|
[1] 賴溪松、韓亮、張真誠(民八四),「近代密碼學及其應用」,松崗電腦圖書資料股份有限公司。 [2] Department of defense in U.S.A., [1985], "Department of Defense Trusted Computer System Evaluation Criteria", http://www.radium.ncsc.mil/tpep/library/rainbow/5200.28-STD.html. [3] Sandhu, R. and Samarati, P., [1994],"Access Control: Principles and Practice", IEEE Communications Magazine, Vol. 32, No. 9, pp. 40-48. [4] Ferraiolo, D. and Kuhn, R., [1992], "Role-Based Access Controls" ,Proceedings of the 15th National Computer Security Conference, Vol II, pp 554-563. [5] Sandhu, R. and Feinstein, H., [1994], "A three tier architecture for role-based access control", Proc. of 17th NIST-NCSC National Computer Security Conference Baltimore, MD, pp 138-149. [6] Sandhu, R., Coyne, E., Feinstein, H. and Youman, C., [1994],"Role-Based access control: A multi-dimensional view", Proc. of 10th Annual Computer Security Application Conf.,pp 54-62. [7] Ferraiolo, D., Cugini, J. and Kuhn, D., [1995], "Role-Based Access Control (RBAC): Features and Motivations", 11th Annual Computer Security Applications Proceedings. [8] Sandhu, R. and Munawer, Q., [1998], "The RRA97 model for role-based administration of role hierarchies", Proceedings of 13th Annual Computer Security Application Conference. [9] Barkley, J., [1997], "Comparing simple role based access control models and access control lists", Second ACM Workshop on Role-Based Access Control. [10] Sandhu, R., Coyne, E., Feinstein, H. and Younman, C., [1996], "Role-Based Access Control Models", Computer Vol. 29 2, pp 38-47. [11] Lampson, B., [1974], Protection. ACM Oper. Syst. Rev.8, 1, pp. 18-24. [12] Graham, G. and Denning, P., [1972], "Protection: Principles and practice", AFIPS Conf. Procs., pp. 417-429. [13] Diffie, W. and Hellman, M., [1976], "New directions in cryptography," IEEE Transactions on Information Theory, vol. IT-22, pp. 644-654. [14] Rivest, R., Shamir, A., and Adleman, L., [1978], "A method of obtaining Digital Signatures and Public-key Cryptosystems", Communications of the ACM, Vol.21, No.2, pp. 120~126. [15] ElGamal, T., [1985], "A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, " IEEE Trans. On Information Theory, Vol.IT-31, No.4, pp. 469-472. [16] Thompson, M., Johnston, W., Mudumbai, S., Hoo, G., Jackson, K. and Essiari, A., [1999],"Certificate-based Access Control for Widely Distributed Resources", Proceedings of the 8 th USENIX Security Symposium, Washington, D.C., USA. [17] Burr, W., Dodson, D., Nazario, N. and Timothy Polk, W., [1997], "MISPC Minimum Interoperability Specification for PKI Components, Version 1", Output of NIST's Cooperative Research and Development Agreements for Public Key Infrastructure development with AT&T, BBN, Certicom, Cylink, DynCorp, IRE, Motorola, Northern Telecom, Spyrus, and VeriSign, http://csrc.nist.gov/pki/documents/mispcv1.doc. [18] Wang, Y., [1998], "SPKI," Proceedings of the Helsinki University of Technology Seminar on Network Security Authorization and Access Control in Open Network Environment (http://www.tml.hut.fi/Opinnot/Tik-110.501/1998/). [19] Nykanen, T., [2000], "Attribute Certificates in X.509", Tik -110.501 Seminar on Network Security. [20] Rivest, R., [1997], "S-Expressions", http://theory.lcs.mit.edu/~rivest/sexp.txt, draft-rivest-sexp-00.txt. [21] American National Standards Institute, [1986], "Coded Character Set--7-bit American Standard Code for Information Interchange", ANSI X3.4. [22] Freed, N. and Borenstein, N., [1996], "Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies", RFC 2045. [23] CCITT, [1988], Recommendation X.509, The Directory - Authentication Framework, volume VIII of CCITT Blue Book, pp. 48-81. [24] Gutmann, P., [2000], "X.509 Style Guide", http://www.cs.auckland.ac.nz/~pgut001/pubs/x509guide.txt. [25] Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T., [2000], "Simple Public Key Certificate", http://world.std.com/~cme/spki.txt. [26] Ellison, B., Frantz, B., Lampson, B., Rivest, R., Thomas, B. and Ylonen, T., [1998], "SPKI Example", http://world.std.com/~cme/examples.txt. [27] Ellison, C., [1999], "SPKI Requirements", RFC2962. [28] Ellison, C., et al., [1999], "SPKI Certificate Theory", RFC2693. [29] ISO 8879, [1986], Information processing -- Text and office systems -- Standard Generalized Markup Language (SGML). [30] Bray, T., et al., [2000], "Extensible Markup Language (XML) 1.0 (Second Edition)", http://www.w3.org/TR/2000/REC-xml-20001006/, W3C Recommendation. [31] Pjrvi, J., [2000], "XML Encoding of SPKI Certificates", Work in Progress, http://search.ietf.org/internet-drafts/draft-paajarvixml -spki-cert-00.txt. [32] Orri, X., [2002], "SPKI-XML Certificate Structure ". Work in Progress, http://www.potaroo.net/ietf/ids/draft-orri-spki-xml-cert-struc-00.txt.
|