2004 3603U077-8
1 1 1.1.................................... 1 1.1.1......................... 1 1.1.2.................... 2 1.2.................................. 2 1.2.1............... 2 1.2.2....................... 3 1.3.................................. 4 1.4................................ 5 2 6 2.1.................... 8 2.1.1 (Penates).... 8 2.1.2..................... 9 2.1.3......................... 11 2.2........................ 13 2.2.1............... 13 2.2.2...................... 14 2.3..... 15 2.3.1....................... 15 2.3.2......... 18 2.4............. 19 2.4.1 blogwatcher..................... 19 2.4.2................. 21 2.5 blog.......... 22 2.5.1.......... 23 2.5.2...... 23 2.5.3...................... 23 2.5.4............................... 24 2.5.5......................... 24 2.6................... 26 2.6.1 OECD............................... 26 2.6.2..................... 27 2.6.3..................... 27 2.6.4...................... 27 2.6.5 GBDe............................... 27 2.6.6......................... 29 2.7........................ 31 1
2.7.1........................... 32 2.7.2.......................... 34 2.7.3......................... 35 2.7.4......................... 36 2.8.................. 37 2.8.1....................... 37 2.8.2....................... 38 2.8.3......................... 39 2.8.4.......................... 40 2.8.5......................... 43 2.9................... 44 2.9.1......................... 44 2.9.2......................... 45 2.10........................... 47 2.10.1.......... 47 2.10.2............. 51 2.10.3......................... 52 2.11..................... 54 2.11.1.......................... 54 2.11.2................................ 55 2.11.3......................... 59 2.12.............. 60 2.12.1...................... 60 2.12.2.................. 61 2.12.3........................... 61 2.12.4............................ 62 2.12.5........................... 62 2.12.6.................... 62 2.12.7......................... 64 2.13 Penates.............................. 65 2.13.1............................ 65 2.13.2............................ 66 2.13.3............................ 66 2.13.4............................ 67 3 68 3.1......................... 68 3.2.......................... 69 3.2.1......................... 70 3.2.2............................ 71 3.3.......................... 72 3.3.1............................ 72 3.3.2......................... 73 2
4 74 4.1 TRUSTe.................................. 74 4.1.1........................... 74 4.1.2 TRUSTe-Watchdog........................ 74 4.2 GBDe............................. 75 4.2.1........................... 75 4.2.2 (ADR)...................... 76 4.2.3.......................... 78 4.2.4.............................. 80 4.2.5....................... 81 4.2.6............................ 84 4.2.7...................... 86 4.2.8........................... 87 4.2.9...................... 87 4.2.10 RFID............................... 90 4.3 91 4.3.1 Matter of Trust: What Users Want From Web Sites..... 91 4.3.2 Trust and privacy online: Why Americans want to rewrite the rules............................... 93 5 95 5.1 Penates............................. 95 5.2......................... 96 6 97 A 99 A.1.............................. 99 A.2......................... 100 A.3.................................. 101 B 102 C 104 C.1............................... 104 C.1.1........................... 104 C.1.2........................... 104 C.2............................. 104 C.2.1.................. 104 C.2.2....................... 104 C.2.3...................... 104 C.2.4...................... 105 C.2.5...................... 105 C.3.................. 105 C.3.1......................... 105 C.3.2.................. 105 3
