dc.contributor.advisor | 胡毓忠 | zh_TW |
dc.contributor.advisor | Hu, Yuh Jong | en_US |
dc.contributor.author (作者) | 郭弘毅 | zh_TW |
dc.contributor.author (作者) | Guo, Hong Yi | en_US |
dc.creator (作者) | 郭弘毅 | zh_TW |
dc.creator (作者) | Guo, Hong Yi | en_US |
dc.date (日期) | 2009 | en_US |
dc.date.accessioned | 8-十二月-2010 02:00:29 (UTC+8) | - |
dc.date.available | 8-十二月-2010 02:00:29 (UTC+8) | - |
dc.date.issued (上傳時間) | 8-十二月-2010 02:00:29 (UTC+8) | - |
dc.identifier (其他 識別碼) | G0096753007 | en_US |
dc.identifier.uri (URI) | http://nccur.lib.nccu.edu.tw/handle/140.119/49164 | - |
dc.description (描述) | 碩士 | zh_TW |
dc.description (描述) | 國立政治大學 | zh_TW |
dc.description (描述) | 資訊科學學系 | zh_TW |
dc.description (描述) | 96753007 | zh_TW |
dc.description (描述) | 98 | zh_TW |
dc.description.abstract (摘要) | 在今日愈來愈普及的電子商務方面,客戶資料的搜集來源更加廣泛,對於個人資料外洩的影響將非常嚴重,可能帶來個人財務上或者公司信譽上的重大損失。本研究期望可以建構一個在企業內部(backbone)架構的環境中,透過語意網(Semantic Web)中的本體論(Ontology)和規則(Rule)的加入,希望實現具有語意的個人隱私保護規範架構,實現在語意層級上的隱私權政策安全控管。找出並且驗證以Ontologies+Rules為規範的表達與管理的架構的優勢,以確保各企業伺服器平台在收集客戶個人資料時能夠遵守最初協商後的承諾。最後本研究可以透過第三方平台的架構來加以落實個人資料的流通、分享、與保護。 | zh_TW |
dc.description.abstract (摘要) | In today`s increasingly popular e-commerce, ways to collect personal data of customers are is more extensive, and the impact of data disclosure will be very serious, maybe it will cost heavy losses on personal reputation or the credit of companies. We hope to build a in-house (backbone) structure of the environment through the semantic web in the ontology and rules, hoping for enabling the semantics of personal privacy protection normative framework to achieve the privacy policy on the security control. We will identify and verify Ontologies + Rules to regulate the expression of the advantages of the structure and management to ensure that the enterprise platform servers will obey the usage of personal data after their initial consultation commitment. Finally, we propose a third-party platform to enforce data sharing and protection of personal data. | en_US |
dc.description.tableofcontents | 第一章 導論 10 1.1研究動機 10 1.2研究目的 11 1.3各章節概述 13 第二章 研究背景 14 2.1個人隱私偏好平台 14 2.2企業隱私架構探討 16 2.3 本體論 17 2.4 規則語言 19 第三章 相關研究 20 3.1存取控制(Access Control)與角色存取控制(RBAC) 20 3.2 Extending Flexible Authorization Framework 20 3.3企業隱私授權語言(EPAL) 21 3.4 Extensible Access Control Markup Language 23 第四章 方法架構設計 26 4.1研究架構 26 4.1.1 研究架構設計 26 4.1.2 本體論設計能力探討 27 4.1.2.1 只使用本體論建構企業隱私規範 27 4.1.2.2 只使用規則建構企業隱私規範 28 4.1.2.3 同時使用本體論與規則建構企業隱私規範 28 4.2 本體論建構 28 4.2.1 建構企業隱私本體論 28 4.2.2 使用OWL公理來限制企業隱私本體論 35 4.2.3可執行的電腦規範(Computer Policy)定義 38 4.2.3.1 具有語意的規範定義 39 4.2.4 使用SWRL(Semantic Web Rule Language)驗證企業隱私規範 39 4.3 本體論結合 42 4.3.1 本體論結合的必要性 42 4.3.2 本體論結合方式 42 4.3.3 本體論合併方法 43 4.3.4 利用本體論合併實現企業間隱私規範交換 45 4.3.5 企業資料流通的方式 50 4.3.6 企業資料流通後之設定 54 4.3.7 企業間資料及隱私規範交換正確性之驗證 55 4.3.8 企業間資料及隱私規範交換範例 57 第五章 系統實作 63 5.1 使用工具 63 5.2 Protégé 實作本體論及規則 65 5.3 Protégé實現本體論合併 66 5.4 程式實作SWRL規則流通 67 第六章 結論與未來展望 68 參考文獻 69 | zh_TW |
dc.language.iso | en_US | - |
dc.source.uri (資料來源) | http://thesis.lib.nccu.edu.tw/record/#G0096753007 | en_US |
dc.subject (關鍵詞) | 語意網 | zh_TW |
dc.subject (關鍵詞) | 企業隱私保護 | zh_TW |
dc.subject (關鍵詞) | 本體論 | zh_TW |
dc.subject (關鍵詞) | 規則 | zh_TW |
dc.subject (關鍵詞) | Semantic Web | en_US |
dc.subject (關鍵詞) | Enterprise Privacy Protection | en_US |
dc.subject (關鍵詞) | Ontology | en_US |
dc.subject (關鍵詞) | Rule | en_US |
dc.title (題名) | 使用本體論與規則執行企業隱私保護規範 | zh_TW |
dc.title (題名) | Using ontologies and rules to enforce enterprise privacy protection policies | en_US |
dc.type (資料類型) | thesis | en |
dc.relation.reference (參考文獻) | [1]. Anderson, A. H. (2006). "A Comparison of Two Privacy Policy Languages: EPAL and XACML." In Proceedings of the 3rd ACM workshop on Secure web services , 53-60. | zh_TW |
dc.relation.reference (參考文獻) | [2]. Annie I. Antón, Q. H., and David L. (2004). "Inside JetBlue`s Privacy Policy Violations " IEEE SECURITY & PRIVACY (Vol. 2, No. 6) , 12-18. | zh_TW |
dc.relation.reference (參考文獻) | [3]. Annie I. Anton, E. B., Ninghui Li, Ting Yu (2007). "A Roadmap For Comprehensive Online Privacy Policy Management." Communications of the ACM ,50(7) , 109-116. | zh_TW |
