|
[1]維京百科雲端運算 http://zh.wikipedia.org/zhtw/%E9%9B%B2%E7%AB%AF%E9%81%8B%E7%AE%97 [2]Google 應用入口網雲端服務的型態 http://www.maximol.com.tw/cloudcomputing [3]雲端運算產業發展方案經濟部, 2010 年4 月. [4]財團法人資訊工業策進會產業情報室(MIC), 雲端運算應用趨勢與我國商機研究, 2009 年10 月. [5]雲端策略, 陳瀅, 天下出版2010 年6 月. [6]財團法人資訊工業策進會產業情報室(MIC) 相元翰(雲端服務資訊安全評估), 2010/09/08. [7]10 Security Concerns for Cloud Computing Global Knowledge Training LLC, 2010 march. [8]Top Threats to Cloud Computing V1.0 cloud security alliance , 2010march http://www.cloudsecurityalliance.org/topthreats__ [9]Waegemann C. P.Spotlight on Healthcare: Document Imaging in Healthcare: One Piece of the Puzzle in Creating Electronic patient Record Systems.Inform,14(1), pp.8-11,2000. [10]Laws & Regulations Database of The Republic of China: Personal Information ProtectionAct, http://law.moj.gov.tw/ENG/LawClass/LawAll.aspx?PCode=I0050021. [11]The British Standards Institution: BRITISH STANDARDBS10012:2009Data protection –Specification for a personal information management system, http://img.21food.cn/img/biaozhun/20100729/187/11294278.pdf. [12]Arne Roock. Applying the PDCA Cycle in knowledge work,2012. http://p-a-m.org/2012/10/applying-the-pdca-cycle-in-knowledge-work [13]Gong Jhen.System Analysis and Design,Taiwan: Kao-Une Press, 2010. [14]Chun-Huang Yan. Database System ,Taiwan : GOTOP Press, 2013. [15]SatzingerJ. W. , Jackson R. B. &BurdS. D. , Systems Analysis & Design in a Changing World., Sixth Edition, Boston: Course TechnologyP. [16]Aggarwal, G., M. Bawa, and P. Ganesan, “Two can keep a secret: A distributed architecture for secure database services,” in Proceedings of Conference on Innovative Data Systems Research, 2005. https://database.cs.wisc.edu/cidr/cidr2005/papers/P16.pdf [17]Aggarwal, G., T. Feder, and K. Kenthapadi, “Anonymizing tables,” in Proceedings of International Conference on Database Theory, pp. 246-258, 2005. [18]Bayardo, R., and R. Agrawal, “Data Privacy through Optimal k-Anonymiztion,” in Proceedings of IEEE International Conference on Data Engineering, pp. 217-228, 2005. [19]Ciriani, V., S. Vimercati, S. Foresti, and S. Jajodia, “Combining fragmentation and encryption to protect privacy in data storage,” journal of ACM Transactions on Information and System Security, vol. 13, no. 3, pp. 1-33, 2010. [20]Ciriani, V., S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, “Fragmentation and Encryption to Enforce Privacy in Data Storage,” in Proceedings of European Symposium on Research in Computer Security, pp. 171-186, 2007. [21]Evdokimov, S., M. Fischmann, O. Günther, “Provable security for outsourcing database operations,” in Proceedings of IEEE International Conference on Data Engineering, pp. 117, 2006. [22]Fung, B. C. M., K. Wang, R. Chen, P. S. Yu, “Privacy-Preserving Data Publishing: A Survey of Recent Developments,” Journal of ACM Computing Surveys, vol. 42, no. 4, pp. 14:1-53, 2010. [23]Hacigumus, H., B. Iyer, and S. Mehrotra, “Providing database as a service,” in Proceedings of IEEE International Conference on Data Engineering, pp. 29-38, 2002. [24]Imran, S., I. Hyder, “Security Issues in Databases,” in Proceedings of IEEE International Conference on Future Information Technology and Management Engineering, pp. 541-545, 2009. [25]Mei, A., L. V. Mancini, S. Jajodia, “Secure dynamic fragment and replica allocation in large-scale distributed file systems,” Journal of IEEE Transactions on Parallel and Distributed Systems, vol. 14, no. 9, pp. 885-896, 2003. [26]Millen, J. K., T. F. Lunt, “Security for object-oriented database systems,” in Proceedings of IEEE Symposium on Security and Privacy, pp. 260-272, 1992. [27]Samarati, P., and S. Vimercati, “Data protection in outsourcing scenarios: Issues and directions,” in Proceedings of ACM Symposium on Information, Computer and Communications Security, pp. 1-14, 2010. [28]Sayi, T. J. V. R. K. M. K., R. K. N. S. Krishna, R. Mukkamala, and P. K. Baruah, “Preserving privacy of cloud data: A cluster-based approach,” in Proceedings of IEEE International Conference on Information Reuse and Integration, pp. 215-223, 2012. [29]Tassa, T. and E. Gudes, “Secure distributed computation of anonymized views of shared databases,” Journal of ACM Transactions on Database Systems, vol. 37, no. 2, pp. 1-43, 2012. [30]Yu, Y., “Privacy Protection in Secure Database Service,” in Proceedings of IEEE International Conference on Networks Security, Wireless Communications and Trusted Computing, pp. 218-222, 2010. [31]Zhang, X., C. Liu, S. Nepal, J. Chen, “An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud,” journal of Computer and System Sciences, vol. 79, no. 5, pp. 542-555, 2013. [32]Zubi, Z. S., “On distributed database security aspects,” in Proceedings of IEEE International Conference on Multimedia Computing and Systems, pp. 231-235, 2009. [33]Viega, J., “Cloud Computing and the Common Man,” Computers, Vol. 42, No. 8, pp. 106-108, 2009. [34]Sandhu, R., Coyne, E.J., Feinstein, H.L., and Youman, C.E., “Role-based access control models,” Computer, Vol. 29, No. 2, pp. 38-47, 1996. [35]Ferraiolo, D.F. and Kuhn, D.R., “Role-Based Access Control,” National Computer Security Conference, 15th ed., Baltimore, 1992. [36]Lan, Z., Vijay, V., and Michael, H., “Enforcing Role-Based Access Control for Secure Data Storage in the Cloud,” Computers Journal, Vol. 54, No. 10, pp. 1675-1687, 2011. [37]Hwang, K. and Li, D., “Trusted Cloud Computing with Secure Resources and Data Coloring,” IEEE Internet Computing, Vol. 14, No. 5, pp. 14-22, 2010. [38]http://ithelp.ithome.com.tw/question/10053820. [39]Google android device, http://zh.wikipedia.org/wiki/Galaxy_Nexus. [40]iPad2, http://zh.wikipedia.org/wiki/IPad_2.
|