請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/27606完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 曹承礎(Seng-Cho Chou) | |
| dc.contributor.author | Chia-Ho Yu | en |
| dc.contributor.author | 余佳和 | zh_TW |
| dc.date.accessioned | 2021-06-12T18:11:48Z | - |
| dc.date.available | 2007-11-15 | |
| dc.date.copyright | 2007-11-15 | |
| dc.date.issued | 2007 | |
| dc.date.submitted | 2007-10-08 | |
| dc.identifier.citation | 1. [Ackeman et al., 2001] M Ackerman, T Darrell, DJ Weitzner, “Privacy in Context”, Human-Computer Interaction, Lawrence Erlbaum Associates, Inc., vol. 16, 2001, pp. 167-176
2. [Adams, 1999] A. Adams, “Users' perception of privacy in multimedia communication”, Conference on Human Factors in Computing Systems, ACM Press, 1999, pp. 53-54 3. [Agrawal et al., 2003] Rakesh Agrawal et al., “An XPath-based Preference Language for P3P”, Proceedings of the 12th international conference on World Wide Web, ACM Press, 2003, pp. 629 – 639 4. [APPEL, 2002] L. F. Cranor et al., “A P3P Preference Exchange Language 1.0 (APPEL1.0)”, World Wide Web Consortium, 2002, http://www.w3.org/TR/P3P-preferences 5. [Baldauf et al., 2004] M. Baldauf, S. Dustdar, “A Survey on Context-aware systems”, Technical. University of Vienna (2004). 6. [Berners-Lee et al., 2001] T. Berners-Lee, J. Hendler, O. Lassila, “The Semantic Web,” Scientific American, May 2001 7. [Chen et al., 2003] H. Chen, T. Finin, 'An Ontology for a Context Aware Pervasive Computing Environment', IJCAI workshop on ontologies and distributed systems, Acapulco MX, August 2003. 8. [Chen et al., 2004] H. Chen, T. Finin, A. Joshi, “A pervasive computing ontology for user privacy protection in the context broker architecture”, TR-CS-04-08, University of Maryland, 2004 9. [Cranor et al., 2006] L. F. Cranor, P. Guduru, M. Arjula, “User interfaces for privacy agents”, ACM Transactions on Computer-Human Interaction, ACM Press, vol.13, issue 2, 2006, pp. 135 – 178 10. [Cranor, 2003] L. F. Cranor, “P3P: making privacy policies more useful”, Security & Privacy Magazine, IEEE Press, vol.1, issue 6, 2003, pp. 50- 55 11. [Culnan, 2000] M.J. Culnan, “Protecting Privacy Online: Is Self-Regulation Working?”, Journal of Public Policy & Marketing, vol. 19, no. 1, 2000, pp. 20-26. 12. [Dey et al., 2000] Dey, A. K., Abowd,G. D., “Towards a better understanding of context and context-awareness”. In Proceedings of the Workshop on the What, Who, Where, When and How of Context-Awareness, affiliated with the CHI 2000 Conference on Human Factors in Computer Systems, 2000. 13. [FTC, 1998] Federal Trade Commission (FTC), “Privacy Online: A Report to Congress”, 1998, http://www.ftc.gov/privacy/privacyinitiatives/promises_reptest.html 14. [Gandon & Sadeh, 2003] F.L. Gandon, N. M. Sadeh, ”A Semantic E-Wallet to Reconcile Privacy and Context Awareness”, ISWC 2003, Springer Berlin, 2003, pp. 385-401 15. [GIT, 1998] Georgia Institute of Technology, “GVU's 10th WWW User Survey”, http://www.gvu.gatech.edu/user_surveys/survey-1998-10/ 16. [Goffman, 1959] E. Goffman, “The Presentation of Self in Everyday Life”, Anchor-Doubleday, New York, 1959 17. [Green et al., 1998] H. Green, C. Yang, P. C. Judge, “A Little Net Privacy, Please,” BusinessWeek, 1998, http://www.businessweek.com/1998/11/b3569104.htm 18. [Gu et al., 2000] Tao Gu, Xiao Hang Wang, Hung Keng Pung, Da Qing Zhang, “An Ontology-based Context Model in Intelligent Environments“, Department of Computer Science, National University of Singapore, Singapore Connected Home Lab, Institute for Infocomm Research, Singapore 19. [Henricksen et al., 2002] Henricksen, Karen, et al. “Modeling Context Information in Pervasive Computing Systems”, Pervasive 2002. 20. [Henricksen et al., 2005] K. Henricksen, R. Wishart, T. McFadden, J. Indulska, 'Extending context models for privacy in pervasive computing environments', PerCom 2005 Workshops, IEEE Press, 2005, pp. 20- 24 21. [Hochheiser, 2002] H. Hochheiser, “The platform for privacy preference as a social protocol: An examination within the U.S. policy context”, ACM Transactions on Internet Technology, ACM Press, vol.2, issue 4, 2002, pp. 276 - 306 22. [Hong et al., 2006] D. Hong, M. Yuan, V. Y. Shen, 'Dynamic privacy management: a plug-in service for the middleware in pervasive computing”, MobileHCI'05, ACM Press, 2006, pp. 1-8 23. [Jutla et al., 2006] D. N. Jutla, P. Bodorik, Y. Zhang, ” PeCAN: an architecture for users' privacy-aware electronic commerce contexts on the semantic web”, Information Systems, vol.31, no. 4, 2006, pp. 295-320 24. [Kindberg et al., 2001] T. Kindberg, J. Barton, “A Web-based Nomadic Computing System”, Computer Networks, 35(4):443- 456, 2001. 25. [Laurence, 1978] H. T. Laurence, “American constitution Law”, 1978, pp. 886-990. 26. [Mason, 1986] R.O. Mason, “Four ethical issues of the information age,” Management Information Systems Quarterly, vol. 10, no. 1, 1986, pp. 5-12. 27. [Microsoft, 2006] “Privacy in Internet Explorer 6”, http://msdn2.microsoft.com/en-gb/library/ms537343.aspx 28. [OECD, 1997] OECD, “Implementing the OECD Privacy Guidelines in the electronic environment: focus on the internet”, 1997, http://www.oecd.org/dataoecd/33/43/2096272.pdf 29. [OWL, 2004] M. K. Smith, C. Welty, D. L. McGuinness, “OWL Web Ontology Language Guide”, World Wide Web Consortium, 2004, http://www.w3.org/TR/owl-guide/ 30. [P3P, 2002] L. F. Cranor et al., “The Platform for Privacy Preferences 1.0 (P3P1.0) Specification”, World Wide Web Consortium, 2002, http://www.w3.org/TR/P3P/ 31. [Ranganathan et al., 2002] Ranganathan, Anand, et al. “A Middleware for Context-Aware Agents in Ubiquitous Computing Environments”, USENIX International Middleware Conference, 2002. 32. [RDF, 1998] Frank Manola et al., “RDF Primer”, World Wide Web Consortium, 1998, http://www.w3.org/TR/rdf-primer/ 33. [Richard & Anita 1992] C. T. Richard, L. A. Anita, Privacy: Cases and Materials, John Marshall Publishing Company, Houston, TX, 1992 34. [Simon, 1998] D. Simon, “Europe to US: No privacy, no trade.” Wired Magazine, 1998, http://www.wired.com/wired/archive/6.05/europe_pr.html 35. [Susannah, 2000] F. Susannah, “Trust and Privacy Online: Why Americans want to rewrite the rule”, The Pew Internet & American Life Project, 2000, http://www.pewinternet.org/report_display.asp?r=19 36. [Tapscott, 1997] D. Tapscott, “The Digital Economy: Promise and Peril In The Age of Networked Intelligence”, McGraw-Hill, 1997. 37. [Tavani & Moor, 2001] H.T. Tavani, J.H. Moor , “Privacy protection, control of information, and privacy-enhancing technologies”, ACM SIGCAS Computers and Society, vol. 31, no. 1, 2001, pp. 6-11. 