| 期刊論文1. | Uschold, M.、Gruninger, M.(1996)。Ontologies: Principles, Methods and Applications。Knowledge Engineering Review,11(2),93-155。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | Bacon, J.、Moody, K.、Yao, W.(2002)。A Model of OASIS Role-based Access Control and Its Support for Active Security。ACM Transactions on Information and System Security,5(4),492-540。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 3. | Quinn, James Brian、Anderson, Philip、Finkelstein, Sydney(1996)。Managing Professional Intellect: Making the Most of the Best。Harvard Business Review,74(2),71-80。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 4. | Strader, Troy J.、Lin, Fu-Ren、Shaw, Michael J.(1998)。Information infrastructure for electronic virtual organization management。Decision Support Systems,23(1),75-94。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 5. | Ferraiolo, D. F.、Sandhu, R.、Gavrila, S.、Kuhn, D.、Chandramouli, R.(2001)。Proposed NIST standard for role-based access control。ACM Transactions on Information and Systems Security,4(3),224-274。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 6. | Furst, K.、Schmidt, T.、Wippel, G.(2002)。Managing Access in Extended Enterprise Networks。IEEE Internet Computing,1(6),67-74。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 7. | Staab, S.(2004)。Knowledge Representation with Ontologies: The Present and Future。IEEE Computer Society,19(1),72-81。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 8. | Bertino, E、Khan, L. R、Sandhu, R.、Thuraisingham, B.(2006)。Secure Knowledge Management: Confidentiality, Trust, and Privacy。IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans,36(3),429-438。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 9. | Singh, R.、Salam, A. F.(2006)。Semantic Information Assurance for Secure Distributed Knowledge Management: A Business Process Perspective。IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans,36(3),472-486。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 10. | Rao, H. R.、Upadhyaya, S. J.(2006)。Special Issue on Secure Knowledge Management。IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans,36(3),418-420。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 11. | Chen, T.-Y.、Chen, Y.-M.、Wang, C.-B.、Chu, H.-C.(2006)。Development of an Access Control Model, System Architecture and Approaches for Information Sharing in Virtual Enterprise。Computers in Industry,58(1),57-73。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 會議論文1. | Sandhu, R.、Munawer, Q.(1998)。The RRA97 Model for Role-based Administration of Role Hierarchies。0。39-49。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | Zhu, H. H、Chen, D. F.、Zhang, X. C.(2003)。Research of Knowledge Chain in Intelligent Control。0。1027-1030。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 圖書1. | Wiig, K. M.(1993)。Knowledge Management Foundations: Thinking About Thinking-How People and Organizations Represent, Create and Use Knowledge。Texas:Schema Press。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | Nonaka, Ikujiro、Takeuchi, Hirotaka(1995)。The knowledge-creating company: How Japanese companies create the dynamics of innovation。Oxford University Press。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 3. | Davenport, Thomas H.、Prusak, Laurence(1998)。Working Knowledge: How Organizations Manage What They Know。Harvard Business School Press。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | |