期刊文献+

大数据安全与隐私保护态势 被引量:8

Big Data Security and Privacy Protection
下载PDF
导出
摘要 指出安全与隐私防护是大数据面临的两个重要的问题。认为大数据在引入新的安全问题和挑战的同时,也为信息安全领域带来了新的发展契机,即基于大数据的信息安全相关技术可以反过来用于大数据的安全和隐私保护。目前,基于大数据的数据真实性分析被广泛认为是最为有效的方法。认为信息安全企业未来的发展前景为:以底层大数据服务为基础,各个企业之间组成相互依赖、相互支撑的信息安全服务体系,通过构建安全大数据,逐步形成大数据安全生态环境。 Security and privacy protection are two important issues with big data. On the one hand, big data creates new security problems and challenges. On the other hand, it creates new opportunities for the development of information security. Bigdata-based information security technologies can be used for security and privacy protection. Big-data-based data authenticity analysis is widely considered to be the most effective method. Development prospects for information security are: the data underlying service is the foundation, and enterprises between each other can form the system in which they have mutual dependence, mutual support of information security service. By building up the security big data system, a good environment for information security industry is formed.
作者 范渊
出处 《中兴通讯技术》 2016年第2期53-56,共4页 ZTE Technology Journal
关键词 大数据 安全 隐私 认证 big data security privacy authentication
  • 相关文献

参考文献3

二级参考文献18

  • 1姜传贤,孙星明,易叶青,杨恒伏.基于JADE算法的数据库公开水印算法的研究[J].系统仿真学报,2006,18(7):1781-1784. 被引量:9
  • 2Greg Linden,Brent Smith,Jeremy York.Amazon.com recommendations: item-to-item collaborative filtering[].IEEE Internet Computing.2003
  • 3.William Prosser Privacy[].California Law Review.1960
  • 4Halvorson,George C.Health care reform nowl;A prescription for change[]..2007
  • 5J.J.Abrams,Bryan Burk.Person of lnterest. http://www.cbs com/shows/ person_of_interest . 2011
  • 6Duhigg,Charles.How companies learn your secrets[].The New York Times.2012
  • 7X. Feng,J. C. Zhao,K. Xu.Link prediction in complex networks: a clustering perspective[J].The European Physical Journal B.2012(1)
  • 8Vaidya, Jaideep,Atluri, Vijayalakshmi,Warner, Janice,Guo, Qi.Role Engineering via Prioritized Subset Enumeration[J].IEEE Transactions on Dependable and Secure Computing.2010(3)
  • 9Linyuan Lü,Tao Zhou.Link prediction in weighted networks: The role of weak ties[J].EPL (Europhysics Letters).2010(1)
  • 10Huiping Guo,Yingjiu Li,Anyi Liu,Sushil Jajodia.A fragile watermarking scheme for detecting malicious modifications of database relations[J].Information Sciences.2005(10)

共引文献732

同被引文献39

  • 1杨柳,危韧勇,陈传波.一种扩展型基于角色权限管理模型(E-RBAC)的研究[J].计算机工程与科学,2006,28(9):126-128. 被引量:38
  • 2[美]杰夫·贾维斯.公开:新媒体时代的网络正能量[M].北京:中华工商联合出版社,2013.
  • 3Pas J V D,Bussel G J V.‘Privacy Lost-and Found?’The information Value Chain as a Model to Meet Citizens’Concerns[J].Electronic Journal of Information Systems Evaluation,2015,18(2):185-195.
  • 4Cunningham S J,Bainbridge D.A Search Engine Log Analysis of Music-Related Web Searching[J].Advances in Intelligent Information and Database Systems,2010,283:79-88.
  • 5Barnard-Wills D,Ashenden D.Playing with Privacy:Games for Education and Communication in the Politics of Online Privacy[J].Political Studies,2013,63(1):142-160.
  • 6Dawes S S.Governance in the Information Age:a Research Framework for an Uncertain Future[C].Montreal:Internationa Conference on Digital Government Research,2008:290-297.
  • 7Lawrence Lessig.Code:Version 2.0[M].New York:Basic Books,2006:8.
  • 8Koops B J.Review of the book Privacyrecht is code[J].Computerrecht,2011,(2):99-101.
  • 9Heerde H J W V.Privacy-aware Data Management by Means of Data Degradation-Making Private Data Less Sensitive Over Time[J].Bibliog,2010,(6):66.
  • 10Coles-Kemp L,Kani-Zabihi E.On-line Privacy and Consent:A Dialogue,Not a Monologue[C]//Proceedings of the Workshop on New Security Paradigms.New York:ACM,2010:95-106.

引证文献8

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部