參考文獻 |
【1】 “BizTalk Framework 2.0: Document and Message Specification”, http://www.microsoft.com/biztalk/techinfo/framework20.htm
【2】 David Ferraiolo, Richard Kuhn. “Role-Based Access Control”, Proceedings of 15th NIST-NCSC National Computer Security Conference, October 1992.
【3】 Satoshi Hada and Michiharu Kudo, ”XML Access Control Language: Provisional Authorization for XML Documents,” IBM Research, 2001/8.
【4】 Philip Hallam-Baker and Eve Maler, ”Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML),” Organization for the Advancement of Structured Information Standards (OASIS), 2002/4.
【5】 Hondo, M., and et al., ”Securing Web Service”, IBM Systems Journal, 2002/2.
【6】 Rekesh John and Uma Maheswari, “Securing Web Services using XKMS,” California Software Laboratories, 2001/8.
【7】 Michiharu Kudo and Satoshi Hada, “XML Document Security based on Provisional Authorization,” Proceedings of the 7th ACM Conference, 2000.
【8】 Netegrity, “S2ML: The XML Standard for Describing and Sharing Security Services on the Internet,” Netegrity, Inc., 2000.
【9】 Ravi Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman. “Role-Based Access Control Model”, IEEE Computer, 29(2)., pp.38-47, February 1996.
【10】 Ravi Sandhu, David Ferraiolo and Richard Kuhn. “The NIST Model for Role-Based Access Control:Towards A Unified Standard”, Proceedings of the fifth ACM workshop on Role-based access control, July 2000.
【11】 RosettaNet Taiwan, http://www.rosettanetaiwan.org.tw/
【12】 Pendyala Shim and Gao Sundaram,” Business-to-business e-commerce frameworks”, IEEE Computer , Volume: 33 Issue: 10 , Oct. 2000, Page(s): 40 –47.
【13】 Signature Syntax and Processing, http://www.w3.org/TR/xmldsig-core/.
【14】 Ed Simon and Paul Madsen, et al., “An Introduction to XML Digital. Signatures,” XML.com, http://www.xml.com/pub/a/2001/08/08/xmldsig.html.
【15】 Simple Object Access Protocol(SOAP), http://www.w3.org/TR/SOAP.
【16】 Sun Microsystems, ”How to Implement Network Identity”, Sun Microsystems, Inc., 2002, http://www.sun.com/sunone/identity.
【17】 Sylvia Osborn, Ravi Sandhu, and Qamar Munawer.“Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies”, ACM Transactions on Information and System Security, Vol. 3, No. 2, Pp.85-106, May 2000.
【18】 VeriSign, ”XML Key Management Specification Developer’s Guide,” VeriSign, Inc., 2002/2.
【19】 VeriSign, “XML Key Management White Paper,” VeriSign, Inc., 2000.
【20】 W3C, http://www.w3c.org.
【21】 XML Encryption Syntax and Processing, http://www.w3.org/TR/xmlenc-core/.
【22】 XML Key Management Specification, http://www.w3.org/TR/xkms2.
【23】 Kerberos認證, http://www.rfjh.tpc.edu.tw/html/teacher/html/keberos.htm
【24】 台灣ebXML推廣中心, http://www.ebxml.org.tw/
【25】 李肇林、林耀仁,「ebXML可行性研究與軟體工具發展建議計畫」,國立台灣大學資訊工程學系,2000。
【26】 孫三才,”整合開發運用HailStorm-實作 Passport Single Sign-In及 Alert Service 介紹”,Microsoft Visual Studio .NET研討會,2000。
【27】 樊國楨,陳祥輝,蔡敦仁,”資料庫濫用軌跡塑模,”「政府機關資訊通報」,VOL.160 |