1 1 1.1.................................... 1 1.1.1......................... 1 1.1.2.................... 2 1.2.................................. 2 1.2



Similar documents
Google Social Influences and Legal Issues of Google Street View Hiroshi Takada

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra

2

29 jjencode JavaScript

操作1 <設問作成>

7,, i

ECに関わる法的問題検討報告書

個人情報保護本文.doc

通し組/F7:論説:西垣鳴人(送り)

Webサービス本格活用のための設計ポイント

評論・社会科学 84号(よこ)(P)/3.金子

評論・社会科学 90号(よこ)(P)/4.咸

IT,, i

3D UbiCode (Ubiquitous+Code) RFID ResBe (Remote entertainment space Behavior evaluation) 2 UbiCode Fig. 2 UbiCode 2. UbiCode 2. 1 UbiCode UbiCode 2. 2

untitled

23 The Study of support narrowing down goods on electronic commerce sites

幅広い業種や業務に適応可能なRFIDソリューション

16_.....E...._.I.v2006

Web Web ID Web 16 Web Web i

202

3_23.dvi


Web Web Web Web i

CA HP,,,,,,.,,,,,,.,,,,,,.,,,,,,.,,,,,,.,,,,,,.,,,,,,.,,,,,.,,,,,.,,,,,.,,,,,.,,,,,.,,,,,.,,,,,.,,,,,.,,,,,,.,,,,,.,,,,,,.,,,,,.,,,,,.,,,,,,.,,,,,,.,,

IT Information Technology Information and Communication Technology E mail IT -84-

,

WikiWeb Wiki Web Wiki 2. Wiki 1 STAR WARS [3] Wiki Wiki Wiki 2 3 Wiki 5W1H Wiki Web 2.2 5W1H 5W1H 5W1H 5W1H 5W1H 5W1H 5W1H 2.3 Wiki 2015 Informa

産業構造におけるスポーツ産業の範囲に関する研究Ⅰ

屋内ロケーション管理技術


2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking Group Name Implemati


SketchPoint Pie-Menu On/Off 3 Pie-Menu 8 6 On/Off SketchPoint i


untitled

dews2004-final.dvi

Web Web Web Web Web, i

:... a

NRI , ,161, , ,736,663 87, ,938,239 74, ,944,577 47,667 4,085,836 30,644

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us

橡自動車~1.PDF

PC PDA SMTP/POP3 1 POP3 SMTP MUA MUA MUA i

BJ-No.7 01 三好秀和.indd

KII, Masanobu Vol.7 No Spring

13....*PDF.p

NLC配布用.ppt

3_39.dvi


橡jisq1500.PDF

_09名嶋.indd

2) TA Hercules CAA 5 [6], [7] CAA BOSS [8] 2. C II C. ( 1 ) C. ( 2 ). ( 3 ) 100. ( 4 ) () HTML NFS Hercules ( )

大学論集第42号本文.indb

( )

谷口/谷口

<95DB8C9288E397C389C88A E696E6462>

Computer Security Symposium October 2013 Android OS kub

(a) (b) 1 JavaScript Web Web Web CGI Web Web JavaScript Web mixi facebook SNS Web URL ID Web 1 JavaScript Web 1(a) 1(b) JavaScript & Web Web Web Webji

untitled

w.....I.v48.\1-4.eps


生研ニュースNo.132

評論・社会科学 120号(P)☆/1.楊

DAY )

Web Web Web Web 1 1,,,,,, Web, Web - i -

IPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-

01ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐02ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐03ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐04ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐05ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐06ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六

日本感性工学会論文誌


finalrep.dvi

wki_shuronn.pdf

24_ChenGuang_final.indd

RFID aj.html


St. Andrew's University NII-Electronic Library Service

2 : Open Clip Art Library [4] Microsoft Office PowerPoint Web PowerPoint 2 Yahoo! Web [5] SlideShare Yahoo! Web Yahoo! Web

„h‹¤.05.07


untitled

Vol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe

untitled

GATT GATT ITO GATT EPA Economic Partnership Agreement ASEAN ITO, International Trade Organization GATT GATT WTO

IPSJ SIG Technical Report Vol.2011-MUS-91 No /7/ , 3 1 Design and Implementation on a System for Learning Songs by Presenting Musical St


emarketer SNS / SNS 2009 SNS 15 64

63 Author s Address: A Study on the Activities and Characteristics of Johnny s fans in china WEI Ran, LU Yijing Foreign Lang

