學術產出-學位論文

文章檢視/開啟

書目匯出

Google ScholarTM

政大圖書館

引文資訊

TAIR相關學術產出

題名 使用本體論與規則執行企業隱私保護規範
Using ontologies and rules to enforce enterprise privacy protection policies
作者 郭弘毅
Guo, Hong Yi
貢獻者 胡毓忠
Hu, Yuh Jong
郭弘毅
Guo, Hong Yi
關鍵詞 語意網
企業隱私保護
本體論
規則
Semantic Web
Enterprise Privacy Protection
Ontology
Rule
日期 2009
上傳時間 8-十二月-2010 02:00:29 (UTC+8)
摘要 在今日愈來愈普及的電子商務方面,客戶資料的搜集來源更加廣泛,對於個人資料外洩的影響將非常嚴重,可能帶來個人財務上或者公司信譽上的重大損失。本研究期望可以建構一個在企業內部(backbone)架構的環境中,透過語意網(Semantic Web)中的本體論(Ontology)和規則(Rule)的加入,希望實現具有語意的個人隱私保護規範架構,實現在語意層級上的隱私權政策安全控管。找出並且驗證以Ontologies+Rules為規範的表達與管理的架構的優勢,以確保各企業伺服器平台在收集客戶個人資料時能夠遵守最初協商後的承諾。最後本研究可以透過第三方平台的架構來加以落實個人資料的流通、分享、與保護。
In today`s increasingly popular e-commerce, ways to collect personal data of customers are is more extensive, and the impact of data disclosure will be very serious, maybe it will cost heavy losses on personal reputation or the credit of companies. We hope to build a in-house (backbone) structure of the environment through the semantic web in the ontology and rules, hoping for enabling the semantics of personal privacy protection normative framework to achieve the privacy policy on the security control. We will identify and verify Ontologies + Rules to regulate the expression of the advantages of the structure and management to ensure that the enterprise platform servers will obey the usage of personal data after their initial consultation commitment. Finally, we propose a third-party platform to enforce data sharing and protection of personal data.
參考文獻 [1]. Anderson, A. H. (2006). "A Comparison of Two Privacy Policy Languages: EPAL and XACML." In Proceedings of the 3rd ACM workshop on Secure web services , 53-60.
[2]. Annie I. Antón, Q. H., and David L. (2004). "Inside JetBlue`s Privacy Policy Violations " IEEE SECURITY & PRIVACY (Vol. 2, No. 6) , 12-18.
[3]. Annie I. Anton, E. B., Ninghui Li, Ting Yu (2007). "A Roadmap For Comprehensive Online Privacy Policy Management." Communications of the ACM ,50(7) , 109-116.
[4]. Ardagna, C. A., E. Damiani, et al. (2004). "XML-based Access Control Languages." Information Security Technical Report Volume 9( Issue 3) , 35-46
[5]. Bonatti, P. A. and D. Olmedilla (2006). "Semantic Web Policies: Where are we and What is still Missing?" A tutorial at ESWC`06.
[6]. Bindiganavale, V. and J. Ouyang (2006). "Role Based Access Control in Enterprise Application – Security Administration and User Management." Information Reuse and Integration, 2006 IEEE International Conference , 111-116.
[7]. Connor, M. O. and A. Das (2009). "SQWRL: a Query Language for OWL." Proceedings of the 6th International Workshop on OWL: Experiences and Directions (OWLED 2009).
[8]. Stumme G. and Madche A.(2001),“FCA-Merge: Bottom-up merging of ontologies.” In 7th Intl.Conf.on Artificial Intelligence(IJCAI’01), 25-230, Seattle,WA
[9]. G¨unter Karjoth, M. S., and Michael Waidner (2002). "Platform for Enterprise Privacy Practices:Privacy-enabled Management of Customer Data."In 2ndWorkshop on Privacy Enhancing Technologies Lecture Notes in Computer Science.
[10]. G¨unter Karjoth, M. S., Els Van Herreweghen (2003). "Translating Privacy Practices into Privacy Promises—How to Promise What You Can Keep." In Policies for Distributed Systems and Networks , 135-146.
[11]. Guarino, N. (1998). "Formal ontology and information systems." Proc. Of the 1st International Conference, 3-15.
[12]. Gunter Karjoth, M. S. (2002). A Privacy Policy Model for EnterPrises. In 15th IEEE Computer Security Foundations Workshop.
