[1] |
Amara R , Lipinski A J . Business Planning for AnUncertain Future:Scenarios & Strategies. New York: Pergamon Press, 1983
|
[2] |
F?rber F , Cha S K , Primsch J , et al. SAP HANA database:data management for modern business applications. ACM Sigmod Record, 2012,40(4): 45~51
|
[3] |
Corbett J C , Dean J , Epstein M , et al. Spanner:Google’s globally distributed database. ACM Transactions on Computer Systems, 2013,31(3)
|
[4] |
Zaharia M , Chowdhury M , Das T , et al. Resilient distributed datasets:a fault-tolerant abstraction for in-memory cluster computing. Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, San Jose,CA,USA, 2012
|
[5] |
Li H , Ghodsi A , Zaharia M , et al. Tachyon:reliable,memory speed storage for cluster computing frameworks. Proceedings of the ACM Symposium on Cloud Computing, Seattle,Washington,USA, 2014:1~15
|
[6] |
Ousterhout J , Agrawal P , Erickson D , et al. The case for RAMClouds:scalable high-performance storage entirely in DRAM. ACM SIGOPS Operating Systems Review, 2010,43(4): 92~105
|
[7] |
Chang F , Dean J , Ghemawat S , et al. Bigtable:a distributed storage system for structured data. AACM Transactions on Computer Systems, 2008,26(2)
|
[8] |
Dwork , Cynthia . Encyclopedia of Cryptography and Security. New York:Springer US, 2011
|
[9] |
DeCandia G , Hastorun D , Madan J , et al. Dynamo:amazon’s highly available key-value store. ACM SIGOPS Operating Systems Review, 2007,41(6)
|
[10] |
OlsonM A , Keith B , Seltzer M I . Berkeley DB. Proceedings of USENIX Annual Technical Conference, Monterey,CA,USA, 1999
|
[11] |
Jose J , Subramoni H , Luo M , et al. Memcached design on high performance rdma capable interconnects. Proceeding of IEEE International Conference on Parallel Processing (ICPP), Taipei,China, 2011
|
[12] |
Brewer E . CAP twelve years later:how the“rules” have changed. Computer, 2012,45(2): 23~29
|
[13] |
Moniruzzaman A B M . NewSQL:towards next-generation scalable RDBMS for online transaction processing (OLTP) for big data management. arXiv Preprint, 2014,arXiv:1411.7343
|
[14] |
Stonebraker M , Weisberg A . The VoltD Bmain memory DBMS. IEEE Data Engineering Bulletin, 2013,36(2):21~27
|
[15] |
Greenwald R , Stackowiak R , Stern J . Oracle Essentials:Oracle Database 12c. Sebastopol:O’Reilly Media Inc, 2013
|
[16] |
Sweeney L . K-anonymity:a model for protecting privacy. International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems, 2002,10(5):557~570
|
[17] |
Machanavajjhala A , Kifer D , Gehrke J , et al. l-diversity:privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data, 2007,1(1)
|
[18] |
Li N H , Li T C , Venkatasubramanian S . T-closeness:privacy beyond k-anonymity and L-diversity. Proceedings of the 23rd International Conference on Data Engineering, Istanbul,Turkey, 2007
|
[19] |
Popa R A , Redfield C M S , Zeldovich N , , et al. CryptDB:protecting confidentiality with encrypted query processing. Proceedings of the 23rd ACM Symposium on Operating Systems Principles, Cascais,Portugal, 2011
|
[20] |
McKeen F , Alexandrovich L , Berenzon A , et al. Innovative instructions and software model for isolated execution. Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, New York,NY,USA, 2013
|