题名

Enabling Intelligent Knowledge Authority Management for Collaborative Commerce Using Knoledge Keywords

并列篇名

以知識關鍵字結構實現協同商務之智慧型知識管理

DOI

10.29977/JCIIE.200409.0004

作者

侯建良(Jiang-Liang Hou);楊士霆(Shih-Ting Yang)

关键词

關鍵字結構 ; 文件管理 ; 知識管理 ; 文件權限 ; Keyword ontology ; Document management ; Knowledge managment ; Document authority

期刊名称

工業工程學刊

卷期/出版年月

21卷5期(2004 / 09 / 01)

页次

453 - 464

内容语文

英文

中文摘要

在產業協同合作環境下,智慧型文件/知識管理機制將可協助企業有效管理複雜之產業知識、文件與交易資訊。如欲使知識庫或文件庫成為企業經營的重要資產,文件內容與權限管理為箇中一項要務。本論文以包含主要與次要關鍵字等內容之關鍵字結構表達知識文件的重要意涵,並以一套四階段法則有系統地根據關鍵字結構進行知識文件權限推論;文中並以一案例驗證本方法論之可行性。整體而言,此研究成果可提供知識工程師一套適用於協同合作架構之知識內容與權限管理技術。

英文摘要

The intelligent document and knowledge management mechanism is required for efficient management over the sophisticated knowledge, documents and transaction information induced in the business collaboration environment. In order to establish the knowledge or document repository as an enterprise asset, one of the critical issues is the document content and authority management. In this paper, the key contents of a document are represented as the knowledge ontology consisting of major and minor keywords. Since a decision support approach for document authority determination is required to systematically determine knowledge accessibility, this paper proposes a four-phase reasoning approach for document authority management using keyword ontology. Authority of the target knowledge can be automatically determined on the basis of the keyword correlation with the existing documents. A demonstration case is also provided to illustrate feasibility of the approach. Generally, the approach can provide the knowledge engineer or administrator an applicable solution for efficient knowledge/document content and authority management under the collaborative commerce architecture.

主题分类 工程學 > 工程學總論
参考文献
  1. Sun, M. T.,J. L. Hou(2003).The architecture and models for security reasoning in an EDMS.Journal of the Chinese Institute of Industrial Engineers,20(4),305-316.
    連結:
  2. Chang, H. Y.,R. Narayan,S. F. Wu,B. M. Vetter,X. Wang,M. Brown,J. J. Yuill,C. Sargor,F. Jou,F. Gong(1999).DECIDUOUS: Decentralized source identification for network-based intrusions.Proceedings of the Sixth IFIP/IEEE International Symposium on Integrated Network Management,701-714.
  3. Chiu, C. H.(2001).The authority structure problem of computer supported collaborative concept mapping system for elementary students.Proceedings, IEEE International Conference on Advanced Learning Technologies,57-60.
  4. Farkas, J.(1995).Towards classifying full-text using recurrent neural networks.Canadian Conference on Electrical and Computer Engineering,1,511-514.
  5. Fernandez, I. B.,W. V. Subbarao(1994).Encryption based security for ISDN communication: Technique and application.Proceedings of the 1994 IEEE Creative Technology Transfer-A Global Affair,70-72.
  6. Hall, M. J. J.(1996).A risk and control-oriented study of the practices of spreadsheet application developers.Proceedings of the Twenty-Ninth Hawaii International Conference on System Sciences,2,364-373.
  7. Halliden, P. W.(1995).Security for distributed applications.European Convention on Security and Detection,156-160.
  8. Hennig, A.,E. Marongiu,N. Sherkat,R. J. Whitrow(1997).DART-a software architecture for the creation of a distributed asynchronous recognition toolbox.Proceedings of the Fourth International Conference on Document Analysis and Recognition,1,439-443.
  9. Huang, S. J.,C. L. Huang(1996).Improvement of classification accuracy by using enhanced query-based learning neural networks.IEEE International Conference on Neural Networks,1,398-402.
  10. Karunadsa, P. S.,U. D. Annakkage,B. A. MacDonald(2000).Dynamic security control using secure regions derived from a decision tree technique.IEEE Power Engineering Society Summer Meeting,3,1861-1865.
  11. Krulwich, B.(1995).Learning document category descriptions through the extraction of semantically significant phrases.The IJCAI Workshop on Data Engineering for Inductive Learning,1-10.
  12. Lam, W.,K. F. Low(1997).Automatic document classification based on probabilistic reasoning: model and performance analysis.IEEE International Conference on Systems, Man, and Cybernetics, Computational Cybernetics and Simulation,3,2719-2723.
  13. Lee, C. T.,J. W. Harris(1996).Designing a virtual access control configuration protocol for implementation over ISDN and shared-media networks.Proceedings, The 21st IEEE Conference on Local Computer Networks,116-125.
  14. Leedham, G.,W. K. Tan,W. L. Yap(2001).Handwritten country name identification using vector quantisation and hidden Markov model.Proceedings, Sixth International Conference on Document Analysis and Recognition,685-688.
  15. Li, B.,K. Dai,S. Zhang(2001).Virtual certificate authority for virtual enterprises.The Third International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems,222-224.
  16. Lin, Z.,W. X. Shi,L. Wang(2000).A study and analysis on a high intensity public data encryption algorithm.Proceedings of the 3rd World Congress on Intelligent Control and Automation,4,2492-2494.
  17. Loehr, L.(1995).Composing in groups: The concept of authority in cross functional project team work.IEEE Transactions on Professional Communication,38(2),83-94.
  18. Parker, D. B.(1995).Using threats to demonstrate the elements of information security.European Convention on Security and Detection,11-17.
  19. Piattini, M.,J. A. Rodero(1999).Auditing data warehouse security.Proceedings, IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology,255-261.
  20. Sailer, R.(1998).Security services in an open service environment.Proceedings of the 14th Annual Computer Security Applications Conference,223-234.
  21. Schneck, P. A.,K. Schwan(1998).Dynamic authentication for high-performance networked applications.The Sixth International Workshop on Quality of Service,127-136.
  22. Yip, K. W.,T. S. Ng(2000).Partial-encryption technique for intellectual property protection of FPGA-based products.IEEE Transactions on Consumer Electronics,46(1),183-190.
  23. Zhang, Y.,Z. Xiong(2000).A MIS security strategy based on client/server architecture.Proceedings, the Fourth International Conference/Exhibition on High Performance Computing in the Asia-Pacific Region,2,676-677.
被引用次数
  1. Wang, Kung-Jeng,Vijay Shekhar Jha,Hou, T.C.,Gong, Dah-Chuan,Chiu, Chun-Chih(2008).KNOWLEDGE MANAGEMENT CENTRIC INTELLIGENT MANUFACTURING SYSTEMS FOR SEMICONDUCTOR MANUFACTURING SERVICES INDUSTRY.工業工程學刊,25(6),510-518.
  2. 劉任昌、葉馬可、李世欽(2014)。國內期刊國際化之影響:以工業工程學刊為例。臺灣企業績效學刊,8(1),35-55。