| 期刊論文1. | Jung, Joo-young、Qiu, Jack Linchuan、Kim, Yong-chan(2001)。Internet Connectedness and Inequality: Beyond the "Divide"。Communication Research,28(4),507-535。 | 2. | 陳志誠、林淑瓊、李興漢、許派立(20090700)。資訊資產分類與風險評鑑之研究--以銀行業為例。資訊管理學報,16(3),55-84。 延伸查詢 | 3. | 陳志誠、宋子傑(20051000)。在無線網路環境中基於用戶優先權與利他鎖定之多級安全資料庫存取控制。資訊安全通訊,11(4),51-67。 延伸查詢 | 4. | 葉桂珍、張榮庭(20060400)。企業之資訊安全策略與其產業別及資訊化程度關係探討。資訊管理學報,13(2),113-143。 延伸查詢 | 5. | Chen, P. S.、Li, S. H.、Liu, Y. K.(2010)。Scheduling the access to multi-level secure databases in a wireless network environment。International Journal of Innovative Computing, Information and Control,6(12),5381-5403。 | 6. | Wood, C.、Summers, R. C.、Fernandez, E. B.(1979)。Authorization in multilevel database models。Information Systems,4(2),155-161。 | 7. | Salem, K.、Garcia-Molina, H.、Shands, J.(1994)。Altruistic Locking。ACM Transactions on Database Systems,19(1),117-169。 | 8. | Pang, H.、Carey, M. J.、Livny, M.(1995)。Multiclass query scheduling in real-time database systems。IEEE Transactions on Knowledge and Data Engineering,7(4),533-551。 | 9. | Goodhue, D. L.、Straub, D. W.(1991)。Security Concerns of System Users: A Study of Perceptions of the Adequacy of Security Measures。Information & Management,20(1),13-27。 | 10. | Sandhu, Ravi S.、Coyne, Edward J.、Feinstein, Hal L.、Youman, Charles E.(1996)。Role-based Access Control Models。IEEE Computer,29(2),38-47。 | 11. | Ferraiolo, D. F.、Sandhu, R.、Gavrila, S.、Kuhn, D.、Chandramouli, R.(2001)。Proposed NIST standard for role-based access control。ACM Transactions on Information and Systems Security,4(3),224-274。 | 12. | Jung, D. I.(2001)。Transformational and transactional leadership and their effects on creativity in groups。Creativity Research Journal,13(2),185-195。 | 13. | Kankanhalli, Atreyi、Tan, Bernard C.-Y.、Wei, Kwok-Kee(2005)。Contributing Knowledge to Electronic Knowledge Repositories: An Empirical Investigation。MIS Quarterly,29(1),113-143。 | 會議論文1. | David, R.、Son, S. H.(1993)。A secure two phase locking protocol。The twelfth IEEE Symposium on Reliable Distributed Systems,(會議日期: 1993/10/6-10/8)。Princeton, NJ。126-135。 | 2. | Niemeyer, R. E.(1997)。Using Web technologies in two MLS environment: A security analysis。The thirteenth Annual Computer Security Applications Conference,(會議日期: 1997/12/8-12/12)。San Diego, California。205-214。 | 3. | Lin, J.、Lu, X.、Yu, L.、Zou, Y.、Zha, L.(2010)。Vega Warden: A uniform user management system for cloud applications。2010 IEEE International Conference on Networking, Architecture and Storage,(會議日期: 2010/7/15-7/17)。Macau。457-464。 | 4. | Lewis, S.、Wiseman, S.(1997)。Securing an object relational database。The thirteenth Anunual Computer Security Applications Conference,(會議日期: 1997/12/8-12/12)。San Diego, California。59-68。 | 5. | Kim, H. W.、Park, D. S.、Rhee, H. K.、Kim, U. M.(2001)。Advanced transaction scheduling protocol for multilevel secure database in wireless mobile network environment。IEEE International Conference on ATM (ICATM 2001) and High Speed Intelligent Internet Symposium,(會議日期: 2001/4/22-4/25)。Seoul。240-244。 | 6. | Lang, U.(2010)。OpenPMF SCaaS: Authorization as a service for cloud & SOA applications。IEEE International Conference on Cloud Computing Technology and Science,(會議日期: 2010/11/30-12/3)。Indianapolis, Indiana。634-643。 | 7. | 劉家驊、洪士凱(2010)。雲端運算資料安全防護機制之研究。2010電腦視覺、影像處理與資訊技術研討會,清雲科技大學 (會議日期: 2010/6/9)。桃園。 延伸查詢 | 研究報告1. | Bell, D. E.、LaPadula, L. J.(1976)。Secure computer systems: Unified exposition and multics interpretation。Bedford, MA。 | 2. | Hinke, T.、Schaefer, M.(1975)。Secure Data Management System。System Development Corp.。 | 圖書1. | Pfleeger, C. P.、Pfleeger, S. L.(2002)。Security in Computing。Prentice-Hall。 | 2. | Garcia-Molina, H.、Ullman, J.、Widom, J.(2008)。Database Systems: The Complete Book。India:Pearson Education。 | 其他1. | European Network and Information Security Agency(2010)。Cloud computing: benefits, risks and recommendations for information security,http://www.enisa.europa.eu/act/rm/files/eliverables/cloud-computing-risk-assessment, 2012/02/17。 | 2. | 陳志誠,王瀞慧(2011)。金融機構雲端運算架構下客戶資料防護之探討,明志科技大學。 延伸查詢 | 3. | CSA。Security Guidance for Critical Areas of Focus in Cloud Computing,https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf。 | 4. | Brodkin, J.。Gartner: Seven Cloud-computing Security Risks,http://www.networkworld.com/news/2008/070208-cloud.html, 2008/07/02。 | |