阿部Doc

鹿大広報149号

(2) IPP Independent Power Producers IPP 1995 NCC(New Common Carrier NCC NTT NTT NCC NTT NTT IPP 2. IPP (3) [1] [2] IPP [2] IPP IPP [1] [2]


〈論文〉興行データベースから「古典芸能」の定義を考える

NextWebBtoB_BtoC _suwa.pdf

wpEnterpriseSvr.doc

WebRTC P2P,. Web,. WebRTC. WebRTC, P2P, i

国際恋愛で避けるべき7つの失敗と解決策

untitled

, (GPS: Global Positioning Systemg),.,, (LBS: Local Based Services).. GPS,.,. RFID LAN,.,.,.,,,.,..,.,.,,, i


Core Ethics Vol. Talboks-och punktskriftsbiblioteket TPB DAISY Bookshare BookshareDAISY DAISY DAISYDAISY (Digital Accessible Information System) NGO D

1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf

DEIM Forum 2009 E

Transcription:

2004 3603U077-8

1 1 1.1.................................... 1 1.1.1......................... 1 1.1.2.................... 2 1.2.................................. 2 1.2.1............... 2 1.2.2....................... 3 1.3.................................. 4 1.4................................ 5 2 6 2.1.................... 8 2.1.1 (Penates).... 8 2.1.2..................... 9 2.1.3......................... 11 2.2........................ 13 2.2.1............... 13 2.2.2...................... 14 2.3..... 15 2.3.1....................... 15 2.3.2......... 18 2.4............. 19 2.4.1 blogwatcher..................... 19 2.4.2................. 21 2.5 blog.......... 22 2.5.1.......... 23 2.5.2...... 23 2.5.3...................... 23 2.5.4............................... 24 2.5.5......................... 24 2.6................... 26 2.6.1 OECD............................... 26 2.6.2..................... 27 2.6.3..................... 27 2.6.4...................... 27 2.6.5 GBDe............................... 27 2.6.6......................... 29 2.7........................ 31 1

2.7.1........................... 32 2.7.2.......................... 34 2.7.3......................... 35 2.7.4......................... 36 2.8.................. 37 2.8.1....................... 37 2.8.2....................... 38 2.8.3......................... 39 2.8.4.......................... 40 2.8.5......................... 43 2.9................... 44 2.9.1......................... 44 2.9.2......................... 45 2.10........................... 47 2.10.1.......... 47 2.10.2............. 51 2.10.3......................... 52 2.11..................... 54 2.11.1.......................... 54 2.11.2................................ 55 2.11.3......................... 59 2.12.............. 60 2.12.1...................... 60 2.12.2.................. 61 2.12.3........................... 61 2.12.4............................ 62 2.12.5........................... 62 2.12.6.................... 62 2.12.7......................... 64 2.13 Penates.............................. 65 2.13.1............................ 65 2.13.2............................ 66 2.13.3............................ 66 2.13.4............................ 67 3 68 3.1......................... 68 3.2.......................... 69 3.2.1......................... 70 3.2.2............................ 71 3.3.......................... 72 3.3.1............................ 72 3.3.2......................... 73 2

4 74 4.1 TRUSTe.................................. 74 4.1.1........................... 74 4.1.2 TRUSTe-Watchdog........................ 74 4.2 GBDe............................. 75 4.2.1........................... 75 4.2.2 (ADR)...................... 76 4.2.3.......................... 78 4.2.4.............................. 80 4.2.5....................... 81 4.2.6............................ 84 4.2.7...................... 86 4.2.8........................... 87 4.2.9...................... 87 4.2.10 RFID............................... 90 4.3 91 4.3.1 Matter of Trust: What Users Want From Web Sites..... 91 4.3.2 Trust and privacy online: Why Americans want to rewrite the rules............................... 93 5 95 5.1 Penates............................. 95 5.2......................... 96 6 97 A 99 A.1.............................. 99 A.2......................... 100 A.3.................................. 101 B 102 C 104 C.1............................... 104 C.1.1........................... 104 C.1.2........................... 104 C.2............................. 104 C.2.1.................. 104 C.2.2....................... 104 C.2.3...................... 104 C.2.4...................... 105 C.2.5...................... 105 C.3.................. 105 C.3.1......................... 105 C.3.2.................. 105 3

C.3.3.................... 105 C.4................ 105 C.4.1........... 105 C.4.2......................... 105 C.4.3.................. 106 C.4.4............... 106 C.5............... 106 C.5.1............ 106 C.5.2......... 111 C.6............................... 113 C.6.1...................... 113 C.6.2........... 114 C.6.3............... 114 C.6.4................. 114 C.6.5.................... 114 C.6.6..................... 114 C.7............................... 114 C.7.1............................ 114 C.7.2............................ 115 C.7.3............................ 115 C.7.4............................ 115 C.8.................................... 115 C.8.1......................... 115 C.8.2............. 115 C.8.3............................... 115 C.8.4................. 116 C.8.5........... 116 C.8.6...................... 116 C.8.7................ 116 D 117 E 118 E.1............... 118 E.1.1 118 E.1.2................. 118 E.2................................ 118 E.3............................... 119 F 120 F.1....................... 120 F.1.1....................... 120 F.1.2............... 120 F.1.3............. 120 4

F.1.4................. 121 F.2......................... 121 F.2.1................................ 121 F.2.2........... 122 F.2.3.................... 123 F.2.4..... 123 F.3.................. 124 F.3.1............................ 124 F.3.2......... 124 F.3.3......................... 124 F.3.4....... 126 F.3.5..................... 126 G 127 G.1.......... 127 G.1.1................................ 127 G.1.2.............................. 127 G.1.3.................. 128 G.1.4................. 128 G.1.5................. 128 G.1.6........... 128 G.1.7.......................... 128 G.1.8........................... 128 G.1.9...................... 128 5

2.1................................ 6 2.2 Penates.................................. 9 2.3............................... 57 2.4 ID............................... 58 3.1............................... 69 A.1 Penates................................ 101 6

2.1.............................. 39 2.2 Penates - -........................ 65 2.3 Penates - -........................ 66 2.4 Penates - -........................ 67 2.5 Penates - -........................ 67 7

Abstract As the techniques for the applications of the personalized services are being developed, the user s interest of privacy-protection becomes higher. However, the problems for the privacy-protection can not be solved, if it is only concerned from the systematic point of view, but also needed to be concerned from some non-systematic point of view, like, socially, legally, etc. Therefore, I prepared 9 points of contention as the problems to concern about privacy-protection. Then, by considering these 9 contentions, I propose the framework which evaluate the system which implement to protect the privacy. In addition to that, I evaluate my own system, called Panates (Privacy protection Architecture for contextaware EnvironmentS) which makes it possible, the user control own personal information, and the transaction of personal information be seamless, based on that framework, and examine what is missing this Penates to be the perfect system to protect privacy.

1 1.1 [2] [4] 1.1.1 1 1 1

1.1.2 1.2 1.2.1 [7] 2

1.2.2 C 3

OECD( ) OECD EU EU EU 1.3 4

1.4 5

2 2.1 1. 1-1. 1-2. 2. 2-1. 2-2. 3. 3-1. 3-2. 3-3. 4. 4-1. 4-2. 2.1: 6

7

2.1 [16] 2.1.1 (Penates) ( Penates 1 ) [3] 1 Penates Privacy protection Architecture for contextaware EnvironmentS 8

Penates 2.2 1. 2. 3. 4. 5. 1 5 3 2 4 2.2: Penates A 2.1.2 Penates 9

Penates 1. 2. 3. 4. Penates XML 10

XML 2.1.3 Penates 11

2 GBDe [10] Penates Penates Penates 2 12

2.2 2.2.1 [5] [5] 13

Kollock.P 2.2.2 blog 14

2.3 2.3.1 +1 0-1 15

Bidders Bidders @nifty goo Bidders Bidders Live door Live door livedoor 16

+4 +2 +1-1-4 17

2.3.2 18

2.4 blogwatcher 2.4.1 blogwatcher blogwatcher [8] blog 19

html blog blog blog 20

2.4.2 21

2.5 blog blog blog D 22

2.5.1 2.5.2 URL blogwatcher 2.5.3 E 23

2.5.4 blogwatcher blog 2.5.5 24

25

2.6 OECD [9] OECD 2.6.1 OECD Organization for Economic Cooperation and Decelopment OECD 2000 30 1980 OECD OECD 26

2.6.2 EU 1995 OECD 97 EU 2.6.3 EU EU 2.6.4 IT TRUSTe 3 94 98 2.6.5 GBDe Global Business Dialog on Electronic Commerce GBDe GBDe 3 TRUSTe 27