38. [Wang et al., 1998] H. Wang, M.K.O. Lee, C. Wang, “Consumer privacy concerns about internet marketing”, Communications of the ACM, vol. 41, no. 3, 1998, pp. 63-70. 39. [Wang et al., 2004] Xiao Hang Wang, Da Qing Zhang ,Tao Gu, Hung Keng Pung, “Ontology Based Context Modeling and Reasoning using OWL”, Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW’04) 2004 IEEE 40. [Warren & Brandeis, 1890] S. Warren, L. D. Brandeis, “The Right to Privacy”, Harvard Law Review, vol. 4, no. 5, 1890, pp. 193-220 41. [Weiser, 1993] M. Weiser, 'Some Computer Science Issues in Ubiquitous Computing', Communications of the ACM, vol. 36, no. 7, ACM Press, 1993, pp. 75-83. 42. [Westin, 1966] A. F. Westin, “Science, Privacy, and Freedom: Issues and Proposals for the 1970's.”, Columbia Law Review, vol. 66, no. 7, 1966, pp. 1205-1253 43. [Westin, 1967] A. F Westin, “Privacy and Freedom”, Atheneum Publishers, New York, 1967. 44. [White House, 1997] The White House, “A Framework for Global Electronic Commerce”, 1997, http://www.technology.gov/digeconomy/framewrk.htm 45. [XML, 1998] Tim Bray et al., “Extensible Markup Language (XML) 1.0 (Fourth Edition)”, World Wide Web Consortium, 1998, http://www.w3.org/TR/xml/ 46. [XPath, 1999] James Clark, Steve DeRose, “XML Path Language (XPath) Version 1.0”, World Wide Web Consortium, 1999, http://www.w3.org/TR/xpath 47. [Youssef et al., 2006] M. Youssef, N. R. Adam, V. Atluri, “Semantically enhanced enforcement of mobile consumer's privacy preferences”, SAC’06, ACM Press, 2006, pp. 1172 – 1176 | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/27606 | - |
| dc.description.abstract | 層出不窮的資料外洩新聞,打擊了民眾的使用意願。研究指出,成功的電子商務有賴於妥善保護個人隱私。W3C制定的P3P及APPEL幫助網站公布隱私政策,讓使用者自訂隱私偏好。也有學者提出不同的平台來保護私密資訊。然而,現有的體系皆未考量使用者在不同情境下會有不同的隱私偏好,以及隱私偏好設定之繁複;演算架構亦不適用於未來無所不在的運算環境。本研究提出以本體論為基礎的平台,希望賦予使用者更精確的隱私控制能力,並減輕設定上的困擾,以適用於快速改變的、充滿大量情境資訊的環境。
本研究運用W3C的語意網標準語言OWL,讓使用者依情境定義不同精確程度的隱私偏好。根據使用者設定的隱私偏好以及不同的情境資訊,本研究導入描述性邏輯的演算架構,用以自動決定資訊是否可以公開,或是否要接受提供者傳遞的資訊。本研究並提出混合式調適演算法,針對無所不在的運算環境中,情境資訊快速變動的情況,改善現有研究在此環境中的效能缺失。 透過知識本體驅動平台,使用者被賦予多層次且豐富的隱私偏好表達能力,並降低使用者被無所不在的服務要求淹沒的可能性。此技術使系統可以根據使用者的真實偏好,做出正確決定,減輕使用者對於隱私侵害的顧慮,增進服務被接受的可能性。 | zh_TW |
| dc.description.abstract | The incessant news of data security breach has reduced the willingness of public to use the Internet network. Research has shown that successful e-Commerce relies heavily on effective protection of privacy. The launch of P3P and APPEL by W3C has assisted websites in announcing their privacy policies and allowed users to customize their privacy preference. Some scholars, on the other hand, have proposed various platforms to protect private information. However, the current systems takes into account neither users’ privacy preference under different contexts nor the complexity of privacy preference customization; and the algorithm framework may not fit the ubiquitous computing environment in the future. This study proposes an ontological platform that empowers users with higher precision control over their personal privacy customization and alleviates the difficulties faced in setting, so that it is suitable for a fast changing environment filled with vast quantity of contextual information.
