Ontology Alignment in RFID Privacy Protection

被引:0
|
作者
Kanbe, Masakazu [1 ]
Yamamoto, Shuichiro [1 ]
机构
[1] NTT DATA CORP, Res Inst Syst Sci, Tokyo, Japan
来源
CISIS: 2009 INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, VOLS 1 AND 2 | 2009年
关键词
component; ontology alignment; RFID; privacy protection;
D O I
10.1109/CISIS.2009.64
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
RFID technology has been widely spread. Many business players and consumers will take advantage of RFID system. On the other hand, it is important to protect the RFID user's privacy information. RFID stakeholders have published the privacy protection guidelines to control to obtain, use and manage the privacy information for RFID system. In this article, we analyze four guidelines which are published by four various RFID stakeholders. As a result of our analysis, we propose RFID privacy protection ontology. This ontology consists of goal ontology, function ontology and technology ontology. This article shows features of each ontology and relationship among them, and also discusses the stepwise ontology alignment to design method of RFID system.
引用
收藏
页码:718 / 723
页数:6
相关论文
共 50 条
  • [21] A Low-cost RFID Authentication Protocol with Location Privacy Protection
    Chen, Yu-Yi
    Lu, Jun-Chao
    Chen, Shin-, I
    Jan, Jinn-Ke
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 109 - +
  • [22] An Improved RFID Authentication Protocol with Privacy Protection Based on Chaotic Maps
    Zhu, Hongfeng
    Zhang, Yan
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (06): : 1777 - 1787
  • [23] An Efficient Lightweight RFID Authentication Protocol with Strong Trajectory Privacy Protection
    Wei Zhang
    Sanya Liu
    Shengming Wang
    Baolin Yi
    Longkai Wu
    Wireless Personal Communications, 2017, 96 : 1215 - 1228
  • [24] Privacy protection based on user-defined preferences in RFID system
    Kim, I
    Lee, B
    Kim, H
    8th International Conference on Advanced Communication Technology, Vols 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U858 - U862
  • [25] Ontology Knowledge Mining for Ontology Alignment
    Rihab Idoudi
    Karim Saheb Ettabaa
    Basel Solaiman
    Kamel Hamrouni
    International Journal of Computational Intelligence Systems, 2016, 9 : 876 - 887
  • [26] Ontology Knowledge Mining for Ontology Alignment
    Idoudi, Rihab
    Ettabaa, Karim Saheb
    Solaiman, Basel
    Hamrouni, Kamel
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2016, 9 (05) : 876 - 887
  • [27] Vulnerabilities in Chen and Deng's RFID mutual authentication and privacy protection protocol
    Kapoor, Gaurav
    Piramuthu, Selwyn
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2011, 24 (07) : 1300 - 1302
  • [28] RFID and Consumer Privacy
    Clarke, Irvine, III
    Flaherty, Theresa
    JOURNAL OF INTERNET COMMERCE, 2008, 7 (04) : 513 - 527
  • [29] Ontology Kernel - A Convolution Kernel for Ontology Alignment
    Son, Jeong-Woo
    Yoon, Hee-Guen
    Park, Seong-Bae
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2015, 31 (02) : 415 - 432
  • [30] Dynamic Bit Encoding for Privacy Protection against Correlation Attacks in RFID Backward Channel
    Sakai, Kazuya
    Ku, Wei-Shinn
    Zimmermann, Roger
    Sun, Min-Te
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (01) : 112 - 123