OECD 1. GBDe GBDe 2. OECD OECD GBDe [10] [11] [12] 28

2.6.6 OECD [28] 29

GBDe GBDe 30

2.7 [14] NPO [13] [17] 1. 2. 3. 31

2.7.1 4 1. 2. 3. 5 4 5 32

( CA) CA 1. 2. 3. PKI 33

6 7 8 X B A C B B C 2.7.2 6 7 X A X B 8 C C 34

2.7.3 35

2.7.4 36

2.8 [23] 2.8.1 [22] IT 37

2.8.2 38

2.8.3 2.1 2 3 4 5 2.1: 39

2.8.4 B 8 40

41

42

2.8.5 43

2.9 [24] 2.9.1 TV 44

2.9.2 45

46

2.10 2.10.1 E-mail PC PC 47

1. 2. 3. e-commerce The Pew Internet and American Life Project Consumer WebWatch Trust and privacy online[25] A Matter of Trust[26] 48

E-mail 49

ecommerce PC 1. 2. 50

2.10.2 [24] [27] 51

2.10.3 52

53

2.11 2.11.1 54

ID ID ID OK 2.11.2 55

56

1 4 5 2 3 6 7 8 9 1. 2. 3. 4. 5. 6. 7. 8. 9. 2.3: 57

2.3 ID ID 9 ID ID ID ID ID DB OK YES NO ID ID 2.4: ID ID ID ID 2.4 ID ID 9 ID ID 58

ID ID 2.11.3 E-mail E-mail E-mail E-mai 59

2.12 2.12.1 CD blocker [18] blocker 60

2.12.2 RFID 10 2.12.3 10 61

2.12.4 2.12.5 2.12.6 [19] [20] 62

RFID SafeTzone Real-Time Location System [21] IC G 63

2.12.7 RFID RFID blocker RFID 64

2.13 Penates Penates 2.13.1 2.2 Penates Penates blogwatcher 2.2: Penates - - 65

2.13.2 2.3 Penates Penates 2.3: Penates - - 2.13.3 2.4 66

Penates 2.4: Penates - - 2.13.4 2.5 Penates Penates 2.5: Penates - - Penates Penates 67

3 3.1 3.1 68

blog tam 3.1: 3.2 1. 2. 69

3.2.1 70

Penates 3.2.2 1 1 71

3.3 3.3.1 72

3.3.2 OECD EU e-commerce GBDe 73

4 4.1 TRUSTe TRUSTe E 4.1.1 TRUSTe 4.1.2 TRUSTe-Watchdog Watchdog TRUSTe 74

4.2 GBDe GBDe [10] [11] [12] [10] [11] [12] 4.2.1 OECD 75

4.2.2 (ADR) ADR (B2C) B2C 76

B2C ADR ADR ADR ADR ADE ADR ADR ADR ADR 77

ADR ADR ADR ADR GBDe 4.2.3 GBDe [6] ADR 78

79

E-Mail opt-out 4.2.4 IT EC EC 80

G2C e-service 4.2.5 81

B2C 82

ElectronicBillPresentment and Payment PKI 83

e/m GBDe PKI 4.2.6 84

IP D F 1996 WIPO WIPO DMCA[15] WIPO 1999 (JCL) WIPO f DMCA JCL EUCD(EU ) 85

4.2.7 GBDe RFID 86

4.2.8 4.2.9 B2C 87

CEO OECD 1. 2. 3. 4. 5. 6. IT 88

(PKI) (MRA) 89

4.2.10 RFID RFID RFID RFID RFID RFID 90

4.3 4.3.1 Matter of Trust: What Users Want From Web Sites e-commerce 91

About Us cookies e-commerce 92

A Matter of Trust: What Users Want From Web Sites [25] 4.3.2 Trust and privacy online: Why Americans want to rewrite the rules opt-in public private 93

TRUSTe Trust and privacy online: Why Americans want to rewrite the rules [26] 94

5 5.1 Penates Penates blogwatcher 95

5.2 96

6 Penates 97

98

A A.1 A description <STATEMENT description="service collects user s location for marketing"> <PURPOSE><current></current></PURPOSE> <RECIPIENT><ours></ours></RECIPIENT> <RETENTION><infinit></infinit></RETENTION> <DATA ref="#user.location"></data> </STATEMENT> 99

A.2 behavior statement <RULE behavior="accept"> <POLICY> <STATEMENT> <PURPOSE><current></current></PURPOSE> <DATA ref="#user.location"></data> <RECIPIENT><ours></ours></RECIPIENT> </STATEMENT> </POLICY> </RULE> 100

A.3 inform accept block accept block DB A.1: Penates statement statement behavior accept A.1 description accept 101

B 1. 1-1. 1-1-1. 1.1.2. 1-2. 1-2-1 1-2-2 1-1-1 DM 2. 2-1. 102

2-1-1. 3. 3-1. 3-2. 4. 5. 103

C C.1 C.1.1 C.1.2 C.2 C.2.1 C.2.2 C.2.3 104

C.2.4 C.2.5 C.3 C.3.1 C.3.2 C.3.3 C.4 C.4.1 C.4.2 105

C.4.3 C.4.4 C.5 C.5.1 106

107

108

109

110

( ) C.5.2 111

30 112

( ) C.6 C.6.1 113

C.6.2 C.6.3 C.6.4 C.6.5 C.6.6 C.7 C.7.1 114

C.7.2 C.7.3 C.7.4 C.8 C.8.1 C.8.2 C.8.3 115

C.8.4 C.8.5 C.8.6 C.8.7 116

D 117

E E.1 E.1.1 E.1.2 E.2 118

E.3 119

F F.1 F.1.1 F.1.2 F.1.3 120

F.1.4 1. 2. 3. F.2 F.2.1 121

F.2.2 122

F.2.3 F.2.4 123

F.3 F.3.1 1. 2. 3. 4. 5. F.3.2 F.3.3 124

125

F.3.4 F.3.5 126

G G.1 G.1.1 G.1.2 127

G.1.3 G.1.4 G.1.5 G.1.6 G.1.7 G.1.8 G.1.9 128

[1] Marc Langheinrich Privacy by Design -Principles of Privacy-Aware Ubiquitous Systems- In proceedings of the third conference on Ubiquitous Computing (Ubicomp 01), September, 2001 [2] Marc Langheinrich A Privacy Awareness System for Ubiquitous Computing Environments In proceedings of the third conference on Ubiquitous Computing (Ubicomp 02), September, 2002 [3],,,, PENATES: In proceedings of 16th Computer System Symposium (ComSys 04), November, 2004 [4] [5] reputation [6] TRUSTe-OnlinePrivacyResourceBook- [7] http://www.asahi-net.or.jp/ VR5J-MKN/point/privacy/ [8] http://oku-gw.pi.titech.ac.jp/blogwatcher/ [9] http://www.nmda.or.jp/enc/privacy/privacy-now5.html 2000 11 129

[10] Global Business Dialogue on Electronic Commerce 2001 http://www.gbde.org/recommendations.html Tokyo Conference 2001 [11] Global Business Dialogue on Electronic Commerce 2002 http://www.gbde.org/recommendations.html Brussels Conference 2002 [12] Global Business Dialogue on Electronic Commerce 2003 http://www.gbde.org/recommendations.html New York Conference 2003 [13] 2003 JNSA WG -- 2004 4 WG [14] IBM [15] U.S. Copyright Office The Digital Millennium Copyright Act of 1998 -U.S Copyright Office Summary- December 1998 [16] (JIS Q 15001) [17] NPO 2003 JNSA WG [18] RFID CNET Japan 2003/08/28 [19] RFID CNET Japan 2004/08/03 [20] RFID CNET Japan 2004/09/15 [21] [22] - - 130

[23] http://www.nomolog.nagoya-u.ac.jp/ kagayama/consumer/resume/jikosekinin.html [24] [25] Susannah Fox, Director of Research Trust and privacy online : Why Americans want to rewrite the rules The Pew Internet and American Life Project 2000 [26] Princeton Survey Research Associates A Matter of Trust : What Users Want From Web Sites Consumer WebWatch Transparency Survey 2002 [27] http://www.asahi-net.or.jp/ eh6k-ymgs/book/shakaishiso/ tosho-y/anshin-shinrai.htm [28] http://www.wakhok.ac.jp/ saitoh/literacy-9 2002 131