C.3.3.................... 105 C.4................ 105 C.4.1........... 105 C.4.2......................... 105 C.4.3.................. 106 C.4.4............... 106 C.5............... 106 C.5.1............ 106 C.5.2......... 111 C.6............................... 113 C.6.1...................... 113 C.6.2........... 114 C.6.3............... 114 C.6.4................. 114 C.6.5.................... 114 C.6.6..................... 114 C.7............................... 114 C.7.1............................ 114 C.7.2............................ 115 C.7.3............................ 115 C.7.4............................ 115 C.8.................................... 115 C.8.1......................... 115 C.8.2............. 115 C.8.3............................... 115 C.8.4................. 116 C.8.5........... 116 C.8.6...................... 116 C.8.7................ 116 D 117 E 118 E.1............... 118 E.1.1 118 E.1.2................. 118 E.2................................ 118 E.3............................... 119 F 120 F.1....................... 120 F.1.1....................... 120 F.1.2............... 120 F.1.3............. 120 4
F.1.4................. 121 F.2......................... 121 F.2.1................................ 121 F.2.2........... 122 F.2.3.................... 123 F.2.4..... 123 F.3.................. 124 F.3.1............................ 124 F.3.2......... 124 F.3.3......................... 124 F.3.4....... 126 F.3.5..................... 126 G 127 G.1.......... 127 G.1.1................................ 127 G.1.2.............................. 127 G.1.3.................. 128 G.1.4................. 128 G.1.5................. 128 G.1.6........... 128 G.1.7.......................... 128 G.1.8........................... 128 G.1.9...................... 128 5
2.1................................ 6 2.2 Penates.................................. 9 2.3............................... 57 2.4 ID............................... 58 3.1............................... 69 A.1 Penates................................ 101 6
2.1.............................. 39 2.2 Penates - -........................ 65 2.3 Penates - -........................ 66 2.4 Penates - -........................ 67 2.5 Penates - -........................ 67 7
Abstract As the techniques for the applications of the personalized services are being developed, the user s interest of privacy-protection becomes higher. However, the problems for the privacy-protection can not be solved, if it is only concerned from the systematic point of view, but also needed to be concerned from some non-systematic point of view, like, socially, legally, etc. Therefore, I prepared 9 points of contention as the problems to concern about privacy-protection. Then, by considering these 9 contentions, I propose the framework which evaluate the system which implement to protect the privacy. In addition to that, I evaluate my own system, called Panates (Privacy protection Architecture for contextaware EnvironmentS) which makes it possible, the user control own personal information, and the transaction of personal information be seamless, based on that framework, and examine what is missing this Penates to be the perfect system to protect privacy.