[13]. HOCHHEISER, H. (2002). "The Platform for Privacy Preference as a Social Protocol: An Examination Within the U.S. Policy Context." ACM Transactions on Internet Technology, Vol. 2, No. 4 , 276-306.
[14]. Horrocks, I., P.F. Patel-Schneider, H. Boley, S. Tabet, B. Grosof, and M. Dean. (2004). "SWRL: A Semantic Web Rule Language Combining OWL and RuleML." W3C Member Submission.
[15]. Horrocks, I., P. F. Patel-Schneider, et al. (2004). "SWRL: A Semantic Web Rule Language Combining OWL and RuleML." W3C Member Submission.
[16]. Knublauch, H., M. A. Musen, and A. L. Rector. Editing description logics ontologies with the Protégé OWL plugin. , International Workshop on Description Logics.
[17]. Mitra P., Wiederhold G., and Kersten M. (2000). A Graph-Oriented Model for Articulation of Ontology Interdependencies. Extending Database Technology 2000(EDBT’2000). Konstanz,Germany.
[18]. Natalya F. Noy and Mark A. Musen (2001). “Anchor-PROMPT: Using non-local context for semantic matching.” In Proceedings of the workshop on Ontologies and Information Sharing at the International Joint Conference on Artificial Intelligence (IJCAI).
[19]. Natalya F. Noy and Mark A. Musen (2003). "The PROMPT suite: interactive tools for ontology merging and mapping." International Journal of Human-Computer Studies 59(6), 983-1024.
[20]. Parducci, B., H. Lockhart, et al. (2005). "eXtensible Access Control Markup Language (XACML), Version 2.0." from http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=xacml.
[21]. Paul Ashley, Satoshi Hada, et al. (2003). "The Enterprise Privacy Authorization Language(EPAL)."from http://www.w3.org/2003/p3p-ws/pp/ibm3.html.
[22]. YANNIS KALFOGLOU and MARCO SCHORLEMMER (2003). "Ontology mapping: the state of the art." The Knowledge Engineering Review 18(1), 1-31.
[23]. Ting Yu , N. L., and Annie I. Antón (2004). "A Formal Semantics for P3P." In Proceedings of the 2004 workshop on Secure web service , 1-8.
描述 碩士
國立政治大學
資訊科學學系
96753007
98
資料來源 http://thesis.lib.nccu.edu.tw/record/#G0096753007
資料類型 thesis
dc.contributor.advisor 胡毓忠zh_TW
dc.contributor.advisor Hu, Yuh Jongen_US
dc.contributor.author (作者) 郭弘毅zh_TW
dc.contributor.author (作者) Guo, Hong Yien_US
dc.creator (作者) 郭弘毅zh_TW
dc.creator (作者) Guo, Hong Yien_US
dc.date (日期) 2009en_US
dc.date.accessioned 8-十二月-2010 02:00:29 (UTC+8)-
dc.date.available 8-十二月-2010 02:00:29 (UTC+8)-
dc.date.issued (上傳時間) 8-十二月-2010 02:00:29 (UTC+8)-
dc.identifier (其他 識別碼) G0096753007en_US
dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/49164-
dc.description (描述) 碩士zh_TW
dc.description (描述) 國立政治大學zh_TW
dc.description (描述) 資訊科學學系zh_TW
dc.description (描述) 96753007zh_TW
dc.description (描述) 98zh_TW
dc.description.abstract (摘要) 在今日愈來愈普及的電子商務方面,客戶資料的搜集來源更加廣泛,對於個人資料外洩的影響將非常嚴重,可能帶來個人財務上或者公司信譽上的重大損失。本研究期望可以建構一個在企業內部(backbone)架構的環境中,透過語意網(Semantic Web)中的本體論(Ontology)和規則(Rule)的加入,希望實現具有語意的個人隱私保護規範架構,實現在語意層級上的隱私權政策安全控管。找出並且驗證以Ontologies+Rules為規範的表達與管理的架構的優勢,以確保各企業伺服器平台在收集客戶個人資料時能夠遵守最初協商後的承諾。最後本研究可以透過第三方平台的架構來加以落實個人資料的流通、分享、與保護。zh_TW
