1 1 1.1.................................... 1 1.1.1......................... 1 1.1.2.................... 2 1.2.................................. 2 1.2



Similar documents
Google Social Influences and Legal Issues of Google Street View Hiroshi Takada

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra

2

29 jjencode JavaScript

7,, i

個人情報保護本文.doc

Webサービス本格活用のための設計ポイント

評論・社会科学 84号(よこ)(P)/3.金子

3D UbiCode (Ubiquitous+Code) RFID ResBe (Remote entertainment space Behavior evaluation) 2 UbiCode Fig. 2 UbiCode 2. UbiCode 2. 1 UbiCode UbiCode 2. 2

untitled

幅広い業種や業務に適応可能なRFIDソリューション

16_.....E...._.I.v2006

202

3_23.dvi


CA HP,,,,,,.,,,,,,.,,,,,,.,,,,,,.,,,,,,.,,,,,,.,,,,,,.,,,,,.,,,,,.,,,,,.,,,,,.,,,,,.,,,,,.,,,,,.,,,,,.,,,,,,.,,,,,.,,,,,,.,,,,,.,,,,,.,,,,,,.,,,,,,.,,

IT Information Technology Information and Communication Technology E mail IT -84-

,

WikiWeb Wiki Web Wiki 2. Wiki 1 STAR WARS [3] Wiki Wiki Wiki 2 3 Wiki 5W1H Wiki Web 2.2 5W1H 5W1H 5W1H 5W1H 5W1H 5W1H 5W1H 2.3 Wiki 2015 Informa

産業構造におけるスポーツ産業の範囲に関する研究Ⅰ

屋内ロケーション管理技術



SketchPoint Pie-Menu On/Off 3 Pie-Menu 8 6 On/Off SketchPoint i


untitled

dews2004-final.dvi

Web Web Web Web Web, i

NRI , ,161, , ,736,663 87, ,938,239 74, ,944,577 47,667 4,085,836 30,644

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us

BJ-No.7 01 三好秀和.indd

KII, Masanobu Vol.7 No Spring

13....*PDF.p


2) TA Hercules CAA 5 [6], [7] CAA BOSS [8] 2. C II C. ( 1 ) C. ( 2 ). ( 3 ) 100. ( 4 ) () HTML NFS Hercules ( )

大学論集第42号本文.indb

( )

<95DB8C9288E397C389C88A E696E6462>

(a) (b) 1 JavaScript Web Web Web CGI Web Web JavaScript Web mixi facebook SNS Web URL ID Web 1 JavaScript Web 1(a) 1(b) JavaScript & Web Web Web Webji


生研ニュースNo.132

DAY )

Web Web Web Web 1 1,,,,,, Web, Web - i -

IPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-

01ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐02ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐03ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐04ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐05ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐06ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六

日本感性工学会論文誌


wki_shuronn.pdf

RFID aj.html


St. Andrew's University NII-Electronic Library Service

2 : Open Clip Art Library [4] Microsoft Office PowerPoint Web PowerPoint 2 Yahoo! Web [5] SlideShare Yahoo! Web Yahoo! Web

„h‹¤.05.07

untitled


63 Author s Address: A Study on the Activities and Characteristics of Johnny s fans in china WEI Ran, LU Yijing Foreign Lang

鹿大広報149号

(2) IPP Independent Power Producers IPP 1995 NCC(New Common Carrier NCC NTT NTT NCC NTT NTT IPP 2. IPP (3) [1] [2] IPP [2] IPP IPP [1] [2]


〈論文〉興行データベースから「古典芸能」の定義を考える

NextWebBtoB_BtoC _suwa.pdf

WebRTC P2P,. Web,. WebRTC. WebRTC, P2P, i

国際恋愛で避けるべき7つの失敗と解決策

, (GPS: Global Positioning Systemg),.,, (LBS: Local Based Services).. GPS,.,. RFID LAN,.,.,.,,,.,..,.,.,,, i


1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf

Transcription:

2004 3603U077-8

1 1 1.1.................................... 1 1.1.1......................... 1 1.1.2.................... 2 1.2.................................. 2 1.2.1............... 2 1.2.2....................... 3 1.3.................................. 4 1.4................................ 5 2 6 2.1.................... 8 2.1.1 (Penates).... 8 2.1.2..................... 9 2.1.3......................... 11 2.2........................ 13 2.2.1............... 13 2.2.2...................... 14 2.3..... 15 2.3.1....................... 15 2.3.2......... 18 2.4............. 19 2.4.1 blogwatcher..................... 19 2.4.2................. 21 2.5 blog.......... 22 2.5.1.......... 23 2.5.2...... 23 2.5.3...................... 23 2.5.4............................... 24 2.5.5......................... 24 2.6................... 26 2.6.1 OECD............................... 26 2.6.2..................... 27 2.6.3..................... 27 2.6.4...................... 27 2.6.5 GBDe............................... 27 2.6.6......................... 29 2.7........................ 31 1

2.7.1........................... 32 2.7.2.......................... 34 2.7.3......................... 35 2.7.4......................... 36 2.8.................. 37 2.8.1....................... 37 2.8.2....................... 38 2.8.3......................... 39 2.8.4.......................... 40 2.8.5......................... 43 2.9................... 44 2.9.1......................... 44 2.9.2......................... 45 2.10........................... 47 2.10.1.......... 47 2.10.2............. 51 2.10.3......................... 52 2.11..................... 54 2.11.1.......................... 54 2.11.2................................ 55 2.11.3......................... 59 2.12.............. 60 2.12.1...................... 60 2.12.2.................. 61 2.12.3........................... 61 2.12.4............................ 62 2.12.5........................... 62 2.12.6.................... 62 2.12.7......................... 64 2.13 Penates.............................. 65 2.13.1............................ 65 2.13.2............................ 66 2.13.3............................ 66 2.13.4............................ 67 3 68 3.1......................... 68 3.2.......................... 69 3.2.1......................... 70 3.2.2............................ 71 3.3.......................... 72 3.3.1............................ 72 3.3.2......................... 73 2

4 74 4.1 TRUSTe.................................. 74 4.1.1........................... 74 4.1.2 TRUSTe-Watchdog........................ 74 4.2 GBDe............................. 75 4.2.1........................... 75 4.2.2 (ADR)...................... 76 4.2.3.......................... 78 4.2.4.............................. 80 4.2.5....................... 81 4.2.6............................ 84 4.2.7...................... 86 4.2.8........................... 87 4.2.9...................... 87 4.2.10 RFID............................... 90 4.3 91 4.3.1 Matter of Trust: What Users Want From Web Sites..... 91 4.3.2 Trust and privacy online: Why Americans want to rewrite the rules............................... 93 5 95 5.1 Penates............................. 95 5.2......................... 96 6 97 A 99 A.1.............................. 99 A.2......................... 100 A.3.................................. 101 B 102 C 104 C.1............................... 104 C.1.1........................... 104 C.1.2........................... 104 C.2............................. 104 C.2.1.................. 104 C.2.2....................... 104 C.2.3...................... 104 C.2.4...................... 105 C.2.5...................... 105 C.3.................. 105 C.3.1......................... 105 C.3.2.................. 105 3

C.3.3.................... 105 C.4................ 105 C.4.1........... 105 C.4.2......................... 105 C.4.3.................. 106 C.4.4............... 106 C.5............... 106 C.5.1............ 106 C.5.2......... 111 C.6............................... 113 C.6.1...................... 113 C.6.2........... 114 C.6.3............... 114 C.6.4................. 114 C.6.5.................... 114 C.6.6..................... 114 C.7............................... 114 C.7.1............................ 114 C.7.2............................ 115 C.7.3............................ 115 C.7.4............................ 115 C.8.................................... 115 C.8.1......................... 115 C.8.2............. 115 C.8.3............................... 115 C.8.4................. 116 C.8.5........... 116 C.8.6...................... 116 C.8.7................ 116 D 117 E 118 E.1............... 118 E.1.1 118 E.1.2................. 118 E.2................................ 118 E.3............................... 119 F 120 F.1....................... 120 F.1.1....................... 120 F.1.2............... 120 F.1.3............. 120 4

