[1] David Ferraiolo, Ravi Sandhu, Serban Gavrila, Richard Kuhn and Ramaswamy Chandramouli. “A Proposed Standard for Role -Based Access Control”, ACM Transactions on Information and System Security, Volume 4, Number 3, August 2001.
[2] David Ferraiolo, Richard Kuhn. “Role-Based Access Control”, In Proceedings of 15th NIST-NCSC National Computer Security Conference, October 1992.
[3] FSTC’s eCheck program , “eCheck Introduction” . Available at http://www.echeck.org/overview/comparison/paper.html.
[4] FSTC’s eCheck program , “Electronic Checks: The Best of Both Worlds”,Available at http://www.echeck.org/library/wp/bestofboth.html.
[5] Ian S. Graham & Liam Quin, “XML Specification Guide”, WILEY, pp.57-65, 1999.
[6] Ramaswamy Chandramouli, “Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks”, Proceedings of the fifth ACM workshop on Role-based access control, July 2000.
[7] Ravi Sandhu, David Ferraiolo and Richard Kuhn. “The NIST Model for Role-Based Access Control:Towards A Unified Standard”, Proceedings of the fifth ACM workshop on Role-based access control, July 2000.
[8] Ravi Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman. “Role-Based Access Control Model”, IEEE Computer, 29(2)., pp.38-47, February 1996.
[9] SOFTWARE AG The XML Company, http://www.softwareag.com/tamino/
[10] Sylvia Osborn.“Mandatory Access Control and Role-Based Access Control Revisited”,Proceedings of the second ACM workshop on Role-based access control, pp.33,November 1997.
[11] Sylvia Osborn, Ravi Sandhu, and Qamar Munawer.“Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies”, ACM Transactions on Information and System Security, Vol. 3, No. 2,pp.85-106, May 2000.
[12] T. Bray, J. Paoli, C. M. Sperberg, E. Maler. “Extensible Markup Language 1.0 (Second Edition)”, W3C Recommendation 6, October 2000.
[13] World Wide Web Consortium, “Extensible Markup Language (XML) 1.0 Second Edition”, W3C Recommendation 6, October 2000. Available at http://www.w3.org/TR/REC-xml.
[14] William J. Pardi原著,官欣怡編譯,”實戰XML第二版”,微軟出版社,2000年6月,第二版。
[15] 洪敏翔,“使用XML設計執行權管制資訊流”,國立交通大學資訊管理研究所,碩士論文,2001年6月。[16] Brett McLaughlin著,陳建勳譯,”JAVA與XML”,聯寶文化事業有限公司,2001年2月,初版。
[17] XML台灣資訊網,http://www.xml.org.tw
[18] Kalakota & Whinston著,陳雪美譯,“電子商務管理概論”,跨世紀電子商務出版社,1999年6月。
[19] 林真真,(民77年),”電子銀行”,第二版。
[20] 曾國烈,”我國電子金融業務發展現況及建議 ”,經濟情勢暨評論季刊,第六卷第一期,2000年6月。[21] 財政部金融局,”金融機構辦理電子銀行業務安全控管作業基準”,2000年。
[22] 聯合信用卡處理中心,”電子商務先導專案”。2002 年 2 月,http://www.nccc.com.tw/plan/set.htm.
[23] 臺灣網路認證公司,”網路銀行認證作業手冊-Non-SET篇”,2000 年 4月。