:::

詳目顯示

回上一頁
題名:現代企業網路中使用者識別與存取授權之整合設計
書刊名:中山管理評論
作者:黃景彰吳國禎
作者(外文):Hwang, Jing-jangWu, Kou-chen
出版日期:1997
卷期:5:4
頁次:頁779-796
主題關鍵詞:網際網路企業網路身份識別存取授權角色扮演InternetIntranetAuthenticationAuthorizationRBAC
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(1) 博士論文(1) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:1
  • 共同引用共同引用:0
  • 點閱點閱:28
期刊論文
1.Needham, Roger M.、Schroeder, Michael D.(1978)。Using Encryption for Authentication in Large Networks of Computers。Communications of the ACM,21(12),993-999。  new window
2.Doddrell, Gregory R.(1995)。Security environment reviews。Information Management & Computer Security,3(4),3-14。  new window
3.Doddrell, Gregory R.(1995)。Information security and the Internet。Information Management & Computer Security,3(4),15-19。  new window
4.Sanderson, Ethan、Forcht, Karen A.(1996)。Information security in business environment。Information Management & Computer Security,4(1),32-37。  new window
5.Denning, Dorothy E.、Sacco, Giovanni Maria(1981)。Timestamps in key distribution protocols。Communications of the ACM,24(8)。  new window
6.Harn, L.、Lin, H.-Y.(1992)。Integration of user authentication and access control。IEE Proceedings E: Computers and Digital Techniques,139(2),139-143。  new window
7.Lindup, Ken(1996)。The role of information security in corporate governance。Computers & Security,15,477-485。  new window
8.Sandhu, Ravi S.、Coyne, Edward J.、Feinstein, Hal L.、Youman, Charles E.(1996)。Rolebased access control models。IEEE computer,38-47。  new window
9.Lin, Ping、Lin, Lin(1996)。Security in enterprise networking: A quick tour。IEEE communication magazine,56-61。  new window
10.Frank, Robert L.、CISSP(1996)。Security issues in the virtual corporation。Computers & Security,15,471-476。  new window
11.von Solms, S. H.、van der Merwe, Isak(1994)。The management of computer security profiles using a role-oriented approach。Computers & Security,13(8),673-680。  new window
12.May, Thornton A.(1996)。Internet and Intranet: The faces of the wired economy。Information Management & Computer Security,4(5),3-6。  new window
會議論文
1.Laferriere, C.、Charland, Richard(1993)。Authentication and authorization techniques in distributed systems。The institute of electrical and electronics engineers 1993 international carnahan conference on security technology: Security technology,164-170。  new window
2.羅景原、黃景彰、樊國楨(1997)。公開金鑰管理組織運作架構。1997資訊安全會議,15-22。  延伸查詢new window
3.蔡啓仁(1997)。Challenges for building a financial public key infrastructure。1997資訊安全會議,152-157。  new window
4.Kohl, J. T.(1991)。The evolution of the Kerberos service。European conference proceedings,295-313。  new window
圖書
1.Bernstein, T.、Bhimani, A. B.、Schultz, E.、Siegel, C. A.(1996)。Internet Security For Business。New York, NY:John Wiley and Sons。  new window
2.Pfleeger, Charles P.(1989)。Security in computing。Englewood Cliffs, New Jersey:Prentice-Hall International, Inc.。  new window
3.程捷生(1997)。Intranet及Internet防火牆策略。台北:儒林。  延伸查詢new window
4.Tapscott, Don(1996)。The digital economy。New York:McGraw-Hill Book Co.。  new window
5.Hills, Mellanie(1997)。Intranet business strategies。John Wiley & Sons, Inc.。  new window
6.Open Software Foundation.(1993)。OSF DCE application development guide。  new window
7.RSA Laboratories(1996)。Answers To Frequently Asked Questions About Today's Cryptography。  new window
8.Bernard, Ryan(1996)。The corporate Intranet。New York:John Wiley & Sons, Inc.。  new window
9.Kalakota, Ravi、Whinston, Andrew B.(1996)。Frontiers of electronic commerce。Addison-Wesley Publishing Company。  new window
其他
1.ITU-T SG 7,ISO/IEC JTC1/SC21/WG4(1990)。ITU-T Recommendation X.509\ISO/IEC 9594-8, Information Technology-Open Systems Interconnection-The Directory : Authentication Framework。  new window
2.National Institute of Standards and Technology(1996)。Role-Based Access Control (RBAC): Features and Motivations,http://walts.ncsl.nist.gov/rbac/newpaper/rbac.html。  new window
3.Gorman, Trisha(1997)。Smart cards come to the Web-are you ready?,http://www.netscapeworld.com/netscapeworid/nw-03-1997/nw-03-smartcard.html。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE