收稿日期: 2014-11-24
修回日期: 2015-01-10
网络出版日期: 2015-02-05
Research on the Personal Information PushBased on the Trusted Third Party in the Institutions of Library and Information
Received date: 2014-11-24
Revised date: 2015-01-10
Online published: 2015-02-05
[目的/意义] 为使图书情报机构能全面获取用户真实信息,准确感知用户兴趣和偏好,实施有针对性的个性化信息推送服务,提出一种可信第三方的用户个人信息获取模型。[方法/过程] 该模型通过构建第三方平台存储个人信息,并向用户与图书情报机构提供个人信息管理与应用服务,实现精准的个性化信息推送服务,提高图书情报机构信息资源的利用率。[结果/结论] 可信第三方平台的提出可以克服以下不足:①目前在图书情报机构资源平台注册的用户,其个人信息易被恶意攻击的黑客和某些不良资源商私自传播、滥用和篡改;②部分缺乏安全感的用户使用虚假信息注册;③图书情报机构通过 IP地址认证合法用户的方式不能有效地管理和服务用户。
王福 , 康健 . 基于可信第三方的图书情报机构个性化信息推送研究[J]. 图书情报工作, 2015 , 59(3) : 85 -89 . DOI: 10.13266/j.issn.0252-3116.2015.03.012
[Purpose/significance] This paper will make the library and information institutions can fully obtain the users' real information, accurately percept their interest and preference, realize the personalized information service in library and information service field, and proposes the user personal information access mode based on the trusted third party. [Method/process] The model builds the third platform and stores the personal information, provides personal information management and application service to the users and the library and information organizations, realize accurate personalized information push service and improve the utilization rate of information resources of library and information institutions. [Result/conclusion] The trusted third party platform is proposed to overcome the following issues: ①the personal information of users registered in the resource platform of library and information organization is easy to maliciously attacked by hackers and privately transmitted, abuse and tampered with by some bad resources business; ② part of the users use false information registration for lack a sense of security; ③the library and information organizations which certificate legal user through IP can't effectively manage and service users.
[1] Crispo B, Landrock P, Matyá V Jr.. WWW security and trusted third party services[J].Future Generation Computer Systems,2000,16(4):331-341.
[2] 戢渼钧.关于个性化信息服务的隐私保护[J].图书情报工作,2006,50(2):49-51.
[3] Polemi D.Trusted third party services for health care in Europe[J].Future Generation Computer Systems,1998,14(1/2):51-59.
[4] 李国新.图书馆怎样为读者信息保密[EB/OL].[2015-01-16].http://news.idoican.com.cn/zgwenhuab/html/2009-08/30/content_41053710.htm.
[5] 王晗,张玲.面向互联网开放平台保护用户隐私的关联规则挖掘算法[J/OL].[2014-10-10]. http://www.cnki.net/KCMS/detail/51.1196.TP.20141124.0926.038.html.
[6] Lekkas D, Gritzalis S, Katsikas S.Quality assured trusted third parties for deploying secure internet-based healthcare applications[J].International Journal of Medical Informatics, 2002,65(2):79-96.
[7] 张明西,刘晖.OpenID标准化认证机制的研究与应用[J].计算机应用与软件,2010,27(7):61-62.
[8] 董希淼. 大数据偷了你隐私你知道吗[EB/OL].[2014-06-16]. http://finance.sina.com.cn/zl/bank/20140613/1421194 06050.shtml.
[9] 一笑而过GY.315我们在行动,央视315曝光Cookies泄露隐私[EB/0L].[2014-05-06].http://bbs.tianya.cn/post-worldlook-703344-1.shtml.
[10] 刘昭斌,刘文芝,顾君忠.位置感知的自适应隐私保护策略[J].计算机工程与设计,2011,32(3):839-841,1032.
[11] 詹重咏.网络信息资源的检索方法及提高检索效率措施的探讨[J].全国商情(经济理论研究),2008(21):139-140.
[12] 金斌.统一的身份认证和访问控制之单点登录系统设计与实现[D].上海:上海交通大学,2007.
[13] 朱培海.基于j2ee的社区管理信息系统的设计与实现[D].西安:西安交通大学,2003.
[14] 姜文广,孙宇清.面向第三方服务平台的隐私保护[J].兰州大学学报(自然科学版),2012,48(4):85-90.
/
〈 | 〉 |