|
[1]BSI, “Information technology-Security techniques-Code of practice for information security management”, 2005(根據ISO27001條款A 4.3.2) [2]D. F. Ferraiolo, D. R. Kuhn,“Role-Based Access Controls”,15th National Computer Security Conference (1992), Baltimore MD pp. 554 – 563 [3]D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn and R. Chandramouli, “Proposed NIST Standard for Role-Based Access Control”, ACM Transactionson Information and System Security, vol. 4, no. 3, pp. 224-274, 2001 [4]J. Kohl and C. Neuman, “The Kerberos Network Authentication Service (V5)”,Network Working Group Request for Comments: 1510 [5]NBS FIPSPUB 46, “Data Encryption Standard”, National Bureau of Standards, U.S. Department of Commerce, Jan 1977 [6]NIST FIPS PUB 180-1, “Secure Hash Standard”, National Institute of Standards and Technology, U.S. Department of Commerce, Apr 1995 [7]National Institute of Standards and Technology, “The Advanced Encryption Standard”, http://csrc.nist.gov/aes/, 2000 [8]R. Rivest, “A Description of the RC2(r) Encryption Algorithm”, RFC2268, Jan 1998 [9]R. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”, Communications of the ACM, V.21, n.2, pp.120-126, Feb 1978 [10]R. Rivest, “The MD5 Message Digest Algorithm”, RFC 1321, Apr 1992 [11]Robert Richardson,“2007 CSI COMPUTER CRIME AND SECURITY SURVEY”, The 12th Annual Computer Crime and Security Survey [12]Robert Richardson,“2008 CSI COMPUTER CRIME AND SECURITY SURVEY”, The 13th Annual Computer Crime and Security Survey [13]T. ElGamal, “A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms”, Advances in Cryptology-CRYPTO''84 Proceedings, Berlin: Springer-Verlag, pp.10-18, 1985 [14]W3C. Extensible Markup Language(XML)1.0(Third Edition) [15]W3C. XSL Transformations (XSLT) Version 2.0. http://www.w3.org/TR/2005/WD-xslt20-20050211/. W3C Working Draft, 11 February 2005. [16]W3C. Guild to the W3C XML specification(”XMLspec”)DTD, Version2.1 http://www.w3.org/XML/1998/06/xmlspec-report-v21.htm. 1999. [17]W3C. Document Object Model (DOM) Level 3 Core Specification Version 1.0. [18]William Stallings, “Network and Internetwork Security Principles and Practice”, Prentice Hall International Edition, 2006 [19]Bruno Lowagie, “iText in Action”, Manning Publications, 2006 [20]Rich Helton, Johennie Helton , “Java security 全方位解決方案”, 基峯資訊,2004 [21]粘添壽,吳順裕, “資訊與網路安全技術”, 旗標出版股份有限公司, 2004 [22]http://java.sun.com/javase/technologies/security/ [23]http://web.mit.edu/Kerberos/
|