期刊文献+

支持目的与信誉度的隐私偏好规约模型 被引量:1

Privacy Preference Specification Model for Supporting Purpose and Reputation
下载PDF
导出
摘要 确保互联网服务在满足用户功能性需求的前提下保护隐私信息,是隐私保护研究的关键问题。访问控制是保护信息的传统手段,但其缺少使用目的、信誉度、义务等隐私语义,并且需要针对不同的数据使用者定义不同的策略。针对策略冗余、策略冲突等问题,提出了支持目的与信誉度绑定的隐私保护框架。首先给出了对应的访问控制模型,其次分析了隐私偏好的冲突问题,提出了目的冲突检测算法以及偏好冲突检测算法,最后通过实验证明了算法的可行性。 It is the key issue of privacy protection to ensure that Internet services protect privacy information under the premise of meeting the functional requirements of users.Access control is a traditional way to protect information,but it lacks priva- cy semantics such as purpose, reputation, obligation, and needs to define different strategies for different data users.Aiming at policy redundancy and policy conflict, a privacy protection framework supporting purpose and reputation binding has been proposed.First- ly,the con'esponding access control model has been given.Secondly,the conflict of privacy preference has been analyzed.Finally, the purpose conflict detection algorithm and privacy preference conflict detection algorithm have been proposed.
作者 陶灵灵 曹彦 张梦娇 TAO Ling-ling;CAO Yan;ZHANG Meng-jiao(Nanjing University of Aeronautics and Astronautics,College of Computer Science and Technology,Nanjing,Jiangsu 211106,China)
出处 《计算技术与自动化》 2018年第3期122-126,共5页 Computing Technology and Automation
基金 国家自然科学基金资助项目(61772270) 国家高技术研究发展计划资助项目(863)(2015AA015303)
关键词 隐私保护 基于目的访问控制 隐私偏好 冲突检测 privacy protection PBAC privacy preference conflict detection
  • 相关文献

参考文献1

二级参考文献26

  • 1Papazogiou M P, Papazoglou M P, et al. Service-oriented computing research roadmap[ C]. Technical Report Paper on Service Oriented Computing European Union Information Society Technologies (IST) ,2006 : 1-29.
  • 2Carminati B, Ferrari E, Huang P C K. Exploring privacy issues in web services discovery agencies [ J ]. IEEE Security and Privacy, 2005,3(5) :14-21.
  • 3Zhu H. Challenges to reusable services [ C ]. In Proceeding of the IEEE International Conference on Services Computing (SCC 2005 ), Orlando,Florida, USA,2005:243-244.
  • 4AI-Nedhami I M, Sirdaa P K. A privacy framework for composite web services [ C ]. Proceedings of the International Workshop on Service-Oriented Engineering and Optimization, IEEE International Conference on High Performance Computing ,2008:1-9.
  • 5Shu Zhen, Ma Jian-wei, Luo Xue-shan. A Web service QoS predic- tion method based on reputation[ J]. Journal of Central South Uni- versity ( Science and Technology) ,2012,43 (5) : 1764-1772.
  • 6Lohmann N,Massuthe P, Stahl C, et al. Analyzing interacting BPEL processes[ M ]. Business Process Management, Springer Berlin Hei- delberg ,2006 : 17-32.
  • 7Lohmann N. A feature-complete Petri net semantics for WS-BPEL 2.0 and its compiler BPEL2oWFN[ C]. 4th International Workshop on Web Services and Formal Methods ( WS-FM2007 ), LNCS, 2007 : 1 - 41.
  • 8Lohmann N. A feature-complete Petri net semantics for WS-BPEL 2.0[ M]. Web Services and Formal Methods. Springer Berlin Hei- delberg,2008:77-91.
  • 9GNU. BPEL2OWFN [ EB/OL ] http://www, gnu. org/soflware/ bpel2owfn/index, html,2007.
  • 10Massuthe P, Weinberg D. Fiona [ EB/OL ] http ://www2. informa- ilk. hu-berlin, de/top/tools4bpel/fiona,2006.

共引文献2

同被引文献12

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部