dc.description.abstract (摘要) In today`s increasingly popular e-commerce, ways to collect personal data of customers are is more extensive, and the impact of data disclosure will be very serious, maybe it will cost heavy losses on personal reputation or the credit of companies. We hope to build a in-house (backbone) structure of the environment through the semantic web in the ontology and rules, hoping for enabling the semantics of personal privacy protection normative framework to achieve the privacy policy on the security control. We will identify and verify Ontologies + Rules to regulate the expression of the advantages of the structure and management to ensure that the enterprise platform servers will obey the usage of personal data after their initial consultation commitment. Finally, we propose a third-party platform to enforce data sharing and protection of personal data.en_US
dc.description.tableofcontents 第一章 導論 10
     1.1研究動機 10
     1.2研究目的 11
     1.3各章節概述 13
     第二章 研究背景 14
     2.1個人隱私偏好平台 14
     2.2企業隱私架構探討 16
     2.3 本體論 17
     2.4 規則語言 19
     第三章 相關研究 20
     3.1存取控制(Access Control)與角色存取控制(RBAC) 20
     3.2 Extending Flexible Authorization Framework 20
     3.3企業隱私授權語言(EPAL) 21
     3.4 Extensible Access Control Markup Language 23
     第四章 方法架構設計 26
     4.1研究架構 26
     4.1.1 研究架構設計 26
     4.1.2 本體論設計能力探討 27
     4.1.2.1 只使用本體論建構企業隱私規範 27
     4.1.2.2 只使用規則建構企業隱私規範 28
     4.1.2.3 同時使用本體論與規則建構企業隱私規範 28
     4.2 本體論建構 28
     4.2.1 建構企業隱私本體論 28
     4.2.2 使用OWL公理來限制企業隱私本體論 35
     4.2.3可執行的電腦規範(Computer Policy)定義 38
     4.2.3.1 具有語意的規範定義 39
     4.2.4 使用SWRL(Semantic Web Rule Language)驗證企業隱私規範 39
     4.3 本體論結合 42
     4.3.1 本體論結合的必要性 42
     4.3.2 本體論結合方式 42
     4.3.3 本體論合併方法 43
     4.3.4 利用本體論合併實現企業間隱私規範交換 45
     4.3.5 企業資料流通的方式 50
     4.3.6 企業資料流通後之設定 54
     4.3.7 企業間資料及隱私規範交換正確性之驗證 55
     4.3.8 企業間資料及隱私規範交換範例 57
     第五章 系統實作 63
     5.1 使用工具 63
     5.2 Protégé 實作本體論及規則 65
     5.3 Protégé實現本體論合併 66
     5.4 程式實作SWRL規則流通 67
     第六章 結論與未來展望 68
     參考文獻 69
zh_TW
dc.language.iso en_US-
dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0096753007en_US
dc.subject (關鍵詞) 語意網zh_TW
dc.subject (關鍵詞) 企業隱私保護zh_TW
dc.subject (關鍵詞) 本體論zh_TW
dc.subject (關鍵詞) 規則zh_TW
dc.subject (關鍵詞) Semantic Weben_US
dc.subject (關鍵詞) Enterprise Privacy Protectionen_US
dc.subject (關鍵詞) Ontologyen_US
dc.subject (關鍵詞) Ruleen_US
dc.title (題名) 使用本體論與規則執行企業隱私保護規範zh_TW
dc.title (題名) Using ontologies and rules to enforce enterprise privacy protection policiesen_US
dc.type (資料類型) thesisen
dc.relation.reference (參考文獻) [1]. Anderson, A. H. (2006). "A Comparison of Two Privacy Policy Languages: EPAL and XACML." In Proceedings of the 3rd ACM workshop on Secure web services , 53-60.zh_TW
dc.relation.reference (參考文獻) [2]. Annie I. Antón, Q. H., and David L. (2004). "Inside JetBlue`s Privacy Policy Violations " IEEE SECURITY & PRIVACY (Vol. 2, No. 6) , 12-18.zh_TW
dc.relation.reference (參考文獻) [3]. Annie I. Anton, E. B., Ninghui Li, Ting Yu (2007). "A Roadmap For Comprehensive Online Privacy Policy Management." Communications of the ACM ,50(7) , 109-116.zh_TW
dc.relation.reference (參考文獻) [4]. Ardagna, C. A., E. Damiani, et al. (2004). "XML-based Access Control Languages." Information Security Technical Report Volume 9( Issue 3) , 35-46zh_TW
dc.relation.reference (參考文獻) [5]. Bonatti, P. A. and D. Olmedilla (2006). "Semantic Web Policies: Where are we and What is still Missing?" A tutorial at ESWC`06.zh_TW
dc.relation.reference (參考文獻) [6]. Bindiganavale, V. and J. Ouyang (2006). "Role Based Access Control in Enterprise Application – Security Administration and User Management." Information Reuse and Integration, 2006 IEEE International Conference , 111-116.zh_TW