This study adopts the semantic web standard language OWL, provided by W3C, to let users define privacy preference at varied accuracy levels under different contexts. Based on user-customized privacy preference and diverse contextual information, this study introduces a descriptive logic algorithm framework to automatically determine whether to disclose personal information or accept information transmitted by providers. In addition, this study utilizes Hybrid Adaptive Reasoning Algorithm to improve research efficiency on Ubiquitous Computing Environment where contextual information changes rapidly. The Ontology Driven Platform offers users multi-dimensional expression capability with privacy preference and reduces the possibility of being overwhelmed by ubiquitous service requests. The technology enables the system to make correct decisions in accordance with users’ genuine preferences, alleviate concerns about privacy invasion, and thus increase service acceptance. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-12T18:11:48Z (GMT). No. of bitstreams: 1 ntu-96-R92725007-1.pdf: 3169668 bytes, checksum: a6680f960fa9ca62e69b35eb11863133 (MD5) Previous issue date: 2007 | en |
| dc.description.tableofcontents | 致謝 i
中文摘要 ii THESIS ABSTRACT iii 目錄 v 圖目錄 viii 表目錄 x 第一章 緒論 1 第一節 研究背景 1 第二節 研究動機 3 第三節 研究目的 4 第四節 研究架構 5 第二章 文獻探討 7 第一節 隱私權的定義 7 第二節 W3C相關工作 8 2.2.1 隱私偏好平台(Platform for Privacy Preference,P3P) 9 2.2.2 P3P偏好交換語言(A P3P Preference Exchange Language,APPEL) 10 2.2.3 使用者代理人程式(User Agent Software) 13 第三節 相關研究論文 15 2.3.1 e-Wallet 15 2.3.2 PeCAN 17 2.3.3 Context Broker 20 第四節 語意網(Semantic Web)與情境(Context) 22 2.4.1 語意網(Semantic Web) 22 2.4.2 情境(Context) 24 第三章 系統模型建構 26 第一節 情境需求與系統目的 26 第二節 名詞定義 30 第三節 系統架構 32 3.3.1 遭遇之問題 32 3.3.2 系統概觀 34 3.3.3 混合式調適推論演算法(Hybrid Adaptive Reasoning Algorithm) 38 第四節 實例 41 第四章 雛型系統架構與實做 46 第一節 雛型系統架構 46 第二節 開發工具 57 第三節 測試環境與結果 62 第四節 實驗結果討論 67 第五章 結論 70 第一節 研究總結 70 第二節 研究貢獻 71 第三節 未來展望 72 參考文獻 74 | |
| dc.language.iso | zh-TW | |
| dc.subject | 描述性邏輯 | zh_TW |
| dc.subject | 隱私偏好 | zh_TW |
| dc.subject | 情境感知 | zh_TW |
| dc.subject | 隱私權 | zh_TW |
| dc.subject | OWL | zh_TW |
| dc.subject | 知識本體 | zh_TW |
| dc.subject | ontology | en |
| dc.subject | Privacy | en |
| dc.subject | OWL | en |
| dc.subject | context-awareness | en |
| dc.subject | privacy preference | en |
| dc.subject | description logic | en |
| dc.title | 以本體論為基礎的情境感知隱私保護架構 | zh_TW |
| dc.title | An Ontology-Based Context Aware Privacy Protection Framework | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 96-1 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 蔡益坤(Yih-Kuen Tsay),吳玲玲(Ling-ling Wu) | |
| dc.subject.keyword | 隱私權,OWL,情境感知,隱私偏好,描述性邏輯,知識本體, | zh_TW |
| dc.subject.keyword | Privacy,OWL,context-awareness,privacy preference,description logic,ontology, | en |
| dc.relation.page | 77 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2007-10-09 | |
| dc.contributor.author-college | 管理學院 | zh_TW |
| dc.contributor.author-dept | 資訊管理學研究所 | zh_TW |
| 顯示於系所單位: | 資訊管理學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-96-1.pdf 未授權公開取用 | 3.1 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