dc.relation.reference (參考文獻) | [4]. Ardagna, C. A., E. Damiani, et al. (2004). "XML-based Access Control Languages." Information Security Technical Report Volume 9( Issue 3) , 35-46 | zh_TW |
dc.relation.reference (參考文獻) | [5]. Bonatti, P. A. and D. Olmedilla (2006). "Semantic Web Policies: Where are we and What is still Missing?" A tutorial at ESWC`06. | zh_TW |
dc.relation.reference (參考文獻) | [6]. Bindiganavale, V. and J. Ouyang (2006). "Role Based Access Control in Enterprise Application – Security Administration and User Management." Information Reuse and Integration, 2006 IEEE International Conference , 111-116. | zh_TW |
dc.relation.reference (參考文獻) | [7]. Connor, M. O. and A. Das (2009). "SQWRL: a Query Language for OWL." Proceedings of the 6th International Workshop on OWL: Experiences and Directions (OWLED 2009). | zh_TW |
dc.relation.reference (參考文獻) | [8]. Stumme G. and Madche A.(2001),“FCA-Merge: Bottom-up merging of ontologies.” In 7th Intl.Conf.on Artificial Intelligence(IJCAI’01), 25-230, Seattle,WA | zh_TW |
dc.relation.reference (參考文獻) | [9]. G¨unter Karjoth, M. S., and Michael Waidner (2002). "Platform for Enterprise Privacy Practices:Privacy-enabled Management of Customer Data."In 2ndWorkshop on Privacy Enhancing Technologies Lecture Notes in Computer Science. | zh_TW |
dc.relation.reference (參考文獻) | [10]. G¨unter Karjoth, M. S., Els Van Herreweghen (2003). "Translating Privacy Practices into Privacy Promises—How to Promise What You Can Keep." In Policies for Distributed Systems and Networks , 135-146. | zh_TW |
dc.relation.reference (參考文獻) | [11]. Guarino, N. (1998). "Formal ontology and information systems." Proc. Of the 1st International Conference, 3-15. | zh_TW |
dc.relation.reference (參考文獻) | [12]. Gunter Karjoth, M. S. (2002). A Privacy Policy Model for EnterPrises. In 15th IEEE Computer Security Foundations Workshop. | zh_TW |
dc.relation.reference (參考文獻) | [13]. HOCHHEISER, H. (2002). "The Platform for Privacy Preference as a Social Protocol: An Examination Within the U.S. Policy Context." ACM Transactions on Internet Technology, Vol. 2, No. 4 , 276-306. | zh_TW |
dc.relation.reference (參考文獻) | [14]. Horrocks, I., P.F. Patel-Schneider, H. Boley, S. Tabet, B. Grosof, and M. Dean. (2004). "SWRL: A Semantic Web Rule Language Combining OWL and RuleML." W3C Member Submission. | zh_TW |
dc.relation.reference (參考文獻) | [15]. Horrocks, I., P. F. Patel-Schneider, et al. (2004). "SWRL: A Semantic Web Rule Language Combining OWL and RuleML." W3C Member Submission. | zh_TW |
dc.relation.reference (參考文獻) | [16]. Knublauch, H., M. A. Musen, and A. L. Rector. Editing description logics ontologies with the Protégé OWL plugin. , International Workshop on Description Logics. | zh_TW |
dc.relation.reference (參考文獻) | [17]. Mitra P., Wiederhold G., and Kersten M. (2000). A Graph-Oriented Model for Articulation of Ontology Interdependencies. Extending Database Technology 2000(EDBT’2000). Konstanz,Germany. | zh_TW |
dc.relation.reference (參考文獻) | [18]. Natalya F. Noy and Mark A. Musen (2001). “Anchor-PROMPT: Using non-local context for semantic matching.” In Proceedings of the workshop on Ontologies and Information Sharing at the International Joint Conference on Artificial Intelligence (IJCAI). | zh_TW |
dc.relation.reference (參考文獻) | [19]. Natalya F. Noy and Mark A. Musen (2003). "The PROMPT suite: interactive tools for ontology merging and mapping." International Journal of Human-Computer Studies 59(6), 983-1024. | zh_TW |
dc.relation.reference (參考文獻) | [20]. Parducci, B., H. Lockhart, et al. (2005). "eXtensible Access Control Markup Language (XACML), Version 2.0." from http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=xacml. | zh_TW |
dc.relation.reference (參考文獻) | [21]. Paul Ashley, Satoshi Hada, et al. (2003). "The Enterprise Privacy Authorization Language(EPAL)."from http://www.w3.org/2003/p3p-ws/pp/ibm3.html. | zh_TW |
dc.relation.reference (參考文獻) | [22]. YANNIS KALFOGLOU and MARCO SCHORLEMMER (2003). "Ontology mapping: the state of the art." The Knowledge Engineering Review 18(1), 1-31. | zh_TW |
dc.relation.reference (參考文獻) | [23]. Ting Yu , N. L., and Annie I. Antón (2004). "A Formal Semantics for P3P." In Proceedings of the 2004 workshop on Secure web service , 1-8. | zh_TW |