dc.relation.reference (參考文獻) [7]. Connor, M. O. and A. Das (2009). "SQWRL: a Query Language for OWL." Proceedings of the 6th International Workshop on OWL: Experiences and Directions (OWLED 2009).zh_TW
dc.relation.reference (參考文獻) [8]. Stumme G. and Madche A.(2001),“FCA-Merge: Bottom-up merging of ontologies.” In 7th Intl.Conf.on Artificial Intelligence(IJCAI’01), 25-230, Seattle,WAzh_TW
dc.relation.reference (參考文獻) [9]. G¨unter Karjoth, M. S., and Michael Waidner (2002). "Platform for Enterprise Privacy Practices:Privacy-enabled Management of Customer Data."In 2ndWorkshop on Privacy Enhancing Technologies Lecture Notes in Computer Science.zh_TW
dc.relation.reference (參考文獻) [10]. G¨unter Karjoth, M. S., Els Van Herreweghen (2003). "Translating Privacy Practices into Privacy Promises—How to Promise What You Can Keep." In Policies for Distributed Systems and Networks , 135-146.zh_TW
dc.relation.reference (參考文獻) [11]. Guarino, N. (1998). "Formal ontology and information systems." Proc. Of the 1st International Conference, 3-15.zh_TW
dc.relation.reference (參考文獻) [12]. Gunter Karjoth, M. S. (2002). A Privacy Policy Model for EnterPrises. In 15th IEEE Computer Security Foundations Workshop.zh_TW
dc.relation.reference (參考文獻) [13]. HOCHHEISER, H. (2002). "The Platform for Privacy Preference as a Social Protocol: An Examination Within the U.S. Policy Context." ACM Transactions on Internet Technology, Vol. 2, No. 4 , 276-306.zh_TW
dc.relation.reference (參考文獻) [14]. Horrocks, I., P.F. Patel-Schneider, H. Boley, S. Tabet, B. Grosof, and M. Dean. (2004). "SWRL: A Semantic Web Rule Language Combining OWL and RuleML." W3C Member Submission.zh_TW
dc.relation.reference (參考文獻) [15]. Horrocks, I., P. F. Patel-Schneider, et al. (2004). "SWRL: A Semantic Web Rule Language Combining OWL and RuleML." W3C Member Submission.zh_TW
dc.relation.reference (參考文獻) [16]. Knublauch, H., M. A. Musen, and A. L. Rector. Editing description logics ontologies with the Protégé OWL plugin. , International Workshop on Description Logics.zh_TW
dc.relation.reference (參考文獻) [17]. Mitra P., Wiederhold G., and Kersten M. (2000). A Graph-Oriented Model for Articulation of Ontology Interdependencies. Extending Database Technology 2000(EDBT’2000). Konstanz,Germany.zh_TW
dc.relation.reference (參考文獻) [18]. Natalya F. Noy and Mark A. Musen (2001). “Anchor-PROMPT: Using non-local context for semantic matching.” In Proceedings of the workshop on Ontologies and Information Sharing at the International Joint Conference on Artificial Intelligence (IJCAI).zh_TW
dc.relation.reference (參考文獻) [19]. Natalya F. Noy and Mark A. Musen (2003). "The PROMPT suite: interactive tools for ontology merging and mapping." International Journal of Human-Computer Studies 59(6), 983-1024.zh_TW
dc.relation.reference (參考文獻) [20]. Parducci, B., H. Lockhart, et al. (2005). "eXtensible Access Control Markup Language (XACML), Version 2.0." from http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=xacml.zh_TW
dc.relation.reference (參考文獻) [21]. Paul Ashley, Satoshi Hada, et al. (2003). "The Enterprise Privacy Authorization Language(EPAL)."from http://www.w3.org/2003/p3p-ws/pp/ibm3.html.zh_TW
dc.relation.reference (參考文獻) [22]. YANNIS KALFOGLOU and MARCO SCHORLEMMER (2003). "Ontology mapping: the state of the art." The Knowledge Engineering Review 18(1), 1-31.zh_TW
dc.relation.reference (參考文獻) [23]. Ting Yu , N. L., and Annie I. Antón (2004). "A Formal Semantics for P3P." In Proceedings of the 2004 workshop on Secure web service , 1-8.zh_TW