[1]方俊富,以LDAP提昇協同合作平台的安全控管措施之案例研究,台灣科技大學自動化及控制學系碩士學位論文,2003年。[2]王采瑜,兼具安全與效率之適用於資訊商品數位權利機制,世新大學資訊管理學系碩士學位論文,2004年。[3]朱天元,新電子付款機制及其安全性之研究,長庚大學企業管理學系碩士學位論文,2003年。[4]呂忠憲,以屬性為基礎的使用者角色分配之研究與實作,中原大學資訊工程學系碩士學位論文,2003年。[5]余彥宏,智慧卡離線交易認證機制之研究,義守大學資訊工程學系碩士學位論文,2004年。[6]李政雄,電子現金延伸應用之研究,朝陽科技大學資訊管理學系碩士學位論文,2004年。[7]林千代,可攜性RBAC 資訊系統架構之研究,朝陽科技大學資訊管理學系碩士學位論文,2003年。[8]邱啟弘,RBAC權限控管系統中靜態責任分離機制之研究,中原大學資訊工程學系碩士學位論文,2003年。[9]周伯錕,利用智慧卡之遠端身份認證之研究,中興大學資訊科學系碩士學位論文,2002年。[10]施淵仁,具流程管理機制之工作存取權限控制模型之研究,元智大學電機暨資訊工程研究所碩士學位論文,1999年。[11]許沁如,動態會議金鑰分配機制之研究,世新大學資訊管理學系碩士學位論文,2004年。
[12]郭素馨,應用智慧卡實現RBAC執行權管制,交通大學資訊管理學研究所碩士學位論文,1999年。[13]曾瑋展,以角色為主之權限控管系統中使用控制模組之研究與實作,中原大學資訊工程學系碩士學位論文,2004年。[14]蔡昌學,RBAC權限控管系統中動態責任分離機制之研究,中原大學資訊工程學系碩士學位論文,2003年。[15]謝懷德,台灣地區自動櫃員機區位選擇因素之研究,交通大學科技管理研究所碩士學位論文,2002年。[16]異康資訊股份有限公司,“華泰銀行網路 ATM解決方案建議書“,2004年7月。
[17]賴溪松、韓亮、張真誠,“近代密碼學及其應用”,台北:旗標出版股份有限公司,2003年8月。
[18]財金資訊股份有限公司,“晶片金融卡於銀行ATM上的應用”,財金資訊股份有限公司新種業務介紹 > 業務介紹> 晶片金融卡業務,http://www2.fisc.com.tw/dev_biz/combocard-4.asp。
[19]財金資訊股份有限公司,“晶片金融卡規格書” 及 “晶片金融卡端末設備介面規格書”,3.0 版。
[20]財金資訊股份有限公司,“晶片金融卡業務說明課程”,2003年7月。
[21]國泰世華銀行,“國泰世華銀行「網路提款機MyATM」說明”,https://www.cathaybk.com.tw/cathaybk/event/2004myatm/index.htm。
[22]樊國楨、陳祥輝、蔡敦仁,“資料庫濫用軌跡塑模”,http://www.ascc.net/nl/90/1711/02.txt。
[23]YAHOO!奇摩網站,“YAHOO!奇摩網路ATM/使用教學”,http://tw.money.yahoo.com/atm/teach.
[24]Antony Edwards, Trent Jaeger, and Xiaolan Zhang, “Analysis and Verification: Runtime Verification of Authorization Hook Placement for the Linux Security Modules Framework”, Proceedings of the 9th ACM conference on Computer and communications security, pp. 225-234, November 2002.
[25]A. Schaad, J. Moffett, and J. Jacob, “The Role-Based Access Control System of a European Bank: A Case Study and Discussion,” Proceedings of the 6th ACMSymposium on Access control models and technologies, pp. 3-9, 2001.
[26]C. Joncheng Kuo and Polar Humenn, “Session 4: Web Service Applications: Dynamically Authorized Role-based Access Control for Secure Distributed Computation”, Proceedings of the 2002 ACM workshop on XML security, pp. 97-103, November 2002.
[27]David Ferraiolo and Richard Kuhn., “Role-Based Access Control, In Proceedings of 15th NIST-NCSC National Computer Security Conference, pp. 554-563, October 1992.
