:::

詳目顯示

回上一頁
題名:隱私防護資料發布資訊系統之保護剖繪初論:根基於個人資料去識別化的議題
書刊名:前瞻科技與管理
作者:樊國楨蔡昀臻
作者(外文):Farn, Kwo-jeanTsai, Yun-chen
出版日期:2016
卷期:6:1
頁次:頁47-114
主題關鍵詞:保護剖繪個人可識別資訊去識別化個人資料管理系統資訊安全管理系統標準化Protection profilePPPersonally identifiable information de-identificationPIIpersonally information management systemPIMSInformation security management systemISMSStandardization
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(2) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:1
  • 共同引用共同引用:4
  • 點閱點閱:24
期刊論文
1.Coyne, E.、Weil, T. R.(201305)。ABAC and RBAC: Scalable, Flexible, and Auditable Access Management。IT Professional,15(3),14-16。  new window
2.樊國楨、黃健誠、林樹國(20150500)。《個人資料保護法施行細則》第17條實作初論:根基於ISO/IEC 29100:2011-12-15標準系列。前瞻科技與管理,5(1),43-83。new window  延伸查詢new window
3.Friedman, Arthur R.、Schnitzer, Adam(2011)。A Commercial Engagement Strategy for Authorization and Access Management in Defense and Intelligence Communities。IAnewsletter,14(3),14-19。  new window
4.Bacon, J.、Moody, K.、Yao, W.(2002)。A Model of OASIS Role-Based Access Control and its Support for Active Security。ACM Transactions on Information and Systems Security,5(4),492-540。  new window
5.Bertino, Elisa、Catania, Barbara、Ferrari, Elena、Perlasca, Paolo(2003)。A Logical Framework for Reasoning about Access Control Models。ACM Transactions on Information and System Security,6(1),71-127。  new window
6.Ferraiolo, D. F.、Sandhu, S.、Gavrila, D.、Kuhn, D. R.、Chandramouli, R.(2001)。A Proposed Standard for Role-Based Access Control。ACM Transactions on Information and Systems Security,4(3),224-274。  new window
7.Sandhu, R. S.、Coyne, E. J.(1996)。Role-Based Access Control Models。IEEE Computer,29(2),38-47。  new window
會議論文
1.Andresen, L.(2011)。Trusted Computing Based Insider Threat Protection。The 2nd Annual NSA Trusted Computing Conference & Exposition。Orlando, Florida。  new window
2.Fam, K.-J.、Lin, S.-K.、Hwang, J.-M.(2004)。A Study on the Information Security Audit and Alarm Protection Profile。The 5th International Common Criteria Conference。Berlin。  new window
3.Mohan, P.、Thakurta, A.、Shi, E.、Song, D.、Culler, D.(2012)。GUPT: Privacy Preserving Data Analysis Made Easy。The 2012 ACM SIGMOD International Conference on Management of Data。Scottsdale, Arizona:ACM。349-360。  new window
研究報告
1.鈺松國際資訊股份有限公司(2004)。網路服務致能式防火牆之開發(期末報告)。  延伸查詢new window
圖書
1.陳奕明(2003)。Linux系統安全分析。臺北:行政院國家科學委員會技術資料中心。  延伸查詢new window
2.劉克龍、馮登國、石文昌(2004)。安全操作系統與原理。北京:科學出版社。  延伸查詢new window
3.Challener, D.、Yoder, K.、Catherman, R.、Safford, D.、van Doom, L.(2008)。A Practical Guide to Trusted Computing。Indianapolis, IN:IBM Press。  new window
4.GmbH & IBM(2003)。SuSE Linux Enterprise Server V 8 with Service Pack 3 Security Target for CAPP Compliance。Armonk, VI:GmbH & IBM。  new window
5.Herrmann, D. S.(2003)。Using the Common Criteria for IT Security Evaluation。Boca Raton, Florida:Auerbach。  new window
6.Hu, C. V.、Ferraiolo, D.、Kuhn, R.、Schnitzer, A.、Sandlin, K.、Miller, R.、Scarfone, K.(201401)。Guide to Attribute Based Access Control (ABAC) Definition and Considerations。  new window
7.Mann, S.、Mitchell, E. L.(2000)。Linux System Security。Prentice-Hall。  new window
8.Rannenberg, K.(2015)。Standards Contributing to the Protection of Consumers' Privacy and Personal Data (ISO/COPOLCO)。Geneva:Rannenberg, K.。  new window
9.Regenscheid, A.、Scarfone, K.(201112)。BISO Integrity Measurement Guidelines (Draft)。  new window
其他
1.Sarangshar, N.-V.,Nemiroff, D.(20140327)。Patent Application Publication, Pub. No.: US 2014/0089660 Al,https://docs.google.com/viewer7ruHpatentimages.storage.googleapis.com/pdfs/US20140089660.pdf。  new window
2.Science Applications International Corporation(20021018)。Windows 2000 Security Target ST Version 2.0,https://www.commoncriteriaportal.org/files/epfiles/st_vid4002-st.pdf。  new window
3.林安妮(20150717)。大數據發展訂國家標準。  延伸查詢new window
4.經濟部(20150714)。個人資料去識別化之運作機制,臺北:經濟部標準檢驗局。  延伸查詢new window
5.經濟部標準檢驗局(2014)。資訊技術--安全技術--資訊安全管理系統一要求事項(CNS27001)。,臺北:經濟部標準檢驗局。  延伸查詢new window
6.經濟部標準檢驗局(2014)。資訊技術--安全技術--隱私權框架(CNS29100)。,臺北:經濟部標準檢驗局。  延伸查詢new window
7.經濟部標準檢驗局(2015)。資訊技術--安全技術--部分匿名部分去連結鑑別之要求事項(CNS29191)。,臺北:經濟部標準檢驗局。  延伸查詢new window
8.經濟部標準檢驗局(20160223)。「個人資料去識別化」驗證標準規範研訂及推廣,http://vtaiwan.tw/personal-data-protection/。  延伸查詢new window
9.Hamilton, B. A.(2002)。Depart of Defense Public Key Infrastructure and Key Management Infrastructure Token Protection Profile (Medium Robustness),http://www.commoncriteriaportal.org/files/ppfiles/PP_PKIKMI_TKN_MR_V3.0.pdf。  new window
10.International Organization for Standardization(2008)。Information Technology--Security Techniques--Evaluation Criteria for IT Security (all parts)(ISO/IEC 15408)。,Geneva:International Organization for Standardization。  new window
11.International Organization for Standardization(20080701)。Health Informatics--Information Security Management in Health Using ISO/IEC 27002(ISO 27799)。,Geneva:International Organization for Standardization。  new window
12.International Organization for Standardization(20081201)。Health informatics-Pseudonymization(ISO/TS 25237)。,Geneva:International Organization for Standardization。  new window
13.International Organization for Standardization(2013)。Information Technology-Security Techniques-Information Security Management Systems- Requirements(ISO/IEC 27001)。,Geneva:International Organization for Standardization。  new window
14.International Organization for Standardization(20131015)。Information Technology-Security Techniques-Privacy Architecture Framework(ISO/IEC 29101)。,Geneva:International Organization for Standardization。  new window
15.International Organization for Standardization(20131215)。Information Technology-Security Techniques-Anonymous Digital Signatures-Part 1: General(ISO/IEC 20008-1)。,Geneva:International Organization for Standardization。  new window
16.International Organization for Standardization(20130801)。Information Technology-Security Techniques-Anonymous Entity Authentication-Part 1: General(ISO/IEC 20009-1)。,Geneva:International Organization for Standardization。  new window
17.International Organization for Standardization(20140409)。WG 5 Standing Document 4(SD4)-Standard Privacy Assessment(SPA)(ISO/IEC JTC 1/SC 27)。,Geneva:International Organization for Standardization。  new window
18.International Organization for Standardization(20140801)。Information Technology-Security Techniques-Code of Practice for Protection of Personally Identifiable Information (P II) in Public Clouds Acting as P II Processors(ISO/IEC 27018)。,Geneva:International Organization for Standardization。  new window
19.International Organization for Standardization(20140315)。Information Technology-Security Techniques-Specification for Digital Redaction(ISO/IEC 27038)。,Geneva:International Organization for Standardization。  new window
20.International Organization for Standardization(20140301)。Information Technology-Security Techniques-Information Security Management-Organization economics(ISO/IEC TR 27016)。,Geneva:International Organization for Standardization。  new window
21.International Organization for Standardization(2015)。ISO/IEC Directives, Part 1: Consolidated ISO Supplement: Procedures specific to ISO,http://www.iso.org/iso/annex_sl_except_2015_6th_edition_his_and_guidance_only.pdf。  new window
22.International Organization for Standardization(20150727)。Information Technology-Security Techniques-Sector-Specific Application of ISO/IEC 27001-Requirements(ISO/IEC DIS 27009)。,Geneva:International Organization for Standardization。  new window
23.International Organization for Standardization(20150630)。WG5 Standing Document(SD5)--Guidelines on the Application of ISMS in the Area of Privacy(ISO/IEC JTC 1/SC 27/WG 5 N110)。,Geneva:International Organization for Standardization。  new window
24.Malin, B.(201306)。A De-identification Strategy Used for Shearing One Data Provider's Oncology Trials Data through the Project Daya Sphere ® Repository,http://www.projectdatasphere.org/projectdatasphere/html/resources/PDF/DEIDENTIFICATION。  new window
25.National Computer Security Center(199210)。A Guide to Understanding Security Modeling in Trusted Systems,http://fas.org/irp/nsa/rainbow/tgolo.pdf。  new window
26.Pfitzmann, A.,Hansen, M.(20100810)。A Terminology for Talking about Privacy by Data Minimization: Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management,http://dud.inf.ru-dresden.de/literatur/Anon_Termindogy-vo.34/pdf。  new window
圖書論文
1.Park, J. S.、Ahn, G.-J.、Sandhu, R.(2002)。Role-Based Access Control on the WEB using LDAP。Database and Application Security。New York:Kluwer Academic Publishers。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關書籍
 
無相關著作
 
QR Code
QRCODE