본문 바로가기
HOME> 논문 > 논문 검색상세

논문 상세정보

Development of Personal Information Protection Model using a Mobile Agent

Bae, Seong-Hee    (Graduate School of Industrial Information, Daegu University   ); Kim, Jae-Joon    (School of Computer and Communication, Daegu University  );
  • 초록

    This paper proposes a personal information protection model that allows a user to regulate his or her own personal information and privacy protection policies to receive services provided by a service provider without having to reveal personal information in a way that the user is opposed to. When the user needs to receive a service that requires personal information, the user will only reveal personal information that they find acceptable and for uses that they agree with. Users receive desired services from the service provider only when there is agreement between the user's and the service provider's security policies. Moreover, the proposed model utilizes a mobile agent that is transmitted from the user's personal space, providing the user with complete control over their privacy protection. In addition, the mobile agent is itself a self-destructing program that eliminates the possibility of personal information being leaked. The mobile agent described in this paper allows users to truly control access to their personal information.


  • 주제어

    Information Protect Model .   Mobile Agent .   Personal Information Protection .   Privacy Protection Policy.  

  • 참고문헌 (14)

    1. “P3P1.0: The Platform for Privacy Preferences 1.0 Specification,” W3C, http://www.w3.org/TG/P3P/, 2002. 
    2. P. Ashley, S. Hada, G. Karjth, M. Schunter, E-P3P, “Privacy Policies and Privacy Authorization,” ACM Workshop on Privacy in The Electronic Society (WPES), pp.103-109, 2002. 
    3. “Identity Management Systems (IMS): Identification and Comparison Study,” Commissioned by the Joint Research Centre, Seville, Spain, September 2003. http://www.datenschutzzentrum.de/idmanage/study/ICPP_SNG_IMS-Study.pdf. 
    4. Kurkovsky, O Rivera, J Bhalodi, “Classification of Privacy Management Techniques in Pervasive Computing,” International Journal of u- and e-Service, Science and Technology, Vol.11, No.1, pp.55-71, 2007 
    5. Michiru Tanaka, Jun Sasaki, Yutaka Funyu, and Yoshimi Teshigawara, “A Personal Information Protection Model for Web Applications by Utilizing Mobile Phones,” Frontiers in Artificial Intelligence and Applications; Proceedings of the 2008 conference on Information Modelling and Knowledge Bases XIX, Vol.166, pp.346-353, 2008. 
    6. Md. Nurul Huda and Eiji Kamioka, “Privacy Protection in Mobile Agent based Service Domain,” Proceedings of the Third International Conference on Information Technology and Applications (ICITA’05), Vol.2, pp.482-487, 2005. 
    7. M. Langheinrich, “A Privacy Awareness System for Ubiquitous Computing Environments,” Proceedings of International Conference on Ubiquitous Computing 2002 (UbiComp 2002), pp.237-245, 2002. 
    8. Xiaodong Jiang, Jason I. Hong, James A. Landay “Approximate Information Flows: Socially-based Modeling of Privacy in Ubiquitous Computing”, Proceedings of the 4th international conference on Ubiquitous Computing, Sep., pp.176-193, 2002. 
    9. “Introduction to the Liberty Alliance Identity Architecture,” Liberty Alliance Project, http://www.Projectliberty.org/, March, 2003. 
    10. Scott Cantor, John Kemp, “Liberty ID-FF Protocols and Schema Specification,” Version 1.2 Liberty Alliance Project, January, 2004. 
    11. “SourceID: Federated identity infrastructure,” Ping Identity, 2004, http://www.sourceid.org/. 
    12. “Microsoft .NET Passpost, “Microsoft, 2004, http://www.microsoft.com/net/services/passport/. 
    13. S.R. Cho and S.H. Jin, “A Digital Identity Interchange Framework for User-Centric ID Management,” http://eettrends.etri.re.kr, Vol.23, No.6, pp.102-111, December, 2008. 
    14. Xiang Yang, Yuanyi Zhang, Qinzhou Niu, Xiaomei Tao, Luo Wu, “A Mobile-Agent-Based Application Model Design of Pervasive Mobile Devices,” Proceedings of Pervasive Computing and Applications, pp.1-6, 2007. 

 저자의 다른 논문

  • 김재준 (16)

    1. 2003 "3D온라인게임을 위한 효율적인 3D게임캐릭터 제작기법" 한국산업정보학회논문지 = Journal of the Korea Industrial Information Systems Research 8 (4): 55~63    
    2. 2003 "합성 $Hard-{\alpha}$ Inclusion의 다단계 적응형 노이즈 제거기법 연구" 비파괴검사학회지 = Journal of the Korean Society for Nondestructive Testing 23 (5): 455~463    
    3. 2004 "2차원 푸리에변환과 주성분분석을 기반한 초음파 용접검사의 신호분류기법" 비파괴검사학회지 = Journal of the Korean Society for Nondestructive Testing 24 (6): 590~596    
    4. 2005 "RPG 게임캐릭터의 정적 발란싱 디자인에 관한 연구 -World of Warcraft의 종족별 캐릭터의 정적요소를 중심으로-" 한국콘텐츠학회논문지 = The Journal of the Korea Contents Association 5 (5): 100~106    
    5. 2006 "RFID를 이용한 무선 네트워크 기반 의료정보처리 시스템" 한국산업정보학회논문지 = Journal of the Korea Industrial Information Systems Research 11 (4): 1~9    
    6. 2006 "리소스 형식 기반의 포스트프로덕션 영상합성에 관한 연구" 인터넷정보학회논문지 = Journal of Korean Society for Internet Information 7 (2): 1~8    
    7. 2007 "모바일 아케이드 게임에서 몬스터 행동 패턴을 이용한 게임 최적화" 인터넷정보학회논문지 = Journal of Korean Society for Internet Information 8 (6): 103~114    
    8. 2007 "A comparative study of medical image applications: compression and transmission" 한국산업정보학회논문지 = Journal of the Korea Industrial Information Systems Research 12 (5): 14~22    
    9. 2007 "Scout 영상 기반의 의료영상 정보시스템 구현" 電子工學會論文誌. Journal of the Institute of Electronics Engineers of Korea. CI, 컴퓨터 44 (3): 43~48    
    10. 2007 "RFID 기술과 이동 단말기를 이용한 원격 의료정보 서비스 시스템" 정보과학회논문지. Journal of KISS : Computing practices. 컴퓨팅의 실제 13 (3): 131~140    

 활용도 분석

  • 상세보기

    amChart 영역
  • 원문보기

    amChart 영역

원문보기

무료다운로드
유료다운로드

유료 다운로드의 경우 해당 사이트의 정책에 따라 신규 회원가입, 로그인, 유료 구매 등이 필요할 수 있습니다. 해당 사이트에서 발생하는 귀하의 모든 정보활동은 NDSL의 서비스 정책과 무관합니다.

원문복사신청을 하시면, 일부 해외 인쇄학술지의 경우 외국학술지지원센터(FRIC)에서
무료 원문복사 서비스를 제공합니다.

NDSL에서는 해당 원문을 복사서비스하고 있습니다. 위의 원문복사신청 또는 장바구니 담기를 통하여 원문복사서비스 이용이 가능합니다.

이 논문과 함께 출판된 논문 + 더보기