning engine is used to find out if there are any privacy disclosure inconsistencies between users.
    Reference: [1] A.F. Westin,”Science,Privacy,and Freedom: Issues and Proposals for the 1970.”,Columbia Law Review,1966
    [2] A.I. Anton, Ninghui Li, Ting Yu. “A Semantic-Based Approach to Privacy Languages.” Technical Report TR 2003-28, CERIAS, November 2003.
    [3] AT&T “Privacy Bird.” http://privacybird.com
    [4] C. Duma, A. Herzog, N. Shahmehri. “Privacy in the SemanticWeb: What Policy Languages Have to Offer”. Eighth IEEE International Workshop on Policies for Distributed Systems and Networks, 2007
    [5] L. Cranor , M. Langheinrich and M. Marchiori“A P3P Preference Exchange Language 1.0 (APPEL 1.0),” W3C Working Draft, www.w3.org/TR/P3P-preferences, April 15, 2002
    [6] D. N. Jutla, P. Bodorik, Y. Zhang,”PeCAN: An architecture for users’ privacy-aware electronic commerce contexts on the semantic web”,Information Systems,2006,Vol. 31,pp. 295-320
    [7] D. Simon,”Europe to US: No Privacy,No trade.”,Wired Magazine,1998,http://www.wired.com/wired/archive/6.05/europe_pr.html
    [8] H. Hochheiser,”The Platform for privacy preference as a social protocol: An examination within the U.S. policy context”,ACM Transactions on Internet Technology,November 2002,Vol. 2,No. 4
    [9] Horrocks, I., et al., “OWL rules: A proposal and prototype implementation” Journal of Web Semantics: Science, Services and Agents on the World Wide Web 3. 2005, pp. 23-40.
    [10] Horrocks, I., et al. “SWRL: A Semantic Web Rule Language Combining OWL and RuleML.” , Acknowledged W3C Member Submission,MAY 21,2004
    [11] John R. Searle,”Speech acts:an essay in the philosophy of language”,Cambridge University Press,1969
    [12] K. Cameron,”The Laws of Identity.”,Architect of Identity,Microsoft Corporation,2005,http://www.identityblog.com
    [13] L. Kagal. “Rei: A policy language for the me-centric project.“Technical report, HP Laboratories Palo Alto, September 2002.
    [14] L. Kagal, T. Finin, and A. Joshi. “A policy-based approach to security for the semantic web.” 2nd International Semantic Web Conference (ISWC’03), LNCS 2870, pages 402–418.
    [15] L. Page, S. Brin, R. Motwani, T. “The PageRank citation rank-
    ing: Bringing order to the web. Technical report, Stanford Digital Library Technologies
    [16] Mary J. Culnan,”Protecting Privacy Online: Is Self-Regulation Working?”,Journal of Public Policy & Marketing,2000,Vol. 19,pp. 20-26
    [17] M. K. Smith, C. Wetly, D. L. McGuiness,”OWL Web Ontology Language Guide.”,World Wide Web Consortium,2004,http://www.w3.org/TR/owl-guide/
    [18] P. Kolari, L. Ding, S. Ganjugunte, L. Kagal, A. Joshi, and T. Finin. “Enhancing Web Privacy Protection through Declarative Policies”. Eighth IEEE International Workshop on Policies for Distributed Systems and Networks,2005
    [19] R. Agrawal, J. Kiernan, R. Srikant, Yirong Xu,”An XPath-based Preference Language for P3P.”, 12th international conference on World Wide Web,2003,pages 629-639
    [20] R.O. Marson,”Four ethical issues of the information age”,Management Information Systems Quarterly,1986,Vol. 10,No. 1, pp. 5-12
    [21] S. Warren,L.D. Brandeis,”The Right to Privacy”,Harvard Law Review,1890
    [22] The friend of a friend(FOAF) project,” http://www.foaf-project.org/
    [23] T.R Gruber,”A Translation Approach to Portable Ontology Specifications”, Knowledge Acquisition, 1993, Vol.5,pp.199—220
    [24] W3C. “Platform for Privacy Preferences (P3P) Project”.
    http://www.w3.org/P3P
    [25] W3C.” Rules Interchange Format Working Group”.
    http://www.w3.org/2005/rules/wg
    Description: 碩士
    國立政治大學
    資訊科學學系
    96753029
    98
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0096753029
    Data Type: thesis
    Appears in Collections:[Department of Computer Science ] Theses

    Files in This Item:

    File SizeFormat
    index.html0KbHTML2280View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback