[1] |
袁博, 闫树 . 数据要素市场化配置上升为国家战略[J]. 互联网天地, 2020(6): 34-37.
|
|
YUAN B , YAN S . Market-based allocation of data elements rises to national strategy[J]. Internet World, 2020(6): 34-37.
|
[2] |
郭志斌, 马书惠 . 主流公有云提供商产品体系研究[J]. 邮电设计技术, 2015(7): 16-21.
|
|
GUO Z B , MA S H . Research on the product system of mainstream public cloud providers[J]. Post & Telecom Design Technology, 2015(7): 16-21.
|
[3] |
邓磊, 吴健, 张昌利 ,等. 电子政务中跨域可信数据交换模型设计与实现[J]. 计算机工程, 2007,280(12): 4-9.
|
|
DENG L , WU J , ZHANG C L ,et al. Design and Implementation of crossdomain trusted data exchange model in e-government[J]. Computer Engineering, 2007,280(12): 4-9.
|
[4] |
张彬, 徐建民, 吴姣 . 跨域推荐中的知识融合研究进展[J]. 现代情报, 2023,43(3): 157-166.
|
|
ZHANG B , XU J M , WU J . Advances in knowledge fusion research in crossdomain recommendation[J]. Modern Intelligence, 2023,43(3): 157-166.
|
[5] |
卢红建, 王晗, 马玮 . 跨区域医疗信息共享与业务协同标准建设探索[J]. 中国卫生信息管理杂志, 2021,18(2): 229-234,267.
|
|
LU H J , WANG H , MA W . Exploring the construction of cross-regional medical information sharing and business collaboration standards[J]. Chinese Journal of Health Information Management, 2021,18(2): 229-234,267.
|
[6] |
董晶, 张天龙 . 智慧城市跨域数据治理体系与平台研究[J]. 电子元器件与信息技术, 2021,5(1): 53-54.
|
|
DONG J , ZHANG T L . Research on cross-domain data governance system and platform for smart cities[J]. Electronic Components and Information Technology, 2021,5(1): 53-54.
|
[7] |
王蒙蒙, 朱婉婷 . 面向联合作战的跨域数据安全互联方法[J]. 中国电子科学研究院学报, 2020,15(5): 442-448.
|
|
WANG M M , ZHU W T . A secure interconnection method for cross-domain data for joint warfare[J]. Journal of the Chinese Academy of Electronic Science, 2020,15(5): 442-448.
|
[8] |
冯绮航 . 考虑属性加密的物联网隐私数据跨域安全共享模型[J]. 现代电子技术, 2023,46(1): 91-95.
|
|
FENG Q H . A cross-domain secure sharing model for IoT privacy data considering attribute encryption[J]. Modern Electronics Technology, 2023,46(1): 91-95.
|
[9] |
潘雪, 袁凌云, 黄敏敏 . 主从链下的物联网隐私数据跨域安全共享模型[J]. 计算机应用研究, 2022,39(11): 3238-3243.
|
|
PAN X , YUAN L Y , HUANG M M . A cross-domain secure sharing model for IoT privacy data under master-slave chain[J]. Computer Application Research, 2022,39(11): 3238-3243.
|
[10] |
陈嘉熳 . 基于区块链的跨域数据共享技术研究[D]. 成都:电子科技大学, 2021.
|
|
CHEN J M . Research on cross-domain data sharing technology based on blockchain[D]. Chengdu:University of Electronic Science and Technology, 2021.
|
[11] |
郑佳伟 . 基于区块链的物联网数据跨域受控共享平台设计与实现[D]. 西安:西安电子科技大学, 2020.
|
|
ZHENG J W . Design and Implementation of a blockchain-based cross-domain controlled sharing platform for IoT data[D]. Xi’an:Xi’an University of Electronic Science and Technology, 2020.
|
[12] |
高丰 . 厘清公共数据授权运营:定位与内涵[J]. 大数据, 2023,9(2): 16-32.
|
|
GAO F . Clarifying the authorized operation of public data:positioning and connotation[J]. Big Data Research, 2023,9(2): 16-32.
|
[13] |
林镇阳, 侯智军, 赵蓉 ,等. 数据要素生态系统视角下数据运营平台的服务类型与监管体系构建[J]. 电子政务, 2022,236(8): 89-99.
|
|
LIN Z Y , HOU Z J , ZHAO R ,et al. Service types and regulatory system construction of data operation platform in the perspective of data element ecosystem[J]. E-Government, 2022,236(8): 89-99.
|
[14] |
胡业飞, 陈美欣, 张怡梦 . 价值共创与数据安全的兼顾:基于联邦学习的政府数据授权运营模式研究[J]. 电子政务, 2022,238(10): 2-19.
|
|
HU Y F , CHEN M X , ZHANG Y M . Balancing value co-creation and data security:a federal learning-based operational model for government data empowerment[J]. E-Government, 2022,238(10): 2-19.
|
[15] |
冯洋 . 公共数据授权运营的行政许可属性与制度建构方向[J]. 电子政务, 2023(6): 77-87.
|
|
FENG Y . The administrative license attributes of public data authorization operation and the direction of institutional construction[J]. E-Government, 2023(6): 77-87.
|
[16] |
童楠楠, 杨铭鑫, 莫心瑶 ,等. 数据财政:新时期推动公共数据授权运营利益分配的模式框架[J]. 电子政务, 2023,241(1): 23-35.
|
|
TONG N N , YANG M X , MO X Y ,et al. Data finance:a model framework for promoting benefit sharing of public data empowerment operations in the new era[J]. E-Government, 2023,241(1): 23-35.
|
[17] |
黄丽华, 杜万里, 吴蔽余 . 基于数据要素流通价值链的数据产权结构性分置[J]. 大数据, 2023,9(2): 5-15.
|
|
HUANG L H , DU W L , WU B Y . A structural division of data property rights based on the value chain of data elements circulation[J]. Big Data Research, 2023,9(2): 5-15.
|
[18] |
MCMAHAN B , MOORE E , RAMAGE D ,et al. Communication-efficient learning of deep networks from decentralized data[J]. Artificial Intelligence and Statistics,PMLR, 2017: 1273-1282.
|
[19] |
MIHIR B , HOANG V T , ROGAWAY P . Foundations of garbled circuits[C]// ACM Conference on Computer and Communications Security. New York:ACM Press, 2012: 784-796.
|
[20] |
OGBURN M , TURNER C , DAHAL P . Homomorphic encryption[J]. Computer Science, 2013: 502-509.
|
[21] |
ABADI M , CHU A , GOODFELLOW I ,et al. Deep learning with differential privacy[C]// Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2016: 308-318.
|
[22] |
LIU Z Q , WANG Y X , SMOLA A . Fast differentially private matrix factorization[C]// Proceedings of the 9th ACM Conference on Recommender Systems. New York:ACM Press, 2015: 171-178.
|
[23] |
唐迪, 顾健, 张凯悦 ,等. 数据脱敏技术发展趋势[J]. 保密科学技术, 2021,127(4): 4-11.
|
|
TANG D , GU J , ZHANG K Y ,et al. Development trend of data desensitization technology[J]. Confidentiality Science and Technology, 2021,127(4): 4-11.
|
[24] |
SWEENEY L . k-anonymous:a model for protecting privacy[J]. Uncertainty,Fuzziness and Knowledge-Based Systems, 2002,10(5): 557-570.
|
[25] |
MACHANAVAJJHALA A , GEHRKE J , KIFER D ,et al. L-diversity:privacy beyond k-anonymity[C]// Proceedings of 22nd International Conference on Data Engineering (ICDE’06). Piscataway:IEEE Press, 2006:24.
|
[26] |
LI N H , LI T C , VENKATASUBRAMANIAN S . t-closeness:privacy beyond K-anonymity and L-diversity[C]// Proceedings of IEEE 23rd International Conference on Data Engineering. Piscataway:IEEE Press, 2007: 106-115.
|
[27] |
佟玲玲, 李鹏霄, 段东圣 ,等. 面向异构大数据环境的数据脱敏模型[J]. 北京航空航天大学学报, 2022,48(2): 249-257.
|
|
TONG L L , LI P X , DUAN S D ,et al. A data desensitization model for heterogeneous big data environment[J]. Journal of Beijing University of Aeronautics and Astronautics, 2022,48(2): 249-257.
|
[28] |
王忠春, 陈庆荣, 刘婷 . 大数据下新型安全沙箱技术运用分析与研究[J]. 网络空间安全, 2022,13(6): 89-97.
|
|
WANG Z C , CHEN Q R , LIU T . Analysis and research on the use of new security sandbox technology under big data[J]. Cyberspace Security, 2022,13(6): 89-97.
|
[29] |
彭钺峰, 赵波, 刘会 ,等. 针对机器学习的成员推断攻击综述[J]. 计算机科学, 2023,50(3): 351-359.
|
|
PENG Y F , ZHAO B , LIU H ,et al. A review of membership inference attacks against machine learning[J]. Computer Science, 2023,50(3): 351-359.
|
[30] |
叶兵, 宋从雅, 赵银银 . 公共数据的金融共享应用[J]. 中国金融, 2022,985(19): 73-74.
|
|
YE B , SONG C Y , ZHAO Y Y . Financial sharing applications of public data[J]. China Finance, 2022,985(19): 73-74.
|
[31] |
GRAEPEL T , LAUTER K , NAEHRIG M . ML confidential:machine learning on encrypted data[C]// Proceeding of International Conference on Information Security and Cryptology. Heidelberg:Springer, 2013: 1-21.
|