英文摘要
|
Traditionally, document authentication or knowledge validation is performed in a paper-based format and consequently results in several shortcomings such as inefficient document flow and authentication status tracking. Based on the current internet technology, this paper presents an internet-based solution for document authentication and knowledge validation. In the proposed solution, the document authentication process can be determined according to the document contents and authority. The corresponding framework, data definition and process model are explored and a prototype system is also implemented to demonstrate the online authentication and status tracking for the credit card business. According to case study, it is ensured that application of the proposed system significantly enhances the efficiency of document accessing, authentication, and status tracking. Moreover, incorporated with the mechanism of security control, different auditing levels can be assigned to ensure the higher system security. Ascribing to the popularity and user-friendly operation of the internet technology, the proposed models and system can be effectively integrated with the existing internet-based solutions adopted by the modern enterprises to efficiently reply and satisfy the miscellaneous customer requests.
|
参考文献
|
-
孫銘聰、侯建良(2003)。建構電子化知識文件之權限指派架構與模式。工業工程學刊,20(4),305-316。
連結:
-
Anderson, R.,Lee, J. H.(2000).Jikzi-a new framework for security policy, trusted publishing and electronic commerce.Computer Communications,23(17),1621-1626.
-
Ando, K.,Yamasaki, T.,Shishibori, M.,Aoe, J.(2001).2001 IEEE International Conference on Systems, Man, and Cybernetics.Tucson, AZ, USA:
-
Anthes, G.(1998).Security tool blocks document misuse.Computers and Security,17(5),409-410.
-
Atif, Y.(2001).Proceedings of the Global Telecommunications Conference.TX, USA:San Antonio.
-
Bertino, E.,Ferrari, E.(2002).Secure and selective dissemination of XML documents.ACM Transactions on Information and System Security,5(3),290-331.
-
Brzakovic, D.,Vujovic N.(1996).Authentication of random patterns by finding a match in an image database.Image and Vision Computing,14(7),485-499.
-
Chen, D.,Sun, C.(2001).Proceedings of the 8th International Conference on Parallel and Distributed Systems.Kyongju City, South Korea:
-
DeSimon, A.(1989).Proceedings of the 17th Annual ACM SIGUCCS Conference on User Services.Maryland, USA:
-
Devanbu, P.,Gertz, M.,Kwong, A.,Martel, C.,Nuckolls, G.,Stubblebine, S. G.(2001).Proceedings of the 8th ACM Conference on Computer and Communications Security.Philadelphia, Pennsylvania, USA:
-
Garg, G.,Sharma, P. K.,Chaudhury, S.(2001).Image based document authentication using DCT.Pattern Recognition Letters,22(7),725-729.
-
Ho, K. S.,Leong, H. V.,Lam, W.(2001).Proceedings of the 3rd International Symposium on Distributed Objects and Applications.Rome, Italy:
-
Israel, J. E.,Linden, T. A.(1983).Authentication in office system internetworks.ACM Transactions on Information Systems,1(3),193-210.
-
Jurečič, M.,Bunz, H.(1994).Proceedings of the 1st ACM Conference on Computer and Communications Security.Virginia, USA:
-
Kirstein, P. T.,Sameshima, Y.(1996).Secure document interchange: a secure user agent.Computer Networks and ISDN Systems,28(4),513-523.
-
Kwong, A.,Gertz, M.(2001).Proceedings of the Second International Conference on Web Information Systems Engineering.Davis, CA, USA:
-
Lee, J. Y.(2001).IEE Proceedings-Computers and Digital Techniques.Tainan, Taiwan:
-
Narendran, B.,angarajan, S.,Yajnik, S.(1997).Proceedings of the 16th Symposium on Reliable Distributed Systems.Durham, NC, USA:
-
Russell, S.(1993).Proceedings of the Ninth Annual Conference on Computer Security Applications.FL, USA:Orlando.
-
Zhao, J. L.(2002).Proceedings of the 35th Annual Hawaii International Conference on System Sciences.Tucson, AZ, USA:
-
施孟隆、游清芳、李佳珍(1999)。Logit模式應用於信用卡信用風險審核系統之研究-以國內某銀行信用卡中心為例。金融財務,4,85-104。
-
陳玉枝(1992)。護理用品審核制度之建立與評價。榮總護理,9(3),301-308。
-
陳守金(1992)。內部審核與政府審計之探討。主計月報,74(2),23-25。
-
陳啟光、林大舜、張啟昌(2003)。建構資訊推動計畫風險管理模式之研究-以電子公文計畫推動為例。管理與系統,3(3),303-328。
-
曾麗雯(1994)。主從運作架構於捷運技術文件流程管控系統之應用。捷運技術,11,42-53。
-
廖素華(1993)。中美兩國醫療保險費用申報制度與費用審核制度比較。醫院,2(5),259-265。
|