F.1.4................. 121 F.2......................... 121 F.2.1................................ 121 F.2.2........... 122 F.2.3.................... 123 F.2.4..... 123 F.3.................. 124 F.3.1............................ 124 F.3.2......... 124 F.3.3......................... 124 F.3.4....... 126 F.3.5..................... 126 G 127 G.1.......... 127 G.1.1................................ 127 G.1.2.............................. 127 G.1.3.................. 128 G.1.4................. 128 G.1.5................. 128 G.1.6........... 128 G.1.7.......................... 128 G.1.8........................... 128 G.1.9...................... 128 5

2.1................................ 6 2.2 Penates.................................. 9 2.3............................... 57 2.4 ID............................... 58 3.1............................... 69 A.1 Penates................................ 101 6

2.1.............................. 39 2.2 Penates - -........................ 65 2.3 Penates - -........................ 66 2.4 Penates - -........................ 67 2.5 Penates - -........................ 67 7

Abstract As the techniques for the applications of the personalized services are being developed, the user s interest of privacy-protection becomes higher. However, the problems for the privacy-protection can not be solved, if it is only concerned from the systematic point of view, but also needed to be concerned from some non-systematic point of view, like, socially, legally, etc. Therefore, I prepared 9 points of contention as the problems to concern about privacy-protection. Then, by considering these 9 contentions, I propose the framework which evaluate the system which implement to protect the privacy. In addition to that, I evaluate my own system, called Panates (Privacy protection Architecture for contextaware EnvironmentS) which makes it possible, the user control own personal information, and the transaction of personal information be seamless, based on that framework, and examine what is missing this Penates to be the perfect system to protect privacy.

1 1.1 [2] [4] 1.1.1 1 1 1

1.1.2 1.2 1.2.1 [7] 2

1.2.2 C 3

OECD( ) OECD EU EU EU 1.3 4

1.4 5

2 2.1 1. 1-1. 1-2. 2. 2-1. 2-2. 3. 3-1. 3-2. 3-3. 4. 4-1. 4-2. 2.1: 6

7

2.1 [16] 2.1.1 (Penates) ( Penates 1 ) [3] 1 Penates Privacy protection Architecture for contextaware EnvironmentS 8

Penates 2.2 1. 2. 3. 4. 5. 1 5 3 2 4 2.2: Penates A 2.1.2 Penates 9

Penates 1. 2. 3. 4. Penates XML 10

XML 2.1.3 Penates 11

2 GBDe [10] Penates Penates Penates 2 12

2.2 2.2.1 [5] [5] 13

Kollock.P 2.2.2 blog 14

2.3 2.3.1 +1 0-1 15

Bidders Bidders @nifty goo Bidders Bidders Live door Live door livedoor 16

+4 +2 +1-1-4 17

2.3.2 18

2.4 blogwatcher 2.4.1 blogwatcher blogwatcher [8] blog 19

html blog blog blog 20

2.4.2 21

2.5 blog blog blog D 22

2.5.1 2.5.2 URL blogwatcher 2.5.3 E 23

2.5.4 blogwatcher blog 2.5.5 24

25

2.6 OECD [9] OECD 2.6.1 OECD Organization for Economic Cooperation and Decelopment OECD 2000 30 1980 OECD OECD 26

2.6.2 EU 1995 OECD 97 EU 2.6.3 EU EU 2.6.4 IT TRUSTe 3 94 98 2.6.5 GBDe Global Business Dialog on Electronic Commerce GBDe GBDe 3 TRUSTe 27

