:::

詳目顯示

回上一頁
題名:自抹除、刪除與抹除權及被遺忘權之控制措施的標準化談「設計及預設的資料防護」:根基於雲端運算服務
書刊名:電腦稽核
作者:蔡昀臻樊國楨
出版日期:2019
卷期:40
頁次:頁10-30
主題關鍵詞:抹除刪除抹除權被遺忘權一般資料保護規範EraseDeleteRight to erasureRight to be forgottenGeneral data protection regulationGDPR
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:4
期刊論文
1.許瀞文(2013)。花錢就能拿證書台灣資安玩假的?。今周刊,849,54-56。  延伸查詢new window
2.紀珮宜(2017)。由歐盟資料保護規則論被遺忘權之爭議。經貿法訊,214,8-24。  延伸查詢new window
3.何念修(20190100)。個資保護「適當之安全措施」--以新加坡個資法之技術措施建議為比較對象。科技法律透析,31(1),55-61。  延伸查詢new window
4.鄭金龍、張木軍、石連柱(20051200)。臺電中央調度中心分散型電能管理系統的規劃與建置。台電工程月刊,688,77-88。  延伸查詢new window
5.Wong, J.-J.(2007)。Study on the 729 blackout in the Taiwan power system。International Journal of Electrical Power and Energy Systems,29(8),589-599。  new window
會議論文
1.Rannenberg, K.(2017)。Privacy Management Data Protection Standardization (Presentation)。CEN-CENELEC-ENISA workshop,(會議日期: 2017-09-19)。Bruussels, Belgium。  new window
研究報告
1.Grassi, P. A.、Lefkovitz, N. B.、Nadeau, E. M.、Galluzzo, R. J.、Dinh, A. T.(2018)。Attribute Metadata, Proposed Schema for Evaluating Federated Attributes。  new window
圖書
1.European Union Agency for Network and Information Security(2014)。Privacy and Data Protection by Design-from policy to engineering。  new window
2.吳英杰(2015)。隱私保護數據發布:模型與算法。清華大學出版社。  延伸查詢new window
3.財團法人金融聯合徵信中心(2017)。歐盟個人資料保護規則。  延伸查詢new window
4.許志義(2000)。從「七二九」與「九二一」停電事件分析我國電力系統之安全政策。行政院研究發展考核委員會。  延伸查詢new window
5.Chatila, R.、IEEE(2019)。Ethically Aligned Design。IEEE Standards Association。  new window
6.Kissel, R.(2014)。Guidelines for Media Sanitization。  new window
7.Yeluri, R.、Castro-lean E.(2014)。Building the Infrastructure for Cloud Security-A Solutions View。Apress。  new window
其他
1.Office of Management and Budget(2016)。Annual Report to Congress: Federal Information Security Modernization Act,https://obamawhitehouse.archives.gov/sites/default/files/omb/ assets/egov_docs/final_fy_2015_fisma_report_to_congress_03_18_2016.pdf, 。  new window
2.Association for Computing Machinery,IEEE Computer Society,Association for Information Systems Special Interest Group on Information Security and Privacy,International Federation for Information Processing Technical Committee on Information Security Education(2017)。Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity,https://cybered.hosting.acm.org/wp/wp-content/uploads/2018/02/csec2017_web.pdf。  new window
3.Brit, A.(2017)。Secure Cloud, Analysis of existing technologies,http://www.securecloudproject.eu/wp-content/uploads/D2.1-final.pdf。  new window
4.Hughe, Gordon,Coughlin, Tom(2006)。Tutorial on disk drive data sanitization,https://cmrr.ucsd.edu/_files/data-sanitization-tutorial.pdf.。  new window
5.Intel(2017)。Intel TXT(Intel Trusted Execution Technology) Software Development Guide,http://kib.kiev.ua/x86docs/Intel/TXT/315168-013.pdf。  new window
6.Willett, M.(2009)。Self-Encrypting Drives,https://www.snia.org/sites/default/education/tutorials/2009/fall/security/MichaelWillett-Self_Encrypting_Drives-FINAL.pdf。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top