|
[1] ADO.NET 簡介6-2:ADO.NET 資料庫存取技術,http://epaper.gotop.com.tw/pdf/acl018900.pdf [2] CaryHsu - 學無止盡 : 不同資料庫的比較SQL Server vs Oracle and MySQL, http://caryhsu.blogspot.com/2011/06/sql-server-vs-oracle-and-mysql.html [3] ADO.NET - 维基百科, https://zh.wikipedia.org/wiki/ADO.NET [4] 全快閃儲存能如何加快您的 Oracle 資料庫部署 https://www.purestorage.com/tw/knowledge/what-is-oracle-database.html [5] 小鳥雲- SQL Server、MySQL、Oracle三種資料庫的優缺點比較, https://kknews.cc/code/perb6vp.html [6] John Barkley, Konstantin Beznosov and Jinny Uppal(1999), “Supporting Relationship in Access Control Using Role Based Access Control” in Proceedings of ACM Role-Based Access Control Workshop, Fairfax, Virginia, USA, pp. 55-65. [7] Honghai Shen and Prasun Dewan(1992), “Access Control for Collaborative Environments,” Proceedings of the ACM Conference on Computer Supported Cooperative Work, pp.51-58. [8] Ravi S. Sandhu and Pierangela Samarati(1994), “Access Control: Principles and Practice”, IEEE Communication Magazine, Vol.32, No. 9, pp. 40-48. [9] Roshan K. Thomas and Ravi Sandhu, (1997), “Task-based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management”, Proceesings of the IFIP Workshop on Database Security, Lake Tahoe,California. [10] John Barkley, Konstantin Beznosov and Jinny Uppal(1999), “Supporting Relationship in Access Control Using Role Based Access Control” in Proceedings of ACM Role-Based Access Control Workshop, Fairfax, Virginia, USA, pp. 55-65. [11] David F. Ferraiolo and D. Richard Kuhn (1992), “Role Based Access Control” , pp. 2 – 10. [12] David F. Ferraiolo, J. Cugini and D. Richard Kuhn(1995), “Role Based Access Control:Features and Motivations,” In 11th Annual Computer Security Applications Conference, pp.241-248. [13] Ravi Sandhu, Edward J. Coyne, Hal L. Feinstein and Charles E. Youman(1996), “Role-Based Access Control Models, ” IEEE Computer, Volume 29, Number 2, February, pp.38-47. [14] Ravi Sandhu, Edward J. Coyne, Hal L. Feinstein and Charles E. Youman(1994),“Role-Based Access Control: A Multi-Dimensional View, ” In Proceedings of 10th Annual Computer Security Application Conference, pp.54-62. [15] Ravi Sandhu, David F. Ferraiolo and D. Richard Kuhn(2000), “The NIST Model for Role-Based Access Control: Towards a Unified Standard, ” In Proceedings of the 5th ACM Workshop on Role-Based Access Control, pp.47-63. [16] David F. Ferraiolo, John F. Barkley and D. Richard Kuhn(1999), “A Role Based Access Control Model and Reference Implementation within a Coporate Intranet, ” ACM Transactions on Information and System Security, Volume 1, Number 2, pp.34-64. [17] Ravi Sandhu, Edward J. Coyne, Hal L. Feinstein and Charles E. Youman(1996), “Role-Based Access Control Models, ” IEEE Computer, Volume 29, Number 2, February, pp.38-47. [18] 劉敦仁、吳美玉和黃景彰(2001) ,「以工作為基礎的存取控制之權責區分授權準則設計」,資訊管理學報,第八卷,第一期,pp.61-80. [19] Richard T. Simon and Mary Ellen Zurko(1997), “Separation of Duty in Role-BasedEnvironments, ” 10th Computer Security Foundations orkshop, pp.183-194. [20] Fang Chen and Ravi S. Sandhu(1996), ”Constraints for Role-Based Access Control, ” Proceedings of ACM Role-Based Access Control Workshop, pp.39-46. [21] Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein and Charles E. Youman(1994),”Role-Based Access Control: A Multi-Dimensional View, ” In Proceedings of 10th Annual Computer Security Application Conference, pp.54-62.
|