|
[1] 醫院電腦處理個人資料登記管理辦法(1996)http://www.yesky.com/20011207/208860.shtml[2] Kleijhorst A.,Van der Velde E. T., Baljon M. H., Gerritsen M. J. G. M., Oon H,“Secure and Cost-Effiective Exchange of Cardiac Images over the Electronic Highway in the Netherlands”, Computers in Cardiology, IEEE,(1997)pp.191-194[3] Charles Safran, Howard Goldberg Goldberg,”Electronic patient records and the impact of the Internet”,International Journal of Medical Informatics 60(2000)pp.77-83[4] The CERT Coordination Center (CERT/CC) web site http://www.cert.org/[5] Yahya Y., Al-Salqan,”Security and Confidentiality in Healthcare Informatics”,IEEE,(1998)pp.371-375[6] 蔡佳婷,王大為,郭旭崧,“醫療院所高階主管對醫療資訊安全與隱私看法的調查研”2001國際醫學資訊研討會(2001)[7] http://www.chinabyte.com/20011207/1427031.shtml[8] 林惠美, ‘Toward Electronic Patient Record’’ 波士頓報告/林惠美.htm (2001),http://ntuh.mc.ntu.edu.tw/mre/[9] http://www.pidcusa.com/forum/001115.html[10] Van der Meijden, Tange. H, Troost. J, Hasman. A,“Development and implementation of an EPR: how to encourage the user”International Journal of Medical Informatics (2001), pp.173 — 185[11] Alan O.Freier, Philip Kalton, Paul C. Kocher, “The SSL Protocol Version3.0”,1996[12] How SSL Workshttp://home.netscape.com/assist/security/ssl/howitworks/html[13] 陳彥學,“資訊安全理論與實務”, 文魁資訊股份有限公司(2000)[14] 劉元溢,“SET的擴散與採用”,國立台灣大學商學研究所碩士論文(1999)[15] Dilip C Naik,“INTERNET STANDARDS AND PROTOCOLS”松崗電腦圖書資料股份有限公司(1998)[16] William Stallings,“密碼學與網路安全原理與實務”□峰資訊股份有限公司(2001)[17] Charlie Scott, Paul Wolfe & Mike Erwin “Virtual Private Networks”O’REILLY(1999)[18] 王大為,郭旭崧,蔡國煇,林育民“衛生醫療資訊安全與隱私保障之策略研究” (2001)[19] 程秉輝, “駭客任務實戰 - 攻略篇” 旗標出版社 (2000)[20] 程秉輝, “駭客任務實戰 - 防護篇” 旗標出版社 (2001)[21] 入侵電腦實例http://ceiba.cc.ntu.edu.tw/ch8_120/wwwboard/board/messages/468.htm[22] Stuart McClure, Joel Scambray & George Kurtz “HACKING EXPOSED Second Edition: Network Security Secret & Solutions”(2001)[23] Data Security and Data Availability in the Administrative Authorityhttp://www.microsoft.com/taiwan/technet/security/datasec.htm[24] David Icove, Karl Seger, William Vonstorch, ”Computer Crime” O’REILLY(1999)[25] 國家資通安全會技術服務中心http://www.ncert.nat.gov.tw/infosec/techservice/faq.htm[26]邱瑞科, 翁頌舜, 楊智勇, 陳盛儀, 詹前隆, 蔡國卿“如何有效達到安全性HL7-從電子商務安全電子資料交換建立的啟示”Medical Informatics Symposium in Taiwan(2001), pp.125-131[27] 陳慶餘, 林仲志 “整合性醫療資訊系統一以個案為中心的健康社區網路”(2000)[28] FIPS Home Pagehttp://www.itl.nist.gov/fipspubs/[29] FIPS SSL CipherSuiteshttp://www.mozilla.org/projects/security/pki/nss/ssl/fips-ssl-ciphersuites.html[30] IPsec Coprocessor (IPsec)http://www.tality.com/ip/ipsec/ipsec-index.html
|