[1] |
马双荣 . 该如何面对大数据来袭[N]. 解放军报, 2014-04-17. MA S R . How to face the incoming data[N]. Jiefangjun Bao, 2014-04-17.
|
[2] |
张一鸣 . 数据治理过程浅析[J]. 中国信息界, 2012(9):15-17. ZHANG Y M . Analysis of the data governance process[J]. Information China, 2012(9):15-17.
|
[3] |
桑尼尔·索雷斯 . 大数据治理[M]. 匡斌,译. 北京: 清华大学出版社, 2014. SUNIL S . Big data governance[M].Translated by KUANG B. Beijing: Tsinghua University Press, 2014.
|
[4] |
梁芷铭 . 大数据治理:国家治理能力现代化的应有之义[J]. 吉首大学学报(社会科学版), 2015,36(2):34-41. LIANG Z M . Mega data governance:an essential approach to the modernization of state governance[J]. Journal of Jishou University(Social Science Edition), 2015,36(2):34-41.
|
[5] |
张兰廷 . 大数据的社会价值与战略选择[D]. 北京:中共中央党校, 2014. ZHANG L T . Social value and strategic choice of big data[D]. Beijing:Party School of the Central Committee of C.P.C, 2014.
|
[6] |
谢红卫, 汪浩, 苏建志 . 数据融合技术[J]. 系统工程与电子技术, 1992(12):40-49. XIE H W , WANG H , SU J Z . Data fusion technology[J]. Systems Engineering and Electronics, 1992(12):40-49.
|
[7] |
LENZERINI M . Data integration:a theoretical perspective[C]//The 21st ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems,June 2-6,2002,Madison,WI,USA. New York:ACM Press, 2002:233-246.
|
[8] |
DONG X L , SRIVASTAVA D . Big data integration[C]// 2013 IEEE 29th International Conference on Data Engineering (ICDE),April 8-11,2013,Brisbane,Australia, New Jersey: IEEE Press, 2013:1245-1248.
|
[9] |
CARUCCIO L , DEUFEMIA V , MOSCARIELLO M , et al. Data integration by conceptual diagrams[C]// Database and Expert Systems Applications,Sep 1-5,2014,Munich,Germany, Berlin: Springer International Publishing, 2014: 310-317.
|
[10] |
张永新 . 面向Web数据集成的数据融合问题研究[D]. 济南:山东大学, 2012. ZHANG Y X . Research on data fusion for web data interation[D]. Jinan:Shandong University, 2012.
|
[11] |
穆化鑫 . 基于Storm引擎的物联网异构数据融合系统的设计与实现[D]. 北京:北京邮电大学, 2015. MU H X . Design and implementation of IoT data fusion system based on Storm[D]. Beijing:Beijing University of Posts and Telecommunications, 2015.
|
[12] |
石西庆 . 基于数据融合技术的电子政务信息共享服务平台模型[D]. 成都:电子科技大学, 2013. SHI X Q . A model of e-government information sharing service platform based on data fusion technology[D]. Chengdu:University of Electronic Science and Technology of China, 2013.
|
[13] |
化柏林, 李广建 . 大数据环境下多源信息融合的理论与应用探讨[J]. 国书情报工作,2015(16):5-10. HUA B L , LI G J . Discussion on theory and application of multi-source information fusion in big data environment[J]. Library and Information Service, 2015(16):5-10.
|
[14] |
PAN L , XU Q . Visualization analysis of multidomain access control policy integration based on treemaps and semantic substrates[J]. Intelligent Information Management, 2012,4(5):188-193.
|
[15] |
孟小峰, 张啸剑 . 大数据隐私管理[J]. 计算机研究与发展, 2015(2):265-281. MENG X F , ZHANG X J . Big data privacy management[J]. Journal of Computer Research and Development,2015(2):265-281.
|
[16] |
SELLAMI M , GAMMOUDI M M , HACID M S . Secure data integration:a formal concept analysis based approach[J]. Database and Expert Systems Applications, 2014(8645): 326-333.
|
[17] |
SUN W , WANG B , CAO N , et al. Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking[C]// The 8th ACM SIGSAC Symposium on Information,Computer and Communications Security,May 8-10,2013,Hangzhou,China, New York: ACM Press, 2013: 71-82.
|
[18] |
CAO N , WANG C , LI M , et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2014,25(1): 222-233.
|
[19] |
RUBIO-MEDRANO C E , ZHAO Z , DOUPé A , et al. Federated access management for collaborative network environments:framework and case study[C]// The 20th ACM Symposium on Access Control Models and Technologies,June 1-3,2015,Vienna,Austria. New York: ACM Press, 2015: 125-134.
|
[20] |
ULUSOY H , COLOMBO P , FERRARI E , et al. GuardMR:fine-grained security policy enforcement for MapReduce systems[C]// The 10th ACM Symposium on Information,Computer and Communications Security,Apr 14-17,2015,Singapore. New York: ACM Press, 2015: 285-296.
|
[21] |
BLOOM G , SIMHA R . Hardware-enhanced distributed access enforcement for role-based access control[C]// The 19th ACM Symposium on Access Control Models and Technologies,June 25-27,2014,London,ON,Canada. New York: ACM Press, 2014:5-16.
|
[22] |
RAO P , LIN D , BERTINO E , et al. An algebra for fine-grained integration of XACML policies[C]// The 14th ACM Symposium on Access Control Models and Technologies,June 3-5,2009,Stresa,Italy. New York: ACM Press, 2009: 63-72.
|
[23] |
RAO P , LIN D , BERTINO E , et al. Fine-grained integration of access control policies[J]. Computers & Security, 2011,30(2-3): 91-107.
|
[24] |
HU Y J , YANG J J . A semantic privacy-preserving model for data sharing and integration [C]// The International Conference on Web Intelligence,Mining and Semantics,May 25-27,2011,Sogndal,Norway. New York: ACM Press, 2011:1-12.
|