| 期刊論文1. | 張裕敏(20111000)。典範轉移對資安產業發展的影響。資訊安全通訊,17(4),97-100。 延伸查詢 | 2. | 樊國楨、黃健誠(2013)。下一世代網路(Next Generation Network,簡稱NGN)安全標準初探之三:可信賴網路接取(Trusted Network Connect,簡稱TNC)。網路通訊國家型科技計畫簡訊,54,38-47。 延伸查詢 | 3. | 樊國楨、黃健誠、朱潮昌(20130100)。資訊安全管理與脆弱性評分系統初探:根基於安全內容自動化協定。電腦稽核,27,79-101。 延伸查詢 | 4. | Coyne, E.、Weil, T. R.(201305)。ABAC and RBAC: Scalable, Flexible, and Auditable Access Management。IT Professional,15(3),14-16。 | 5. | Information Assurance Technology Analysis Center(2011)。A Commercial Engagement Strategy for Authorization and Access Management in Defense and Intelligence Communities。IAnewsletter,14(3),14-19。 | 6. | Kuhn, D. R.、Coyne E. J.、Weil, T. R.(2010)。Adding Attributes to Role Based Access Control。IEEE Computer,43(6),79-81。 | 7. | Skakarian, P.(2011)。Stuxnet: Cyberwar Revolution in Military Affairs。Small Wars Journal。 | 8. | Unal, D.、Caglayan, M. U.(2013)。A Formal Role-based Access Control Model for Security Policies in Multi-domain Mobile Networks。Computer Networks,57(1),300-350。 | 會議論文1. | 吳啟文(2013)。政府資通安全威脅趨勢及防護策略。第23屆全國資訊安全會議。臺南:南臺科技大學。 延伸查詢 | 2. | Andresen, Leslie(2011)。Trusted Computing Based Insider Threat Protection。2nd Annual NSA Trusted Computing Conference & Exposition,(會議日期: 2011-09-20)。 | 3. | Virvilis, N.、Gritzails, D.(2013)。The Big Four-What We Did Wrong in Advanced Persistent Threat Detection?。2013 International Conference on Availability, Reliability and Security。Fribourg:University of Regensbury Germany。248-254。 | 研究報告1. | US Office of Management and Budget(20140501)。Annual Report to Congress: Federal Information Security Management Act。 | 學位論文1. | 季祥(2014)。APT攻擊對企業資安政策之影響(碩士論文)。中國文化大學。 延伸查詢 | 圖書1. | Cooper, D.、Polk, W.、Regenscheid, A.、Souppaya, M.(2011)。BIOS Protection Guidelines: Recommendations of the National Institute of Standards and Technology。Gaithersburg, MD:National Institute of Standards and Technology。 | 2. | Booth, H.、Halbardier, A.(2011)。Trust Model for Security Automation Data 1.0。Gaithersburg, MD:U. S. Department of Commerce, National Institute of Standards and Technology。 | 3. | Hu, V. C.、Ferraiolo, D.、Kuhn, R.、Schnitzer, A.、Sandlin, K.、Miller, R.、Scarfone, K.(2014)。Guide to Attribute Based Access Control。Gaithersburg, MD:National Institute of Standards and Technology。 | 4. | Regenscheid, A.、Scarfone, K.(2011)。BIOS Integrity Measurement Guidelines (Draft)。Gaithersburg, MD:National Institute of Standards and Technology。 | 單篇論文1. | 樊國楨,韓宜蓁(2014)。資訊安全管理系統要求事項初論:根基於管理系統標準之強制性規範。 延伸查詢 | 其他1. | Enders, R.,Schwarz, H.(2013)。Network Endpoints and Attribute Based Access Controls, May 2013 Whitepaper and Presentation Submissions, ICS-CERT (Industrial Control Systems Cyber Emergency Response Team),https://www.cisa.gov/uscert/ics/。 | 2. | Sherstobitoff, R.,Liba, I.,Walter, J.(2013)。Dissecting Operation Troy Cyberspionage in South Korea,http://www.mcafee.com/sg/resources/white-papers/wp-disserting-operation-troy.pdf, 2013/03/31。 | |