[1] Tankard C. Big data security[J]. Network security, 2012, 2012(7): 5-8
[2] 郭三强, 郭燕锦. 大数据环境下的数据安全研究[J]. 科技广场, 2013 (2): 28-31
[3] Salleh K A, Janczewski L. Technological, organizational and environmental security and privacy issues of big data: A literature review[J]. Procedia Computer Science, 2016, 100: 19-28
[4] Hota C, Upadhyaya S, Al-Karaki J N. Advances in secure knowledge management in the big data era[J]. Information Systems Frontiers, 2015, 17(5): 983-986
[5] Demchenko Y, Laat C D, Wibisono A, et al. Addressing Big Data challenges for Scientific Data Infrastructure[C]// Proc of IEEE Int Conf on Cloud Computing Technology & Science.Piscataway,NJ:IEEE, 2013
[6] Chen Y, Chen H, Gorkhali A, et al. Big data analytics and big data science: a survey[J]. Journal of Management Analytics, 2016, 3(1): 1-42
[7] Klievink B, Romijn B J, Cunningham S, et al. Big data in the public sector: Uncertainties and readiness[J]. Information Systems Frontiers, 2017, 19(2): 267-283
[8] Chen C L P, Zhang C Y. Data-intensive applications, challenges, techniques and technologies: A survey on big data[J]. Information Sciences, 2014, 275: 314-347
[9] 何全胜, 姚国祥. 网络安全需求分析及安全策略研究[J]. 计算机工程, 2000, 26(6): 56-58
[10] Cuzzocrea A . Privacy and security of big data: Current challenges and future research perspectives[C]// New York:ACM, 2014
[11] Lu R, Zhu H, Liu X, et al. Toward efficient and privacy-preserving computing in big data era[J]. IEEE Network, 2014, 28(4): 46-50
[12] Suthaharan S. Big data classification: Problems and challenges in network intrusion prediction with machine learning[J]. ACM SIGMETRICS Performance Evaluation Review, 2014, 41(4): 70-73
[13] Valdez-Juárez L E, García-Pérez de Lema D, Maldonado-Guzmán G. Management of knowledge, innovation and performance in SMEs[J]. Interdisciplinary Journal of Information, Knowledge, and Management, 2016, 11: 141-176
[14] Klievink B , Neuroni A , Fraefel M , et al. Digital Strategies in Action: A comparative analysis of national data infrastructure development[C]// Proc of the 18th Annual Intl Conf. New York:ACM, 2017
[15] 汪东芳, 鞠杰. 大数据时代计算机网络信息安全及防护策略研究[J]. 无线互联科技, 2015 (24): 40-41
[16] 郑晨阳. 面向大数据的网络安全策略研究[J]. 数字图书馆论坛, 2014 (2): 7-10
[17] Philip J. An application of the dynamic knowledge creation model in big data[J]. Technology in Society, 2018:S0160791X17302622
[18] Grolinger K. Challenges for MapReduce in Big Data[C]// Services. 2014
[19] Nawsher K , Ibrar Y , Targio H I A , et al. Big data: Survey, technologies, opportunities, and challenges[J]. The Scientific World Journal, 2014, 2014:1-18
[20] Demchenko Y, Ngo C, de Laat C, et al. Big security for big data: Addressing security challenges for the big data infrastructure[C]//Proc of Workshop on Secure Data Management. Cham:Springer, 2013: 76-94
|