透過您的圖書館登入
IP:18.119.133.228
  • 學位論文

用團體資料強化的社會網路為基礎的存取控制系統

Group-enhanced Social Networks-based Access Control

指導教授 : 曹承礎

摘要


網路上分享資訊的服務越來越多,但是使用者可以選擇的分享範圍卻沒什麼改變,當要找人幫忙的時候,仍然不是張貼訊息到適合的地方,就是找認識的人一個一個問。透過社會網路表示的人與人之間的關係,人們可以接觸到朋友的朋友及其更遠的朋友,然而要使用社會網路不但要經過繁雜的設定,而且也難以評估那些遠方的朋友。因為這些問題,目前實務上使用社會網路的服務,仍無法對社會網路上的對象做彈性的設定分享範圍。 本研究希望能讓提供使用者不需太多設定就可以開始區分社會網路上遠方的朋友,並對這些人能更客觀的評估是否值得信任。本研究提出把團體資料放入既有朋友關係的社會網路中,建構出新的社會網路,並提供使用者一些基本的設定,藉此搜尋並根據分享資訊的內容,計算設定範圍內的人或團體是否值得信任,使用者並可用此設定做存取控制決定分享的對象。 透過本系統,使用者可以從日常生活既有的使用行為,產生所需要的資料,評估他人是否值得信任,以增進使用者在分享資訊的效率。本研究可以讓使用者不需經過冗長的設定,就可以開始使用本系統,並挑選適合的對象,讓資訊的分享可以更有效率。

關鍵字

社會網路 存取控制 信任 資訊分享 團體

並列摘要


There are more and more services for information sharing. However, few choices can be selected when people need to decide who can be shared. When people need help, they still only can post information into some website or ask friends one by one. Through social networks, people can touch friends of friends and even farther friends. However, in order to use social networks, people have to configure many settings. Additionally, system can hardly estimate those people’s ability and willing. Because these questions, there are no existing services which can allow users flexibly decide information sharing scope in social networks. This study proposes architecture to help users don’t need to set too many configurations to share information. Additionally, this system can help users more rational to estimate who are worthy to trust. First, this study adds group data into social networks. Then, users can set some basic rules to search this social network. At the same time, this system will evaluate which people is trustworthy according information content type. Finally, user can use these rules to rule-based access control. This system can acquire data into social networks from daily using behavior. After recognizing user’s relationship, this system can estimate who is worthy to trust. Then, this system can help user to share or filter information more effectively. User can start to use this system without setting trust rating, and find suit target to collaborate.

並列關鍵字

Social network Trust Information sharing Access control group

參考文獻


2. Golbeck, J.A., Computing and Applying Trust in Web-based Social Networks. 2005.
3. Anne Adams, M.M., Angela Sasse, Privacy in Multimedia Communications: Protecting Users, Not Just Data. 2001.
4. B Carminati, E.F., A Perego, Rule-Based Access Control for Social Networks, in Move to Meaningful Internet Systems. 2006.
5. Google Docs. [cited; Available from: http://docs.google.com.
7. Roos, L. and I.S. Herschberg, On the validity of the Bell-LaPadula model. Comput. Secur., 1994. 13(4): p. 317-333.

延伸閱讀