參考文獻 |
[1] “行政院及所屬各機關行動化服務發展作業原則.” [Online]. Available: http://www.rootlaw.com.tw/LawContent.aspx?LawID=A040030001023000-1010103. [Accessed: 03-Jun-2015].
[2] “Technology Research | Gartner Inc.” [Online]. Available: http://www.gartner.com/technology/home.jsp. [Accessed: 29-Mar-2015].
[3] K. W. Miller, I. Springfield, J. Voas, I. Fellow, G. F. Hurlburt, and C. Index, “BYOD : Security Considerations,” IT Prof., vol. 14, no. 5, pp. 53–55, 2012.
[4] “The Financial Impact of BYOD.” [Online]. Available: http://www.cisco.com/web/about/ac79/docs/re/byod/BYOD-Economics_Presentation.pdf.
[5] “NTT Communications Global Website.” [Online]. Available: http://www.ntt.com/index-e.html. [Accessed: 28-May-2015].
[6] “Apple - iOS 8.” [Online]. Available: https://www.apple.com/tw/ios/. [Accessed: 28-Mar-2015].
[7] “Android Developers.” [Online]. Available: http://developer.android.com/index.html. [Accessed: 28-Mar-2015].
[8] “Windows Phone.” [Online]. Available: https://www.windowsphone.com/zh-tw. [Accessed: 04-Jun-2015].
[9] “Endpoint, Cloud, Mobile & Virtual Security Solutions | Symantec.” [Online]. Available: https://www.symantec.com/index.jsp. [Accessed: 28-May-2015].
[10] “Check Point Offers Network, Firewall & Data Security Solutions | Check Point Software.” [Online]. Available: http://www.checkpoint.com/. [Accessed: 03-Jun-2015].
[11] Check Point Software Technologies Ltd., “The impact of mobile devices on information security,” 2013. [Online]. Available: http://www.checkpoint.com/downloads/products/check-point-mobile-security-survey-report2013.pdf.
[12] A. Armando, F. B. Kessler, G. Costa, and L. Verderame, “Enabling BYOD through Secure Meta-Market Categories and Subject Descriptors,” pp. 219–230, 2014.
[13] “Google Play.” [Online]. Available: https://play.google.com/store. [Accessed: 26-Mar-2015].
[14] “Oxford Dictionaries.” [Online]. Available: http://www.oxfordlearnersdictionaries.com/.
[15] N. L. Johnson, M. Cross, and T. Piltzecker, Security+ Study Guide and DVD Training System. 2002.
[16] E. Maiwald, Fundamentals of Network Security. McGraw-Hill, Inc. New York, NY, USA, 2004.
[17] P.-C. H. and T.-C. C. Chang, J Morris, “Securing BYOD,” IT Prof., vol. 16, no. 5, pp. 9–11, 2014.
[18] M. Ongtang, S. Mclaughlin, W. Enck, and P. Mcdaniel, “Semantically rich application-centric security in Android,” Secur. Commun. Networks, vol. 5, pp. 658–673, 2012.
[19] M. Nauman, S. Khan, and X. Zhang, “Apex : Extending Android Permission Model and Enforcement with User-defined Runtime Constraints,” ASIACCS ’10 Proc. 5th ACM Symp. Information, Comput. Commun. Secur., pp. 328–332, 2010.
[20] R. Xu, H. Saïdi, R. Anderson, and H. Saıdi, “Aurasium: Practical Policy Enforcement for Android Applications,” Proc. 21st USENIX Conf. …, p. 27, 2012.
[21] “Airwatch-MDM.” [Online]. Available: http://www.air-watch.com/zh-hant/solutions/mobile-device-management. [Accessed: 26-Mar-2015].
[22] “MobileIron-MAM.” [Online]. Available: https://www.mobileiron.com/en/solutions/mobile-application-management-mam. [Accessed: 26-Mar-2015].
[23] S. G. Ocano, B. Ramamurthy, and Y. Wang, “Remote Mobile Screen ( RMS ): an approach for secure BYOD environments,” pp. 52–56, 2015.
[24] “Samsung KNOX.” [Online]. Available: http://www.samsung.com/global/business/mobile/platform/mobile-platform/knox/. [Accessed: 26-Mar-2015].
[25] S. Chung, S. Chung, T. Escrig, Y. Bai, and B. Endicott-Popovsky, “2TAC: Distributed access control architecture for ‘bring your own device’ security,” Proc. 2012 ASE Int. Conf. Biomed. Comput. BioMedCom 2012, no. SocialInformatics, pp. 123–126, 2013.
[26] I. Aktug and K. Naliuka, “ConSpec – a formal language for policy Security Enforcement in the Application Lifecycle,” Electron. Notes Theor. Comput. Sci., pp. 1–13, 2007.
[27] “Bring Your Own Device | The White House.” [Online]. Available: https://www.whitehouse.gov/digitalgov/bring-your-own-device. [Accessed: 27-Mar-2015].
[28] Y. Wang, J. Wei, and K. Vangury, “Bring Your Own Device Security Issues and Challenges,” Consum. Commun. Netw. Conf., pp. 276–281, 2014.
[29] 張至安, “Android應用程式靜態API分析以及安裝建議系統,” 國立臺灣大學,碩士論文, 2014.
[30] “Apktool - A tool for reverse engineering Android apk files.” [Online]. Available: http://ibotpeaches.github.io/Apktool/. [Accessed: 24-Jun-2015].
[31] A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, “Android permissions demystified,” Proc. 18th ACM Conf. Comput. Commun. Secur. - CCS ’11, p. 627, 2011.
[32] K. Wain, Y. Au, Y. F. Zhou, Z. Huang, and D. Lie, “PScout : Analyzing the Android Permission Specification,” CCS ’12 Proc. 2012 ACM Conf. Comput. Commun. Secur., pp. 217–228, 2012.
[33] A. Armando, G. Costa, L. Verderame, and A. Merlo, “Securing the ‘Bring your own device’ paradigm,” Computer (Long. Beach. Calif)., vol. 47, pp. 48–56, 2014.
[34] 郭宏毅, “BYOD下兼顧公司安全與員工隱私保護之資訊流追蹤機制研究,” 國立中央大學,碩士論文, 2015.
[35] “Leading Enterprise Java Web Framework | ZK.” [Online]. Available: http://www.zkoss.org/. [Accessed: 21-May-2015].
[36] “ZK - ZK Developer’s Reference/MVVM - Documentation.” [Online]. Available: http://books.zkoss.org/wiki/ZK_Developer’s_Reference/MVVM. [Accessed: 21-May-2015].
[37] “MySQL: The world’s most popular open source database.” [Online]. Available: http://www.mysql.com/. [Accessed: 21-May-2015].
[38] “Manifest.permission | Android Developers.” [Online]. Available: http://developer.android.com/reference/android/Manifest.permission.html. [Accessed: 27-Mar-2015].
[39] “XStream.” [Online]. Available: http://www.xml.com/pub/a/2004/08/18/xstream.html. [Accessed: 11-Jun-2015].
[40] “Cloud Messaging | Google Developers.” [Online]. Available: https://developers.google.com/cloud-messaging/?hl=zh-TW. [Accessed: 15-Jun-2015].
[41] “Eclipse - The Eclipse Foundation open source community website.” [Online]. Available: https://eclipse.org/. [Accessed: 11-Jun-2015].
[42] “Installing the Android SDK | Android Developers.” [Online]. Available: https://developer.android.com/sdk/installing/index.html. [Accessed: 11-Jun-2015].
[43] “Android Developer Tools | Android Developers.” [Online]. Available: http://developer.android.com/tools/help/adt.html. [Accessed: 11-Jun-2015].
[44] “PackageInstaller | Android Developers.” [Online]. Available: https://developer.android.com/reference/android/content/pm/PackageInstaller.html. [Accessed: 10-Jul-2015].
[45] “The Apache HTTP Server Project.” [Online]. Available: http://httpd.apache.org/. [Accessed: 11-Jun-2015].
[46] “android-market-api - Android Market for all developers.” [Online]. Available: https://code.google.com/p/android-market-api/. [Accessed: 23-May-2015].
[47] “Processes and Threads | Android Developers.” [Online]. Available: http://developer.android.com/guide/components/processes-and-threads.html. [Accessed: 04-Jun-2015].
[48] “Java Servlet Technology - The Java EE 6 Tutorial.” [Online]. Available: http://docs.oracle.com/javaee/6/tutorial/doc/bnafd.html. [Accessed: 11-Jun-2015].
[49] “SharedPreferences | Android Developers.” [Online]. Available: http://developer.android.com/reference/android/content/SharedPreferences.html. [Accessed: 11-Jun-2015].
[50] “Intents and Intent Filters | Android Developers.” [Online]. Available: http://developer.android.com/guide/components/intents-filters.html. [Accessed: 11-Jun-2015].
[51] “AlarmManager | Android Developers.” [Online]. Available: http://developer.android.com/reference/android/app/AlarmManager.html. [Accessed: 11-Jun-2015].
|