:::

詳目顯示

回上一頁
題名:建構雲端環境資料安全存取模型暨績效評估
書刊名:資訊管理學報
作者:陳志誠劉用貴
作者(外文):Chen, Patrick S.Liu, Yong-kuei
出版日期:2016
卷期:23:1
頁次:頁1-32
主題關鍵詞:雲端運算資訊安全主動驗證優先權多級安全分散式資料存取Cloud computingInformation securityActive authenticationMulti-level securityDistributed data access
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(2) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:2
  • 共同引用共同引用:1
  • 點閱點閱:120
期刊論文
1.Jung, Joo-young、Qiu, Jack Linchuan、Kim, Yong-chan(2001)。Internet Connectedness and Inequality: Beyond the "Divide"。Communication Research,28(4),507-535。  new window
2.陳志誠、林淑瓊、李興漢、許派立(20090700)。資訊資產分類與風險評鑑之研究--以銀行業為例。資訊管理學報,16(3),55-84。new window  延伸查詢new window
3.陳志誠、宋子傑(20051000)。在無線網路環境中基於用戶優先權與利他鎖定之多級安全資料庫存取控制。資訊安全通訊,11(4),51-67。  延伸查詢new window
4.葉桂珍、張榮庭(20060400)。企業之資訊安全策略與其產業別及資訊化程度關係探討。資訊管理學報,13(2),113-143。new window  延伸查詢new window
5.Chen, P. S.、Li, S. H.、Liu, Y. K.(2010)。Scheduling the access to multi-level secure databases in a wireless network environment。International Journal of Innovative Computing, Information and Control,6(12),5381-5403。  new window
6.Wood, C.、Summers, R. C.、Fernandez, E. B.(1979)。Authorization in multilevel database models。Information Systems,4(2),155-161。  new window
7.Salem, K.、Garcia-Molina, H.、Shands, J.(1994)。Altruistic Locking。ACM Transactions on Database Systems,19(1),117-169。  new window
8.Pang, H.、Carey, M. J.、Livny, M.(1995)。Multiclass query scheduling in real-time database systems。IEEE Transactions on Knowledge and Data Engineering,7(4),533-551。  new window
9.Goodhue, D. L.、Straub, D. W.(1991)。Security Concerns of System Users: A Study of Perceptions of the Adequacy of Security Measures。Information & Management,20(1),13-27。  new window
10.Sandhu, Ravi S.、Coyne, Edward J.、Feinstein, Hal L.、Youman, Charles E.(1996)。Role-based Access Control Models。IEEE Computer,29(2),38-47。  new window
11.Ferraiolo, D. F.、Sandhu, R.、Gavrila, S.、Kuhn, D.、Chandramouli, R.(2001)。Proposed NIST standard for role-based access control。ACM Transactions on Information and Systems Security,4(3),224-274。  new window
12.Jung, D. I.(2001)。Transformational and transactional leadership and their effects on creativity in groups。Creativity Research Journal,13(2),185-195。  new window
13.Kankanhalli, Atreyi、Tan, Bernard C.-Y.、Wei, Kwok-Kee(2005)。Contributing Knowledge to Electronic Knowledge Repositories: An Empirical Investigation。MIS Quarterly,29(1),113-143。  new window
會議論文
1.David, R.、Son, S. H.(1993)。A secure two phase locking protocol。The twelfth IEEE Symposium on Reliable Distributed Systems,(會議日期: 1993/10/6-10/8)。Princeton, NJ。126-135。  new window
2.Niemeyer, R. E.(1997)。Using Web technologies in two MLS environment: A security analysis。The thirteenth Annual Computer Security Applications Conference,(會議日期: 1997/12/8-12/12)。San Diego, California。205-214。  new window
3.Lin, J.、Lu, X.、Yu, L.、Zou, Y.、Zha, L.(2010)。Vega Warden: A uniform user management system for cloud applications。2010 IEEE International Conference on Networking, Architecture and Storage,(會議日期: 2010/7/15-7/17)。Macau。457-464。  new window
4.Lewis, S.、Wiseman, S.(1997)。Securing an object relational database。The thirteenth Anunual Computer Security Applications Conference,(會議日期: 1997/12/8-12/12)。San Diego, California。59-68。  new window
5.Kim, H. W.、Park, D. S.、Rhee, H. K.、Kim, U. M.(2001)。Advanced transaction scheduling protocol for multilevel secure database in wireless mobile network environment。IEEE International Conference on ATM (ICATM 2001) and High Speed Intelligent Internet Symposium,(會議日期: 2001/4/22-4/25)。Seoul。240-244。  new window
6.Lang, U.(2010)。OpenPMF SCaaS: Authorization as a service for cloud & SOA applications。IEEE International Conference on Cloud Computing Technology and Science,(會議日期: 2010/11/30-12/3)。Indianapolis, Indiana。634-643。  new window
7.劉家驊、洪士凱(2010)。雲端運算資料安全防護機制之研究。2010電腦視覺、影像處理與資訊技術研討會,清雲科技大學 (會議日期: 2010/6/9)。桃園。  延伸查詢new window
研究報告
1.Bell, D. E.、LaPadula, L. J.(1976)。Secure computer systems: Unified exposition and multics interpretation。Bedford, MA。  new window
2.Hinke, T.、Schaefer, M.(1975)。Secure Data Management System。System Development Corp.。  new window
圖書
1.Pfleeger, C. P.、Pfleeger, S. L.(2002)。Security in Computing。Prentice-Hall。  new window
2.Garcia-Molina, H.、Ullman, J.、Widom, J.(2008)。Database Systems: The Complete Book。India:Pearson Education。  new window
其他
1.European Network and Information Security Agency(2010)。Cloud computing: benefits, risks and recommendations for information security,http://www.enisa.europa.eu/act/rm/files/eliverables/cloud-computing-risk-assessment, 2012/02/17。  new window
2.陳志誠,王瀞慧(2011)。金融機構雲端運算架構下客戶資料防護之探討,明志科技大學。  延伸查詢new window
3.CSA。Security Guidance for Critical Areas of Focus in Cloud Computing,https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf。  new window
4.Brodkin, J.。Gartner: Seven Cloud-computing Security Risks,http://www.networkworld.com/news/2008/070208-cloud.html, 2008/07/02。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關書籍
 
無相關著作
 
QR Code
QRCODE