Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 管理學院
  3. 資訊管理學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/40951
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor曹承礎
dc.contributor.authorTzu-Lin Changen
dc.contributor.author張子林zh_TW
dc.date.accessioned2021-06-14T17:08:27Z-
dc.date.available2008-07-30
dc.date.copyright2008-07-30
dc.date.issued2008
dc.date.submitted2008-07-26
dc.identifier.citation1. FOAF Vocabulary Specification 0.91. [cited; Available from: http://xmlns.com/foaf/spec/.
2. Golbeck, J.A., Computing and Applying Trust in Web-based Social Networks. 2005.
3. Anne Adams, M.M., Angela Sasse, Privacy in Multimedia Communications: Protecting Users, Not Just Data. 2001.
4. B Carminati, E.F., A Perego, Rule-Based Access Control for Social Networks, in Move to Meaningful Internet Systems. 2006.
5. Google Docs. [cited; Available from: http://docs.google.com.
6. Creative Commons Attribution. [cited; Available from: http://creativecommons.org/licenses/by/2.5/.
7. Roos, L. and I.S. Herschberg, On the validity of the Bell-LaPadula model. Comput. Secur., 1994. 13(4): p. 317-333.
8. Ravi S. Sandhu, E.J.C., Hal L. Feinstein, Charles E. Youman, Role-Based Access Control Models. IEEE Computer Society, 1996. 29.
9. Gollu, K.K., S. Saroiu, and A. Wolman, A Social Networking-Based Access Control Scheme for Personal Content.
10. DERI.Galway, I.T.U.o.G., Poland, FOAF-Realm - control your friends' access to resources. FOAF Workshop proceedings, 2004.
11. Masao, O., et al., Accelerating cross-project knowledge collaboration using collaborative filtering and social networks. SIGSOFT Softw. Eng. Notes, 2005. 30(4): p. 1-5.
12. Orkut. [cited; Available from: http://www.orkut.com.
13. Friendster. [cited; Available from: http://www.friendster.com/.
14. Facebook. [cited; Available from: http://www.facebook.com/home.php.
15. The Friend of a Friend (FOAF) project. [cited; Available from: http://www.foaf-project.org/.
16. FOAFRealm. [cited; Available from: http://www.foafrealm.org/.
17. P Bromiley, L.C., Transaction costs in organizations with trust. Working paper. Research on Negotiations in Organizations, 1995.
18. Luhmann, N., Familiarity, confidence, trust: Problems and alternatives. Trust: Making and Breaking Cooperative Relations, electronic edition, 2000.
19. Butler, J.K.C., R. S., A behavioral decision theory approach to modeling dyadic trust in superiors and subordinates. Psychological Reports, 1984. 55: 19-28.
20. Luhmann, N., Trust and power. 1979: UK: Wiley.
21. Carnevale. P. J. D., P.D.G., & Carrington, P. J., Effects of future dependence, liking and repeated requests for help on helping behavior. Social Psychology Quarterly, 1982. 45: 9-14.
22. Zand, D.E., Trust and managerial problem solving. Administrative Science Quarterly, 1972. 17: 229-239.
23. Deutsch, M., Trust and suspicion. Journal of Conflict Resolution, 1958.
24. Gabarro, J., The development of trust, influence and expectations. Interpersonal behaviors: Communication and understanding in relationships, 1978: p. 290-303.
25. Zucker, L., Production of trust: Institutional sources of economic structure. Research in organizational behavior, 1986. 8: p. 53- 111.
26. Jennifer Golbeck1, B.P., James Hendler1., Trust Networks on the Semantic Web. Springer Berlin / Heidelberg, 2003. Volume 2782/2003.
27. Sepandar, D.K., T.S. Mario, and G.-M. Hector, The Eigentrust algorithm for reputation management in P2P networks, in Proceedings of the 12th international conference on World Wide Web. 2003, ACM: Budapest, Hungary.
28. Peer Trust. [cited; Available from: http://www.l3s.de/peertrust/.
29. S Toivonen, G.L., I Uusitalo, Context-aware Trust Evaluation Functions for Dynamic Reconfigurable Systems. WWW2006, 2006.
30. Wellman, B., An electronic group is virtually a social network. 1997.
31. BW On, N.K., D Lee, D Srivastava, Group Linkage, in IEEE ICDE, Istanbul, Turkey. 2007.
32. Moffett, J.D. and E.C. Lupu, The uses of role hierarchies in access control. Proceedings of the fourth ACM workshop on Role-based access control, 1999: p. 153-160.
33. Johnson, S.J., F. Shah, J, The inter-group router approach to scalable group composition, in Distributed Computing Systems, 1999. Proceedings. 19th IEEE International Conference. 1999.
34. Glance, N., D. Arregui, and M. Dardenne, Knowledge Pump: Community-centered Collaborative Filtering. Proceedings of the 5 thDELOS Workshop ob Filtering and Collaborative Filtering, Budapest, November, 1997.
35. McDonald, D.W., Recommending collaboration with social networks: a comparative evaluation. Proceedings of the SIGCHI conference on Human factors in computing systems, 2003: p. 593-600.
36. Adomavicius, G. and A. Tuzhilin, Toward the Next Generation of Recommender Systems: A Survey of the State-of-the-Art and Possible Extensions. 2005.
37. Circle of Trust. [cited; Available from: http://apps.facebook.com/trustnetwork/?AB=0:homefrom:sideb.
38. Most Mutual Friends. [cited; Available from: http://apps.facebook.com/mutual_friends.
39. More Friends. [cited; Available from: http://apps.facebook.com/friend-finder/.
40. Most Active Friends. [cited; Available from: http://apps.facebook.com/mostactive/.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/40951-
dc.description.abstract網路上分享資訊的服務越來越多,但是使用者可以選擇的分享範圍卻沒什麼改變,當要找人幫忙的時候,仍然不是張貼訊息到適合的地方,就是找認識的人一個一個問。透過社會網路表示的人與人之間的關係,人們可以接觸到朋友的朋友及其更遠的朋友,然而要使用社會網路不但要經過繁雜的設定,而且也難以評估那些遠方的朋友。因為這些問題,目前實務上使用社會網路的服務,仍無法對社會網路上的對象做彈性的設定分享範圍。
本研究希望能讓提供使用者不需太多設定就可以開始區分社會網路上遠方的朋友,並對這些人能更客觀的評估是否值得信任。本研究提出把團體資料放入既有朋友關係的社會網路中,建構出新的社會網路,並提供使用者一些基本的設定,藉此搜尋並根據分享資訊的內容,計算設定範圍內的人或團體是否值得信任,使用者並可用此設定做存取控制決定分享的對象。
透過本系統,使用者可以從日常生活既有的使用行為,產生所需要的資料,評估他人是否值得信任,以增進使用者在分享資訊的效率。本研究可以讓使用者不需經過冗長的設定,就可以開始使用本系統,並挑選適合的對象,讓資訊的分享可以更有效率。
zh_TW
dc.description.abstractThere are more and more services for information sharing. However, few choices can be selected when people need to decide who can be shared. When people need help, they still only can post information into some website or ask friends one by one. Through social networks, people can touch friends of friends and even farther friends. However, in order to use social networks, people have to configure many settings. Additionally, system can hardly estimate those people’s ability and willing. Because these questions, there are no existing services which can allow users flexibly decide information sharing scope in social networks.
This study proposes architecture to help users don’t need to set too many configurations to share information. Additionally, this system can help users more rational to estimate who are worthy to trust. First, this study adds group data into social networks. Then, users can set some basic rules to search this social network. At the same time, this system will evaluate which people is trustworthy according information content type. Finally, user can use these rules to rule-based access control.
This system can acquire data into social networks from daily using behavior. After recognizing user’s relationship, this system can estimate who is worthy to trust. Then, this system can help user to share or filter information more effectively. User can start to use this system without setting trust rating, and find suit target to collaborate.
en
dc.description.provenanceMade available in DSpace on 2021-06-14T17:08:27Z (GMT). No. of bitstreams: 1
ntu-97-R95725023-1.pdf: 1499643 bytes, checksum: f3cbd90d0b9325028fa5cc18efac1ac0 (MD5)
Previous issue date: 2008
en
dc.description.tableofcontents致謝 i
中文摘要 ii
THESIS ABSTRACT iii
目錄 v
圖目錄 vii
表目錄 viii
第一章 緒論 1
第一節 研究背景 1
第二節 研究動機 1
第三節 研究目的 2
第四節 研究架構 3
第二章 文獻探討 5
第一節 資訊分享時的考量 5
第二節 存取控制模型 6
2.2.1 自由裁量的存取控制 6
2.3.2 強制性的存取控制 7
2.3.3 角色為基礎的存取控制系統 7
2.3.4 社會網路為基礎的存取控制 8
第三節 社會網路 10
第四節 信任 12
2.4.1信任的定義與重要性 12
2.4.2信任的屬性 13
2.4.3信任的計算 14
第五節 團體(group) 16
第三章 系統模組設計 18
第一節 情境與系統目的 18
第二節 社會網路的結構 19
第三節 存取控制規則 22
第四節 評估信任的演算法 24
第四章 雛形系統實作 27
第一節 系統使用情境 27
第二節 系統開發工具 28
第三節 系統功能 28
第四節 系統畫面 31
第五節 與其他研究比較 35
3.5.1 以規則為基礎的存取控制系統 35
3.5.2 共同背景的社會網路 36
3.5.3 團體關係打散成個人關係的社會網路 36
3.5.4 內容推薦方法(Content-Based Recommendation Methods) 37
3.5.5 協同過濾(Collaborative Filtering) 38
3.5.6 既有應用服務 39
第五章 雛形系統效能評估 42
第一節 實驗設計 42
第二節 系統實驗與分析 43
4.2.1 系統運作概況 43
4.2.2 系統功效分析 44
4.2.3 使用者滿意度 48
第三節 系統實驗結果討論 50
第六章 結論 53
第一節 總結 53
第二節 研究貢獻 54
第三節 未來展望 55
參考文獻 57
dc.language.isozh-TW
dc.subject團體zh_TW
dc.subject社會網路zh_TW
dc.subject存取控制zh_TW
dc.subject信任zh_TW
dc.subject資訊分享zh_TW
dc.subjectgroupen
dc.subjectSocial networken
dc.subjectTrusten
dc.subjectInformation sharingen
dc.subjectAccess controlen
dc.title用團體資料強化的社會網路為基礎的存取控制系統zh_TW
dc.titleGroup-enhanced Social Networks-based Access Controlen
dc.typeThesis
dc.date.schoolyear96-2
dc.description.degree碩士
dc.contributor.oralexamcommittee陳建錦,林俊叡
dc.subject.keyword社會網路,存取控制,信任,資訊分享,團體,zh_TW
dc.subject.keywordSocial network,Trust,Information sharing,Access control,group,en
dc.relation.page68
dc.rights.note有償授權
dc.date.accepted2008-07-29
dc.contributor.author-college管理學院zh_TW
dc.contributor.author-dept資訊管理學研究所zh_TW
顯示於系所單位:資訊管理學系

文件中的檔案:
檔案 大小格式 
ntu-97-1.pdf
  未授權公開取用
1.46 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved