| 期刊論文1. | 許瀞文(2013)。花錢就能拿證書台灣資安玩假的?。今周刊,849,54-56。 延伸查詢 | 2. | 紀珮宜(2017)。由歐盟資料保護規則論被遺忘權之爭議。經貿法訊,214,8-24。 延伸查詢 | 3. | 何念修(20190100)。個資保護「適當之安全措施」--以新加坡個資法之技術措施建議為比較對象。科技法律透析,31(1),55-61。 延伸查詢 | 4. | 鄭金龍、張木軍、石連柱(20051200)。臺電中央調度中心分散型電能管理系統的規劃與建置。台電工程月刊,688,77-88。 延伸查詢 | 5. | Wong, J.-J.(2007)。Study on the 729 blackout in the Taiwan power system。International Journal of Electrical Power and Energy Systems,29(8),589-599。 | 會議論文1. | Rannenberg, K.(2017)。Privacy Management Data Protection Standardization (Presentation)。CEN-CENELEC-ENISA workshop,(會議日期: 2017-09-19)。Bruussels, Belgium。 | 研究報告1. | Grassi, P. A.、Lefkovitz, N. B.、Nadeau, E. M.、Galluzzo, R. J.、Dinh, A. T.(2018)。Attribute Metadata, Proposed Schema for Evaluating Federated Attributes。 | 圖書1. | European Union Agency for Network and Information Security(2014)。Privacy and Data Protection by Design-from policy to engineering。 | 2. | 吳英杰(2015)。隱私保護數據發布:模型與算法。清華大學出版社。 延伸查詢 | 3. | 財團法人金融聯合徵信中心(2017)。歐盟個人資料保護規則。 延伸查詢 | 4. | 許志義(2000)。從「七二九」與「九二一」停電事件分析我國電力系統之安全政策。行政院研究發展考核委員會。 延伸查詢 | 5. | Chatila, R.、IEEE(2019)。Ethically Aligned Design。IEEE Standards Association。 | 6. | Kissel, R.(2014)。Guidelines for Media Sanitization。 | 7. | Yeluri, R.、Castro-lean E.(2014)。Building the Infrastructure for Cloud Security-A Solutions View。Apress。 | 其他1. | Office of Management and Budget(2016)。Annual Report to Congress: Federal Information Security Modernization Act,https://obamawhitehouse.archives.gov/sites/default/files/omb/ assets/egov_docs/final_fy_2015_fisma_report_to_congress_03_18_2016.pdf, 。 | 2. | Association for Computing Machinery,IEEE Computer Society,Association for Information Systems Special Interest Group on Information Security and Privacy,International Federation for Information Processing Technical Committee on Information Security Education(2017)。Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity,https://cybered.hosting.acm.org/wp/wp-content/uploads/2018/02/csec2017_web.pdf。 | 3. | Brit, A.(2017)。Secure Cloud, Analysis of existing technologies,http://www.securecloudproject.eu/wp-content/uploads/D2.1-final.pdf。 | 4. | Hughe, Gordon,Coughlin, Tom(2006)。Tutorial on disk drive data sanitization,https://cmrr.ucsd.edu/_files/data-sanitization-tutorial.pdf.。 | 5. | Intel(2017)。Intel TXT(Intel Trusted Execution Technology) Software Development Guide,http://kib.kiev.ua/x86docs/Intel/TXT/315168-013.pdf。 | 6. | Willett, M.(2009)。Self-Encrypting Drives,https://www.snia.org/sites/default/education/tutorials/2009/fall/security/MichaelWillett-Self_Encrypting_Drives-FINAL.pdf。 | |