[1] |
付钰, 李洪成, 吴晓平 ,等. 基于大数据分析的 APT 攻击检测研究综述[J]. 通信学报, 2015,36(11): 1-14.
|
|
FU Y , LI H C , WU X P ,et al. Detecting APT attacks:a survey from the perspective of big data analysis[J]. Journal on Communications, 2015,36(11): 1-14.
|
[2] |
张浩, 王丽娜, 谈诚 ,等. 云环境下 APT 攻击的防御方法综述[J]. 计算机科学, 2016,43(3): 1-7.
|
|
ZHANG H , WANG L N , TAN C ,et al. Review of defense methods against advanced persistent threat in cloud environment[J]. Computer Science, 2016,43(3): 1-7.
|
[3] |
冯登国, 张敏, 李昊 . 大数据安全与隐私保护[J]. 计算机学报, 2014,37(1): 246-258.
|
|
FENG D G , ZHANG M , LI H . Big data security and privacy protection[J]. Chinese Journal of Computers, 2014,37(1): 246-258.
|
[4] |
梁吉业, 冯晨娇, 宋鹏 . 大数据相关分析综述[J]. 计算机学报, 2016,39(1): 1-18.
|
|
LIANG J Y , FENG C J , SONG P . A survey on correlation analysis of big data[J]. Chinese Journal of Computers, 2016,39(1): 1-18.
|
[5] |
刘雅辉, 张铁赢, 靳小龙 ,等. 大数据时代的个人隐私保护[J]. 计算机研究与发展, 2015,52(1): 229-247.
|
|
LIU Y H , ZHANG T Y , JIN X L ,et al. Personal privacy protection in the era of big data[J]. Journal of Computer Research and Development, 2015,52(1): 229-247.
|
[6] |
黄刘生, 田苗苗, 黄河 . 大数据隐私保护密码技术研究综述[J]. 软件学报, 2015,26(4): 945-959.
|
|
HUANG L S , TIAN M M , HUANG H . Preserving privacy in big data:a survey from the cryptographic perspective[J]. Journal of Software, 2015,26(4): 945-959.
|
[7] |
田洪亮, 张勇, 许信辉 ,等. 可信固态硬盘:大数据安全的新基础[J]. 计算机学报, 2016,39(1): 154-168.
|
|
TIAN H L , ZHANG Y , XU X H ,et al. Trusted SSD:new foundation for big data security[J]. Chinese Journal of Computers, 2016,39(1): 154-168.
|
[8] |
DAMGARD I , PASTRO V , SMART N ,et al. Multiparty computation from somewhat homomorphic encryption[C]// Advances in Cryptology-CRYPTO 2012. 2012: 643-662.
|
[9] |
熊金波, 张媛媛, 李凤华 ,等. 云环境中数据安全去重研究进展[J]. 通信学报, 2016,37(11): 238-250.
|
|
XIONG J B , ZHANG Y Y , LI F H ,et al. Research progress on secure data deduplication in cloud[J]. Journal on Communications, 2016,37(11): 238-250.
|
[10] |
陈越, 李超零, 兰巨龙 ,等. 基于确定/概率性文件拥有证明的机密数据安全去重方案[J]. 通信学报, 2015,36(9): 1-12.
|
|
CHEN Y , LI C L , LAN J L ,et al. Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership[J]. Journal on Communications, 2015,36(9): 1-12.
|
[11] |
CHENG H , RONG C , HWANG K ,et al. Secure big data storage and sharing scheme for cloud tenants[J]. China Communications, 2015,12(6): 106-115.
|
[12] |
孙国梓, 董宇, 李云 . 基于CP-ABE算法的云存储数据访问控制[J]. 通信学报, 2011,32(7): 146-152.
|
|
SUN G Z , DONG Y , LI Y . CP-ABE based data access control in cloud storage[J]. Journal on Communications, 2011,32(7): 146-152.
|
[13] |
惠榛, 李昊, 张敏 ,等. 面向医疗大数据的风险自适应的访问控制模型[J]. 通信学报, 2015,36(12): 190-199.
|
|
HUI Z , LI H , ZHANG M ,et al. Risk-adaptive access control model for big data in healthcare[J]. Journal on Communications, 2015,36(12): 190-199.
|
[14] |
徐泽水 . 不确定多属性决策方法及应用[M]. 北京: 清华大学出版社, 2004.
|
|
XU Z S . Uncertain multiple attribute decision making:methods and applications[M]. Beijing: Tsinghua University Press, 2004.
|
[15] |
胡毓达 . 多目标决策:实用模型和选优方法[M]. 上海: 上海科学技术出版社, 2010.
|
|
HU Y D . Multiple target making decision[M]. ShangHai: Shanghai Scientific & Technical Publishers, 2010.
|
[16] |
谭学瑞, 邓聚龙 . 灰色关联分析:多因素统计分析新方法[J]. 统计研究, 1995,12(3): 46-48.
|
|
TAN X R , DENG J L . Grey connected analysis:a new method of multifactor statistical analysis[J]. Statistical Research, 1995,12(3): 46-48.
|
[17] |
黄强, 曾庆凯 . 基于信息流策略的污点传播分析及动态验证[J]. 软件学报, 2011,22(9): 2036-2048.
|
|
HUANG Q , ZENG Q K . Taint propagation analysis and dynamic verification with information flow policy[J]. Journal of Software, 2011,22(9): 2036-2048.
|
[18] |
GANAPATHY V , JHA S , CHANDLER D ,et al. Buffer overrun detection using linear programming and static analysis[C]// ACM Conference on Computer and Communications Security. 2003: 345-354.
|
[19] |
ZHU D , JUNG J , SONG D ,et al. TaintEraser:protecting sensitive data leaks using application-level taint tracking[J]. ACM SIGOPS Operating Systems Review, 2011,45(1): 142-154.
|
[20] |
ENCK W , GILBERT P , HAN S ,et al. TaintDroid:an information-flow tracking system for realtime privacy monitoring on smartphones[C]// USENIX Conference on Operating Systems Design & Implementation. 2014: 393-407.
|