OECD 1. GBDe GBDe 2. OECD OECD GBDe [10] [11] [12] 28

2.6.6 OECD [28] 29

GBDe GBDe 30

2.7 [14] NPO [13] [17] 1. 2. 3. 31

2.7.1 4 1. 2. 3. 5 4 5 32

( CA) CA 1. 2. 3. PKI 33

6 7 8 X B A C B B C 2.7.2 6 7 X A X B 8 C C 34

2.7.3 35

2.7.4 36

2.8 [23] 2.8.1 [22] IT 37

2.8.2 38

2.8.3 2.1 2 3 4 5 2.1: 39

2.8.4 B 8 40

41

42

2.8.5 43

2.9 [24] 2.9.1 TV 44

2.9.2 45

46

2.10 2.10.1 E-mail PC PC 47

1. 2. 3. e-commerce The Pew Internet and American Life Project Consumer WebWatch Trust and privacy online[25] A Matter of Trust[26] 48

E-mail 49

ecommerce PC 1. 2. 50

2.10.2 [24] [27] 51

2.10.3 52

53

2.11 2.11.1 54

ID ID ID OK 2.11.2 55

56

1 4 5 2 3 6 7 8 9 1. 2. 3. 4. 5. 6. 7. 8. 9. 2.3: 57

2.3 ID ID 9 ID ID ID ID ID DB OK YES NO ID ID 2.4: ID ID ID ID 2.4 ID ID 9 ID ID 58

ID ID 2.11.3 E-mail E-mail E-mail E-mai 59

2.12 2.12.1 CD blocker [18] blocker 60

2.12.2 RFID 10 2.12.3 10 61

2.12.4 2.12.5 2.12.6 [19] [20] 62

RFID SafeTzone Real-Time Location System [21] IC G 63

2.12.7 RFID RFID blocker RFID 64

2.13 Penates Penates 2.13.1 2.2 Penates Penates blogwatcher 2.2: Penates - - 65

2.13.2 2.3 Penates Penates 2.3: Penates - - 2.13.3 2.4 66

Penates 2.4: Penates - - 2.13.4 2.5 Penates Penates 2.5: Penates - - Penates Penates 67

3 3.1 3.1 68

blog tam 3.1: 3.2 1. 2. 69

3.2.1 70

Penates 3.2.2 1 1 71

3.3 3.3.1 72

3.3.2 OECD EU e-commerce GBDe 73

4 4.1 TRUSTe TRUSTe E 4.1.1 TRUSTe 4.1.2 TRUSTe-Watchdog Watchdog TRUSTe 74

4.2 GBDe GBDe [10] [11] [12] [10] [11] [12] 4.2.1 OECD 75

4.2.2 (ADR) ADR (B2C) B2C 76

B2C ADR ADR ADR ADR ADE ADR ADR ADR ADR 77

ADR ADR ADR ADR GBDe 4.2.3 GBDe [6] ADR 78

79

E-Mail opt-out 4.2.4 IT EC EC 80

G2C e-service 4.2.5 81

B2C 82

ElectronicBillPresentment and Payment PKI 83

e/m GBDe PKI 4.2.6 84

IP D F 1996 WIPO WIPO DMCA[15] WIPO 1999 (JCL) WIPO f DMCA JCL EUCD(EU ) 85

4.2.7 GBDe RFID 86

4.2.8 4.2.9 B2C 87

CEO OECD 1. 2. 3. 4. 5. 6. IT 88

(PKI) (MRA) 89

4.2.10 RFID RFID RFID RFID RFID RFID 90

4.3 4.3.1 Matter of Trust: What Users Want From Web Sites e-commerce 91

About Us cookies e-commerce 92

A Matter of Trust: What Users Want From Web Sites [25] 4.3.2 Trust and privacy online: Why Americans want to rewrite the rules opt-in public private 93

TRUSTe Trust and privacy online: Why Americans want to rewrite the rules [26] 94

5 5.1 Penates Penates blogwatcher 95

5.2 96

6 Penates 97

98

A A.1 A description <STATEMENT description="service collects user s location for marketing"> <PURPOSE><current></current></PURPOSE> <RECIPIENT><ours></ours></RECIPIENT> <RETENTION><infinit></infinit></RETENTION> <DATA ref="#user.location"></data> </STATEMENT> 99

