|
Klevinsky, J., Scott, L., & Gupta, A. (2002),網路安全防護手冊(陳峰棋編譯),台北:台灣培生教育出版股份有限公司。
Robert, J. O. (2000),精通COM+程式設計(大新資訊編譯),台北:碁峰資訊。
Tom, A. & Andrew, W. (2003),Inside C#, 2nd Edition,(陳力維編譯),台北:文魁資訊。
周樹林(2006),全球資安市場發展趨勢前瞻, [線上資料] ,來源:http://www.cpro.com.tw/channel/news/content/index.php?news_id=29775 [2008, March 4]。
陳昭珍(2000),XML,Metadata與檔案資料數位化,發表於檔案管理運用研討會,台北:中央研究院。
陳雪華(1998),數位圖書館/博物館中詮釋資料之理論與實作, 圖書館學刊,13(2),37-60。
黃家輝(2007),C#2005網路程式設計,台北:文魁資訊股份有限公司。 維基百科(2007),防火牆,[線上資料],來源: http://zh.wikipedia.org/w/index.php?title=%E9%98%B2%E7%81%AB%E7%89%86&variant=zh-tw [2008, February 13]。 維基百科(2007),元數據,[線上資料],來源: http://zh.wikipedia.org/w/index.php?title=%E5%85%83%E6%95%B0%E6%8D%AE&variant=zh-tw [2008, February 13]。 AI-Shaer, E. S., & Hamed, H. H. (2003). Firewall policy advisor for anomaly discovery and rule editing. School of Computer Science, Telecommunications and Information Systems DePaul University, Chicago, USA.
Chen, R. C., & Yu, S. C. (2002). Developing an XML framework for metadata system. National Chiao-Tung University
Cho, S. R., Koudas, N., & Srivastava, D. (2005). MIX: A meta-data indexing system for XML. Proceedings of the 31st international conference on Very large data bases (pp.1326-1329), VLDB Endowment.
Cremonini, M., Damiani, E., & Sabrina De Capitani di Vimercati, & Samarati, P. (2003). An XML-based approach to combine firewalls and web services security specifications. Proceedings of the 2003 ACM workshop on XML security (pp. 69-78), New York: ACM.
Drew, P., & Ying, J. (1997). A metadata architecture for multi-system interoperability [Online]. Available: http://www.nml.org/resuources/misc/metadata/proceeding/drew/metaarch.htm [2008, January 13].
Goncalves, M. (2001). Firewalls: A complete guide, McGraw-Hill Osborn Media, New York. NY Columbus.
Heasley, J. (2004). Securing XML data. Proceedings of the 1st annual conference on Information security curriculum development (pp. 112-114), New York, ACM.
Holtkamp, M. (2004). The role of XML firewalls for web services [Online]. Available: http://referaat.ewi.utwente.nl/documents/2004_01_B-Enterprise_Application_Integration/2004_01_B_M.Holtkamp-The_role_of_XML_Firewalls_for_Web_services.pdf [2008, January 20]
JOHN, C. S. (2004). Policy-based network management solution for the next generation. San Francisco: Morgan Kaufmann publishers.
Iannella, R., & Waugh, A. (1997). Metadata: Enabling the internet [Online]. Available: http://www.dstc.edu.au/RDU/Reports/CAUSE97/ [2008, January 20]
Loh, Y. S., Yau, W. C., Wong, C. T., & Ho, W. C. (2005). Design and implementation of an XML firewall. Faculty of Engineering Multimedia University Cyberjaya.
Rothenberg, J. (1996). Metadata to support data quality and longevity [Online]. Available: http://www.nml.org/resources/misc/metadata/Rothenberg_paper/ieee.data-quality.html [2008, March 20].
Philips, L. A. (2000). Special edition using XML. U.S.A.: Maxwell Macmillan.
Vuong, N. N., Smith, G. S., & Deng, Y. (2001). Managing Security Policies in a Distributed Environment Using eXtensible Markup Language (XML)*. Proceedings of the 2001 ACM symposium on Applied computing (pp.405-411), New York: ACM.
Verma, C. D. (2004). Policy-based network architecture and algorithms. San Francisco: Morgan Kaufmann publishers.
XML 1.0. (1998) Extensible Markup Language (XML) 1.0, W3C Recommendation, World Wide Web Consortium, [Online] Available: http://www.w3.org/TR/1998/REC-xml-19980210[2008, March 5].
Xue, L., Guan, T., & Feng, B. (2004). XML-based meta-retrieval of networked data sources. Web Intelligence, 2004. (pp.437-440).
|