1 1.1 [2] [4] 1.1.1 1 1 1
1.1.2 1.2 1.2.1 [7] 2
1.2.2 C 3
OECD( ) OECD EU EU EU 1.3 4
1.4 5
2 2.1 1. 1-1. 1-2. 2. 2-1. 2-2. 3. 3-1. 3-2. 3-3. 4. 4-1. 4-2. 2.1: 6
7
2.1 [16] 2.1.1 (Penates) ( Penates 1 ) [3] 1 Penates Privacy protection Architecture for contextaware EnvironmentS 8
Penates 2.2 1. 2. 3. 4. 5. 1 5 3 2 4 2.2: Penates A 2.1.2 Penates 9
Penates 1. 2. 3. 4. Penates XML 10
XML 2.1.3 Penates 11
2 GBDe [10] Penates Penates Penates 2 12
2.2 2.2.1 [5] [5] 13
Kollock.P 2.2.2 blog 14
2.3 2.3.1 +1 0-1 15
Bidders Bidders @nifty goo Bidders Bidders Live door Live door livedoor 16
+4 +2 +1-1-4 17
2.3.2 18
2.4 blogwatcher 2.4.1 blogwatcher blogwatcher [8] blog 19
html blog blog blog 20
2.4.2 21
2.5 blog blog blog D 22
2.5.1 2.5.2 URL blogwatcher 2.5.3 E 23
2.5.4 blogwatcher blog 2.5.5 24
25
2.6 OECD [9] OECD 2.6.1 OECD Organization for Economic Cooperation and Decelopment OECD 2000 30 1980 OECD OECD 26
2.6.2 EU 1995 OECD 97 EU 2.6.3 EU EU 2.6.4 IT TRUSTe 3 94 98 2.6.5 GBDe Global Business Dialog on Electronic Commerce GBDe GBDe 3 TRUSTe 27
OECD 1. GBDe GBDe 2. OECD OECD GBDe [10] [11] [12] 28
2.6.6 OECD [28] 29
GBDe GBDe 30
2.7 [14] NPO [13] [17] 1. 2. 3. 31
2.7.1 4 1. 2. 3. 5 4 5 32
( CA) CA 1. 2. 3. PKI 33
6 7 8 X B A C B B C 2.7.2 6 7 X A X B 8 C C 34
2.7.3 35
2.7.4 36
2.8 [23] 2.8.1 [22] IT 37
2.8.2 38
2.8.3 2.1 2 3 4 5 2.1: 39
2.8.4 B 8 40
41
42
2.8.5 43
2.9 [24] 2.9.1 TV 44
2.9.2 45
46
2.10 2.10.1 E-mail PC PC 47
1. 2. 3. e-commerce The Pew Internet and American Life Project Consumer WebWatch Trust and privacy online[25] A Matter of Trust[26] 48
E-mail 49
ecommerce PC 1. 2. 50
2.10.2 [24] [27] 51
2.10.3 52
53
2.11 2.11.1 54
ID ID ID OK 2.11.2 55
56
1 4 5 2 3 6 7 8 9 1. 2. 3. 4. 5. 6. 7. 8. 9. 2.3: 57
2.3 ID ID 9 ID ID ID ID ID DB OK YES NO ID ID 2.4: ID ID ID ID 2.4 ID ID 9 ID ID 58
ID ID 2.11.3 E-mail E-mail E-mail E-mai 59
2.12 2.12.1 CD blocker [18] blocker 60
2.12.2 RFID 10 2.12.3 10 61
2.12.4 2.12.5 2.12.6 [19] [20] 62
RFID SafeTzone Real-Time Location System [21] IC G 63
2.12.7 RFID RFID blocker RFID 64
2.13 Penates Penates 2.13.1 2.2 Penates Penates blogwatcher 2.2: Penates - - 65
2.13.2 2.3 Penates Penates 2.3: Penates - - 2.13.3 2.4 66
Penates 2.4: Penates - - 2.13.4 2.5 Penates Penates 2.5: Penates - - Penates Penates 67
3 3.1 3.1 68
blog tam 3.1: 3.2 1. 2. 69
3.2.1 70
Penates 3.2.2 1 1 71
3.3 3.3.1 72
3.3.2 OECD EU e-commerce GBDe 73
4 4.1 TRUSTe TRUSTe E 4.1.1 TRUSTe 4.1.2 TRUSTe-Watchdog Watchdog TRUSTe 74
4.2 GBDe GBDe [10] [11] [12] [10] [11] [12] 4.2.1 OECD 75
4.2.2 (ADR) ADR (B2C) B2C 76
B2C ADR ADR ADR ADR ADE ADR ADR ADR ADR 77
ADR ADR ADR ADR GBDe 4.2.3 GBDe [6] ADR 78
79
E-Mail opt-out 4.2.4 IT EC EC 80
G2C e-service 4.2.5 81
B2C 82
ElectronicBillPresentment and Payment PKI 83
e/m GBDe PKI 4.2.6 84
IP D F 1996 WIPO WIPO DMCA[15] WIPO 1999 (JCL) WIPO f DMCA JCL EUCD(EU ) 85
4.2.7 GBDe RFID 86
4.2.8 4.2.9 B2C 87
CEO OECD 1. 2. 3. 4. 5. 6. IT 88
(PKI) (MRA) 89
4.2.10 RFID RFID RFID RFID RFID RFID 90
4.3 4.3.1 Matter of Trust: What Users Want From Web Sites e-commerce 91
About Us cookies e-commerce 92
A Matter of Trust: What Users Want From Web Sites [25] 4.3.2 Trust and privacy online: Why Americans want to rewrite the rules opt-in public private 93
TRUSTe Trust and privacy online: Why Americans want to rewrite the rules [26] 94
5 5.1 Penates Penates blogwatcher 95
5.2 96
6 Penates 97
98
A A.1 A description <STATEMENT description="service collects user s location for marketing"> <PURPOSE><current></current></PURPOSE> <RECIPIENT><ours></ours></RECIPIENT> <RETENTION><infinit></infinit></RETENTION> <DATA ref="#user.location"></data> </STATEMENT> 99
A.2 behavior statement <RULE behavior="accept"> <POLICY> <STATEMENT> <PURPOSE><current></current></PURPOSE> <DATA ref="#user.location"></data> <RECIPIENT><ours></ours></RECIPIENT> </STATEMENT> </POLICY> </RULE> 100
A.3 inform accept block accept block DB A.1: Penates statement statement behavior accept A.1 description accept 101
B 1. 1-1. 1-1-1. 1.1.2. 1-2. 1-2-1 1-2-2 1-1-1 DM 2. 2-1. 102
2-1-1. 3. 3-1. 3-2. 4. 5. 103
C C.1 C.1.1 C.1.2 C.2 C.2.1 C.2.2 C.2.3 104
C.2.4 C.2.5 C.3 C.3.1 C.3.2 C.3.3 C.4 C.4.1 C.4.2 105
C.4.3 C.4.4 C.5 C.5.1 106
107
108
109
110
( ) C.5.2 111
30 112
( ) C.6 C.6.1 113
C.6.2 C.6.3 C.6.4 C.6.5 C.6.6 C.7 C.7.1 114
C.7.2 C.7.3 C.7.4 C.8 C.8.1 C.8.2 C.8.3 115
C.8.4 C.8.5 C.8.6 C.8.7 116
D 117
E E.1 E.1.1 E.1.2 E.2 118
E.3 119
F F.1 F.1.1 F.1.2 F.1.3 120
F.1.4 1. 2. 3. F.2 F.2.1 121
F.2.2 122
F.2.3 F.2.4 123
F.3 F.3.1 1. 2. 3. 4. 5. F.3.2 F.3.3 124
125
F.3.4 F.3.5 126
G G.1 G.1.1 G.1.2 127
G.1.3 G.1.4 G.1.5 G.1.6 G.1.7 G.1.8 G.1.9 128
[1] Marc Langheinrich Privacy by Design -Principles of Privacy-Aware Ubiquitous Systems- In proceedings of the third conference on Ubiquitous Computing (Ubicomp 01), September, 2001 [2] Marc Langheinrich A Privacy Awareness System for Ubiquitous Computing Environments In proceedings of the third conference on Ubiquitous Computing (Ubicomp 02), September, 2002 [3],,,, PENATES: In proceedings of 16th Computer System Symposium (ComSys 04), November, 2004 [4] [5] reputation [6] TRUSTe-OnlinePrivacyResourceBook- [7] http://www.asahi-net.or.jp/ VR5J-MKN/point/privacy/ [8] http://oku-gw.pi.titech.ac.jp/blogwatcher/ [9] http://www.nmda.or.jp/enc/privacy/privacy-now5.html 2000 11 129
[10] Global Business Dialogue on Electronic Commerce 2001 http://www.gbde.org/recommendations.html Tokyo Conference 2001 [11] Global Business Dialogue on Electronic Commerce 2002 http://www.gbde.org/recommendations.html Brussels Conference 2002 [12] Global Business Dialogue on Electronic Commerce 2003 http://www.gbde.org/recommendations.html New York Conference 2003 [13] 2003 JNSA WG -- 2004 4 WG [14] IBM [15] U.S. Copyright Office The Digital Millennium Copyright Act of 1998 -U.S Copyright Office Summary- December 1998 [16] (JIS Q 15001) [17] NPO 2003 JNSA WG [18] RFID CNET Japan 2003/08/28 [19] RFID CNET Japan 2004/08/03 [20] RFID CNET Japan 2004/09/15 [21] [22] - - 130
[23] http://www.nomolog.nagoya-u.ac.jp/ kagayama/consumer/resume/jikosekinin.html [24] [25] Susannah Fox, Director of Research Trust and privacy online : Why Americans want to rewrite the rules The Pew Internet and American Life Project 2000 [26] Princeton Survey Research Associates A Matter of Trust : What Users Want From Web Sites Consumer WebWatch Transparency Survey 2002 [27] http://www.asahi-net.or.jp/ eh6k-ymgs/book/shakaishiso/ tosho-y/anshin-shinrai.htm [28] http://www.wakhok.ac.jp/ saitoh/literacy-9 2002 131