Font Size: a A A

Research On Privacy Protection Technology For Mobile E-commerce Based On Policy

Posted on:2012-12-18Degree:MasterType:Thesis
Country:ChinaCandidate:M X DanFull Text:PDF
GTID:2178330335474208Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
Mobile communications technology and other technologies create the perfect combination a new generation of mobile e-commerce. The integration of mobility and the Internet bring to people's work and life more choices and greater efficiency. Compared with traditional e-commerce, the privacy protection of mobile commerce is more difficult. We know that the traditional e-commerce site has a privacy policy document in detail, but most viewers do not want to spend a long time to read those lengthy privacy policies. In the mobile business environment, due to restrictions on the display screen, consumers are more impatient to read the privacy policy of this lengthy document. Privacy policy often becomes a display, consumers have no way to really understand the company's privacy policy before deciding whether to agree with their policies.This paper briefly describes the description logic theory, there is no standard definition of the concept of privacy, but stressed that individual control over their private information. Privacy of mobile computing user-centered goals, the privacy information by the user to develop the access control strategy is effective privacy protection mechanism. System behavior changes only with changes in strategy will help to provide users with flexibility and adaptability of the private information control interface. Strategy reflected in authorization rules, rules-based system can be achieved through policy enforcement mechanisms. Strategy in the privacy of mobile computing is the role of the mechanism of end-users to create privacy policies to control their personal data, for the requester's access request, the system according to its privacy policy to check if access is authorized, the requester can access the use of personal data generated personalized service. Strategy as a common application, has been extensively studied academics, the main research object of this paper is the logical strategy.This article outlines the same time in the privacy of the mobile environment status of legal protection, privacy protection from the WEB protocol layer methods, and from a technical and safety aspects of multi-perturbation analysis to the mobile environment, the protection of privacy and so on. Analysis the shortage of privacy protection existing in mobile environment. Thus establishing the privacy of the mobile environment, and in this basis, given the privacy policy is based on the formal system of predicate logic process of establishing the proposition privacy policy describes the decomposition process, and made the original privacy policy and enforceable privacy policy concept; given formal system of alphabet privacy policy, items, and the definition of the formula; mobile computing applications based on the characteristics of mobile computing applications will be abstracted into a mathematical structure to the privacy policy of the formal analysis; to Privacy policy formula out of the interpretation and semantics. Then analyzed under the existing mobile environment factors related to privacy, constructed in the privacy of mobile computing first-order logic model; finally described the privacy of the mobile environment, factors related to the realization of the logic.
Keywords/Search Tags:Mobile Computing, Privacy Protection, Policy, First-Order Logic Description
PDF Full Text Request
Related items