A.2 behavior statement <RULE behavior="accept"> <POLICY> <STATEMENT> <PURPOSE><current></current></PURPOSE> <DATA ref="#user.location"></data> <RECIPIENT><ours></ours></RECIPIENT> </STATEMENT> </POLICY> </RULE> 100

A.3 inform accept block accept block DB A.1: Penates statement statement behavior accept A.1 description accept 101

B 1. 1-1. 1-1-1. 1.1.2. 1-2. 1-2-1 1-2-2 1-1-1 DM 2. 2-1. 102

2-1-1. 3. 3-1. 3-2. 4. 5. 103

C C.1 C.1.1 C.1.2 C.2 C.2.1 C.2.2 C.2.3 104

C.2.4 C.2.5 C.3 C.3.1 C.3.2 C.3.3 C.4 C.4.1 C.4.2 105

C.4.3 C.4.4 C.5 C.5.1 106

107

108

109

110

( ) C.5.2 111

30 112

( ) C.6 C.6.1 113

C.6.2 C.6.3 C.6.4 C.6.5 C.6.6 C.7 C.7.1 114

C.7.2 C.7.3 C.7.4 C.8 C.8.1 C.8.2 C.8.3 115

C.8.4 C.8.5 C.8.6 C.8.7 116

D 117

E E.1 E.1.1 E.1.2 E.2 118

E.3 119

F F.1 F.1.1 F.1.2 F.1.3 120

F.1.4 1. 2. 3. F.2 F.2.1 121

F.2.2 122

F.2.3 F.2.4 123

F.3 F.3.1 1. 2. 3. 4. 5. F.3.2 F.3.3 124

125

F.3.4 F.3.5 126

G G.1 G.1.1 G.1.2 127

G.1.3 G.1.4 G.1.5 G.1.6 G.1.7 G.1.8 G.1.9 128

[1] Marc Langheinrich Privacy by Design -Principles of Privacy-Aware Ubiquitous Systems- In proceedings of the third conference on Ubiquitous Computing (Ubicomp 01), September, 2001 [2] Marc Langheinrich A Privacy Awareness System for Ubiquitous Computing Environments In proceedings of the third conference on Ubiquitous Computing (Ubicomp 02), September, 2002 [3],,,, PENATES: In proceedings of 16th Computer System Symposium (ComSys 04), November, 2004 [4] [5] reputation [6] TRUSTe-OnlinePrivacyResourceBook- [7] http://www.asahi-net.or.jp/ VR5J-MKN/point/privacy/ [8] http://oku-gw.pi.titech.ac.jp/blogwatcher/ [9] http://www.nmda.or.jp/enc/privacy/privacy-now5.html 2000 11 129

[10] Global Business Dialogue on Electronic Commerce 2001 http://www.gbde.org/recommendations.html Tokyo Conference 2001 [11] Global Business Dialogue on Electronic Commerce 2002 http://www.gbde.org/recommendations.html Brussels Conference 2002 [12] Global Business Dialogue on Electronic Commerce 2003 http://www.gbde.org/recommendations.html New York Conference 2003 [13] 2003 JNSA WG -- 2004 4 WG [14] IBM [15] U.S. Copyright Office The Digital Millennium Copyright Act of 1998 -U.S Copyright Office Summary- December 1998 [16] (JIS Q 15001) [17] NPO 2003 JNSA WG [18] RFID CNET Japan 2003/08/28 [19] RFID CNET Japan 2004/08/03 [20] RFID CNET Japan 2004/09/15 [21] [22] - - 130

[23] http://www.nomolog.nagoya-u.ac.jp/ kagayama/consumer/resume/jikosekinin.html [24] [25] Susannah Fox, Director of Research Trust and privacy online : Why Americans want to rewrite the rules The Pew Internet and American Life Project 2000 [26] Princeton Survey Research Associates A Matter of Trust : What Users Want From Web Sites Consumer WebWatch Transparency Survey 2002 [27] http://www.asahi-net.or.jp/ eh6k-ymgs/book/shakaishiso/ tosho-y/anshin-shinrai.htm [28] http://www.wakhok.ac.jp/ saitoh/literacy-9 2002 131