[1]MayerSchnberger V, Cukier K. Big Data: A Revolution That will Transform How We Live, Work, and Think[M]. Houghton Mifflin Harcourt, 2013
[2]冯登国, 张敏, 李昊. 大数据安全与隐私保护[J]. 计算机学报, 2014, 37(1): 246258
[3]Buytendijk F. Hype Cycle for Big Data[OL]. 2014 [20151116]. https:www.gartner.comdoc2814517[4]刘鹏. DFuture破解数据三大难题:变现?交易?隐私?[OL]. (20151103) [20151116]. http:www.kejixun.comarticle201509125092.html
[5]Team V B R. Data breach investigations report[OL]. 2008 [20151116]. http:www.verizonbusiness.comresourcessecuritydatabreachreport.pdf
[6]Mora C A. Expaned top ten big data security and privacy challenges[R]. Cloud Security Alliance, 2012
[7]Chiticariu L, Tan W C, Vijayvargiya G. DBNotes: A postit system for relational databases based on provenance[C] Proc of the 2005 ACM Sigmod Int Conf on Management of Data. New York: ACM, 2005: 942944
[8]Fan H. Tracing data lineage using automed schema transformation pathways[C] Proc of Advances in Databases. Berlin: Springer, 2002: 5053
[9]Gadang S. Bit vector based provenance tracking systems[D]. Fayetteville: University of Arkansas, 2005
[10]吴甘沙. 大数据分析师的卓越之道[OL]. (20151103) [20151117]. http:www.thebigdata.cnJiShuBoKe15212.html
[11]Arasu A, Chaudhuri S, Chen Z, et al. Experiences with using data cleaning technology for bing services[J]. IEEE Data Engineering Bull, 2012, 35(2): 1423