[28]David F. Ferraiolo, Ravi Sandhu, Serban Gavrila,D. Richard Kuhn, and Ramaswamy Chandramouli, “Proposed NIST Standard for Role-Based Access Control”, ACM Transactions on Information and System Security, pp. 224-274, Auguest 2001.
[29]Duminda Wijesekera, Sushil Jajodia, Francesco Parisi-Presicce, and Asa Hagstrom, “Removing Permissions in the Flexible Authorization Framework”, ACM Transactions on Database Systems (TODS), Vol. 28, Issue 3, pp. 209-229, September 2003.
[30]Elisa Bertino, Elena Ferrari, and Vijay Atluri, “The Specification and Enforcement of Authorization Constraints in Workflow Management Systems”, ACM Transactions on Information and System Security (TISSEC), Vol. 2, Issue 1, pp. 65-104, February 1999.
[31]Elisa Bertino, Sushil Jajodia, and Pierangela Samarati, “A Flexible Authorization Mechanism for Relational Data Management Systems”, ACM Transactions on Information Systems (TOIS), Vol. 17, Issue 2, pp. 101-140, April 1999.
[32]Elisa Bertino, Sushil Jajodia, and Pierangela Samarati, “A Non-timestamped Authorization Model for Data Management Systems”, Proceedings of the 3rd ACM conference on Computer and communications security, pp. 169-178, January 1996.
[33]Gail-Joon Ahn, and Ravi Sandhu, “Role-based Authorization Constraints Specification”, ACM Transactions on Information and System Security (TISSEC), Vol. 3, Issue 4, pp. 207-226, November 2000.
[34]Horst F. Wedde, and Mario Lischka, “Modular Authorization and Administration”, ACM Transactions on Information and System Security (TISSEC), Vol. 7, Issue 3, pp. 363-391, August 2004.
[35]Longhua Zhang, Gail-Joon Ahn, and Bei-Tseng Chu, “A Rule-based Framework for Role-based Delegation and Revocation”, ACM Transactions on Information and System Security (TISSEC), Vol. 6, Issue 3, pp. 404 – 441, August 2003.
[36]Mary R. Thompson, Abdelilah Essiari, and Srilekha Mudumbai, “Certificate-based Authorization Policy in a PKI Environment”, ACM Transactions on Information and System Security (TISSEC), Vol. 6, Issue 4, pp. 566–588, November 2003.
[37]Mark Strembeck, and Gustaf Neumann, “An Integrated Approach to Engineer and Enforce Context Constraints in RBAC Environments”, ACM Transactions on Information and System Security, Vol. 7, Issue 3, pp. 392–427, August 2004.
[38]Mary R. Thompson, Abdelilah Essiari, and Srilekha Mudumbai, “Authorization Translation for XML Document Transformation”, World Wide Web, Vol. 7, No. 1, pp. 111-138, March 2004.
[39]Patricia P. Griffiths, and Bradford W. Wade, “An Authorization Mechanism for a Relational Database System”, ACM Transactions on Database Systems (TODS), Vol. 1, Issue 3, p. 51, September 1976.
[40]Pierangela Samarati, Michael K. Reiter, and Sushil Jajodia, “An Authorization Model for a Public Key Management Service”, ACM Transactions on Information and System Security (TISSEC), Vol. 4, Issue 4, pp. 453-482, November 2001.
[41]P.B. Schneck, “Persistent Access Control to Prevent Piracy of Digital Information,” Proceedings of the IEEE, Vol. 87, No. 7, pp. 1239-1250, 1999.
[42]R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, “Role Based Access Control Models”, IEEE Computer, Vol. 29, No. 2, pp. 38-47, February 1996.
[43]Ramaswamy Chandramouli, “Application of XML Tools for Enterprise-wide RBAC Implementation Tasks”, Proceedings of the fifth ACM workshop on Role-based access control, pp. 11-18, July 2000.
[44]R. S. Sandhu and P. Samarati, “Access Control: Principles and Practice,” IEEE Communications Magazine, pp. 40-48, 1994.
[45]Rivest R. L., “The MD5 Message-digest Algorithm”, RFC 1231, April 1992.