[1] |
MINSTER B , CAMPBELL J W , DOZIER J ,et al. Earth observations from space:the first 50 years of scientific achievements[C]// AGU Fall Meeting,December 10-14,2007,San Francisco,USA. Washington DC:National Academies Press, 2008: 1-8.
|
[2] |
MAGEE A F , MAY M R , MOORE B R . The dawn of open access to phylogenetic data[J]. PloS One, 2014,9(10): e110268.
|
[3] |
KAUPPINEN T , DE ESPINDOLA G M . Linked open science-communicating,sharing and evaluating data,methods and results for executable papers[J]. Procedia Computer Science, 2011,4(4): 726-731.
|
[4] |
朱扬勇, 熊贇 . 数据资源保护与开发利用[M]. 上海: 上海科技文献出版社, 2008: 133-137.
|
|
ZHU Y Y , XIONG Y . Protection and utilization of data resources[M]. Shanghai: Shanghai Scientific & Technical Publishers, 2008: 133-137.
|
[5] |
CODD E F . A relational model of data for large shared data banks[J]. Communications of the ACM, 1970,13(6): 377-387.
|
[6] |
JEFFREY U . First course in database systems[M]. New Jersey: Prentice-Hall Inc, 1997.
|
[7] |
郑磊 . 开放政府数据研究:概念辨析、关键因素及其互动关系[J]. 中国行政管理, 2015(11): 13-18.
|
|
ZHENG L . Study on open government data:definitions,factors and interactions[J]. Chinese Public Administration, 2015(11): 13-18.
|
[8] |
郑磊 . 开放政府数据的价值创造机理:生态系统的视角[J]. 电子政务, 2015(7): 2-7.
|
|
ZHENG L . Value creation mechanism of open government data:from ecosystem perspective[J]. e-Government, 2015(7): 2-7.
|
[9] |
GENTRY C , . Fully homomorphic encryption using ideal lattices[C]// STOC,May 30-June 2,2009,Bethesda,USA. New York:ACM Press, 2015(4): 169-178.
|
[10] |
SAHAI A , WATERS B . Fuzzy identitybased encryption[M]. Heidelberg: Springer, 2005: 457-473.
|
[11] |
DWORK C , . Differential privacy[C]// The 33rd International Conference on Automata,Languages and Programming.July 10-14,2006,Venice,Italy. Heidelberg:Springer, 2006: 1-12.
|
[12] |
CARMINATI B , FERRARI E , MORASCA S ,et al. A probability-based approach to modeling the risk of unauthorized propagation of information in on-line social networks[C]// The 1st ACM Conference on Data and Application Security and Privacy,February 21-23,2011,San Antonio,USA. New York:ACM Press, 2011: 51-62.
|
[13] |
GORLA A , TAVECCHIA I , GROSS F ,et al. Checking App behavior against app descriptions[C]// The 36th International Conference on Software Engineering,May 31-June 7,2014,Hyderabad,India. New York:ACM Press, 2014: 1025-1035.
|