其他1. | 林安妮(20150717)。大數據發展訂國家標準。 延伸查詢 |
2. | 經濟部(20150714)。個人資料去識別化之運作機制,臺北:經濟部標準檢驗局。 延伸查詢 |
3. | 經濟部標準檢驗局(2015)。資訊技術--安全技術--部分匿名部分去連結鑑別之要求事項(CNS29191)。,臺北:經濟部標準檢驗局。 延伸查詢 |
4. | 經濟部標準檢驗局(20160223)。「個人資料去識別化」驗證標準規範研訂及推廣,http://vtaiwan.tw/personal-data-protection/。 延伸查詢 |
5. | 丁麗萍,盧國慶(2014)。基於關聯規則滿足用戶隱私保護的個性化推薦方法及系統(104050267)。 延伸查詢 |
6. | International Organization for Standardization(2008)。2008-07-01 Health Informatics- Information Security Management in Health Using ISO/IEC 27002(ISO 27799)。,Geneva:International Organization for Standardization。 |
7. | International Organization for Standardization(2008)。Information Technology- Security Techniques- Evaluation Criteria for IT Security(ISO/IEC 15408)。,Geneva:International Organization for Standardization。 |
8. | International Organization for Standardization(2008)。2008-12-01 Health Informatics- Pseudonymization(ISO/TS 25237)。,Geneva:International Organization for Standardization。 |
9. | International Organization for Standardization(2010)。2010-09-22 Modelling Cloud Computing Architecture without Compromising Privacy(ISO/IEC JTC 1/SC 27 N9326)。,Geneva:International Organization for Standardization。 |
10. | International Organization for Standardization(2013)。2013-10-15 Information Technology- Security Techniques- Privacy Architecture Framework(ISO/IEC 29101)。,Geneva:International Organization for Standardization。 |
11. | International Organization for Standardization(2013)。2013 Information Technology- Security Techniques- Code of Practice for Information Security Controls ( Technical Corrigendum 1: 2014-09-15, Technical Corrigendum 2: 2015-11-15 )(ISO/IEC 27002)。,Geneva:International Organization for Standardization。 |
12. | International Organization for Standardization(2013)。2013 Information technology- Security Techniques- Information Security Management Systems-Requirements ( Technical Corrigendum 1: 2014-09-15, Technical Corrigndum 2: 2015-12-01 )(ISO/IEC 27001)。,Geneva:International Organization for Standardization。 |
13. | International Organization for Standardization(2013)。2013 Information technology- Security Techniques- Information Security for Supplier Relationships- Part 3: Guidelines for Information and Communication Technology Supply Chain Security(ISO/IEC 27036-3)。,Geneva:International Organization for Standardization。 |
14. | International Organization for Standardization(20150727)。Information Technology-Security Techniques-Sector-Specific Application of ISO/IEC 27001-Requirements(ISO/IEC DIS 27009)。,Geneva:International Organization for Standardization。 |
15. | International Organization for Standardization(2013)。2013-12-15 Information Technology- Security Techniques- Anonymous Digital Signatures- Part 1: General(ISO/IEC 20008-1)。,Geneva:International Organization for Standardization。 |
16. | International Organization for Standardization(20150630)。WG5 Standing Document(SD5)--Guidelines on the Application of ISMS in the Area of Privacy(ISO/IEC JTC 1/SC 27/WG 5 N110)。,Geneva:International Organization for Standardization。 |
17. | International Organization for Standardization(2014)。2014-04-09 WG 5 Standing Document 4 (SD4)--Standard Privacy Assessment (SPA)(ISO/IEC JTC 1/SC 27 N14174)。,Geneva:International Organization for Standardization。 |
18. | International Organization for Standardization(2014)。2014-03-01 Information Technology--Security Techniques- Information Security Management--Organization Economics(ISO/IEC TR 27016)。,Geneva:International Organization for Standardization。 |
19. | International Organization for Standardization(2014)。Information technology--Security techniques--Information security for supplier relationships--Part 1: Overview and concepts(ISO/IEC 27036-1)。,Geneva:International Organization for Standardization。 |
20. | Pfitzmann, A.,Hansen, M.(20100810)。A Terminology for Talking about Privacy by Data Minimization: Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management,http://dud.inf.ru-dresden.de/literatur/Anon_Termindogy-vo.34/pdf。 |
21. | International Organization for Standardization(20160530)。Information Technology- Security Technology- Privacy Enhancing Data De- Identification Techniques, Annex B(ISO/IEC 2nd WD 20889)。,Geneva:International Organization for Standardization。 |
22. | (20150806)。PRepairing Industry to Privacy-by-Design by Spporting Its Application in Research (PRIPARE)(ISO/IEC JTC 1/SC 27/WG 5)。,Geneva:International Organization for Standardization。 |
23. | ISO,TMB,JTCG(2013)。N360 JTCG Concept Document to Support Annex SL,Geneva:ISO:TMB:JTCG。(ISO/TMB/JTCG N 360)。 |
24. | Malin, B.(2013)。A De-Identification Strategy Used for Sharing One Data Provider's Oncology Trials Data through the Project Daya Sphere® Repository,http://www.projectdatasphere.org/projectdatasphere/html/resources/PDF/DEIDENTIFICATION。 |
25. | National Institute of Standards and Technology(20121015)。Summary of the Workshop on Information and Technologies Supply Chain Risk Management,Gaithersburg, MD:National Institute of Standards and Technology。 |