:::

詳目顯示

回上一頁
題名:設計一個多層式本體論為基之虛擬企業知識表達模型
書刊名:資訊管理學報
作者:陳宗義陳裕民蘇彩妤
作者(外文):Chen, Tsung-yiChen, Yuh-minSul, Cai-yu
出版日期:2008
卷期:15:1
頁次:頁239-262
主題關鍵詞:存取控制虛擬企業本體論知識表達Access controlVirtual enterpriseOntologyKnowledge representation
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(1) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:1
  • 共同引用共同引用:0
  • 點閱點閱:16
期刊論文
1.Uschold, M.、Gruninger, M.(1996)。Ontologies: Principles, Methods and Applications。Knowledge Engineering Review,11(2),93-155。  new window
2.Bacon, J.、Moody, K.、Yao, W.(2002)。A Model of OASIS Role-based Access Control and Its Support for Active Security。ACM Transactions on Information and System Security,5(4),492-540。  new window
3.Quinn, James Brian、Anderson, Philip、Finkelstein, Sydney(1996)。Managing Professional Intellect: Making the Most of the Best。Harvard Business Review,74(2),71-80。  new window
4.Strader, Troy J.、Lin, Fu-Ren、Shaw, Michael J.(1998)。Information infrastructure for electronic virtual organization management。Decision Support Systems,23(1),75-94。  new window
5.Ferraiolo, D. F.、Sandhu, R.、Gavrila, S.、Kuhn, D.、Chandramouli, R.(2001)。Proposed NIST standard for role-based access control。ACM Transactions on Information and Systems Security,4(3),224-274。  new window
6.Furst, K.、Schmidt, T.、Wippel, G.(2002)。Managing Access in Extended Enterprise Networks。IEEE Internet Computing,1(6),67-74。  new window
7.Staab, S.(2004)。Knowledge Representation with Ontologies: The Present and Future。IEEE Computer Society,19(1),72-81。  new window
8.Bertino, E、Khan, L. R、Sandhu, R.、Thuraisingham, B.(2006)。Secure Knowledge Management: Confidentiality, Trust, and Privacy。IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans,36(3),429-438。  new window
9.Singh, R.、Salam, A. F.(2006)。Semantic Information Assurance for Secure Distributed Knowledge Management: A Business Process Perspective。IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans,36(3),472-486。  new window
10.Rao, H. R.、Upadhyaya, S. J.(2006)。Special Issue on Secure Knowledge Management。IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans,36(3),418-420。  new window
11.Chen, T.-Y.、Chen, Y.-M.、Wang, C.-B.、Chu, H.-C.(2006)。Development of an Access Control Model, System Architecture and Approaches for Information Sharing in Virtual Enterprise。Computers in Industry,58(1),57-73。  new window
會議論文
1.Sandhu, R.、Munawer, Q.(1998)。The RRA97 Model for Role-based Administration of Role Hierarchies。0。39-49。  new window
2.Zhu, H. H、Chen, D. F.、Zhang, X. C.(2003)。Research of Knowledge Chain in Intelligent Control。0。1027-1030。  new window
圖書
1.Wiig, K. M.(1993)。Knowledge Management Foundations: Thinking About Thinking-How People and Organizations Represent, Create and Use Knowledge。Texas:Schema Press。  new window
2.Nonaka, Ikujiro、Takeuchi, Hirotaka(1995)。The knowledge-creating company: How Japanese companies create the dynamics of innovation。Oxford University Press。  new window
3.Davenport, Thomas H.、Prusak, Laurence(1998)。Working Knowledge: How Organizations Manage What They Know。Harvard Business School Press。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE