[1] |
丁大尉, 李正风 . 网络信息空间中的知识构建—以维基百科知识生成机制为例[J]. 自然辩证法研究, 2012,28(5): 61-65. DING D W , LI Z F . Knowledge construction in nnetwork information world-case study of knowledge production machanism of wikipedia[J]. Studies in Dialectics of Nature, 2012,28(5): 61-65.
|
[2] |
陆汝铃 . 世纪之交的知识工程与知识科学[M]. 北京: 清华大学出版社, 2001. LU R L . Knowledge engineering and knowledge science at the turn of the century[M]. Beijing: Tsinghua University Press Press, 2001.
|
[3] |
陈文伟, 陈晟 . 知识工程与知识管理[M]. 北京: 清华大学出版社, 2010. CHEN W W , Chen C . Knowledge Engineering and Knowledge Management[M]. Beijing: Tsinghua University PressPress, 2010.
|
[4] |
DESOUZA K C . Managing Knowledge Security:Strategies for Protecting Your Company’s Intellectual Assets[M]. UK: Kogan Page.
|
[5] |
陈雪秀, 吕述望, 孙鹏 . 知识安全与可控性[J]. 信息安全与保密通信, 2004,12(4): 12-16. CHEN X X , LV S W , SUN P . Knowledge security and controllability[J]. China Information Security, 2004,12(4): 12-16.
|
[6] |
周雪 . 吕述望教授谈知识安全与未来网络[J]. 信息安全与保密通信, 2012,12(3): 20-22. ZHOU X . Professor Lv Shuwang talks about the knowledge of safety and the future network[J]. China Information Security, 2012,12(3): 20-22.
|
[7] |
曾伟忠 . e-Science环境下知识控制研究[D]. 南开大学, 2009. ZENG W Z . Research on Knowledge Control Under e-Science EnviRonment[D]. Nankai University, 2009.
|
[8] |
冯登国, 张敏, 李昊 . 大数据安全与隐私保护[J]. 计算机学报, 2014,37(1): 246-259. FENG D G , ZHANG M , LI H . Big data security and privacy protection[J]. Chinese Journal of Computers, 2014,37(1): 246-259.
|
[9] |
刘婷婷 . 面向云计算的数据安全保护关键技术研究[D]. 郑州:信息工程大学, 2013. LIU T T . Research on Key Technologies of Data Security towards Cloud Computing[D]. Zhengzhou:PLA Information Engineering University, 2013.
|
[10] |
严慰敏, 吴伟民 . 数据结构[M]. 北京: 清华大学出版社, 1997. YAN W M , WU W M . Data Construction[M]. Beijing: Tsinghua University PressPress, 1997.
|
[11] |
JP 1-02. Department of Defence Dictionary of Military and Associated Terms[S]. Washington DC:U.S.Joint Staff, 2010.
|
[12] |
严士健, 王隽骧, 刘秀芳 . 概率论基础[M]. 北京: 科学出版社, 2007. YAN S J , WANG J X , LIU X F . Foundations of Probability Theory[M]. Beijing: Science PressPress, 2007.
|
[13] |
茆诗松, 王静龙, 濮晓龙 . 高等数理统计[M]. 北京: 高等教育出版社, 2009. MAO S S , WANG J L , PU X L . Advanced Mathematical Statistics[M]. Beijing: China Higher Education PressPress, 2009.
|
[14] |
BILL F , 黄海, 车皓阳, ,等译. 驾驭大数据[M]. 北京: 人民邮电出版社, 2013. BILL F , HUANG H , CHE H Y ,et al. Taming the Big Data Tidal Wave[M]. Beijing: Posts & Telecom PressPress, 2013.
|
[15] |
陆嘉恒 . 大数据挑战与 NoSQL 数据库技术[M]. 北京: 电子工业出版社, 2013. LU J H . Large Data Challenge with NoSQL Database Technology[M]. Beijing:Electronic Industry Press. 2013.
|
[16] |
赵刚 . 大数据技术与应用实践指南[M]. 北京: 电子工业出版社, 2013. ZHAO G . Big Data Technology and Application of Practice Guidelines[M]. Beijing: Electronic Industry PressPress, 2013.
|
[17] |
EDWAR DS , HAROLD M . Galois Theory[M]. Springer-Verlag, 1984.
|
[18] |
RUDOLF L , HARALD N . Finite Fields[M]. Addison-Wesley Publishing Company, 1983.
|
[19] |
梁之舜, 邓集贤, 杨维权 等. 概率论及数理统计[M]. 北京: 高等教育出版社, 1992. LIANG Z S , DENG J X , YANG W Q ,et al. Probability Theory and Mathematical Statistics[M]. Beijing: China Higher Education PressPress, 1992.
|
[20] |
陆传荣, 林正炎, 陆传赉 . 概率论极限理论引论[M]. 北京: 高等教育出版社, 1989. LU C R , LIN Z Y , LU C J . The Theory of Probability Limit Theory Introduction[M]. Beijing: China Higher Education PressPress, 1989.
|
[21] |
BEEK P , VAN Z . Wahrscheinlichkeits theorie[R]. 1972.
|
[22] |
候方勇 . 存储系统数据机密性与完整性保护的关键技术研究[D]. 北京:国防科学技术大学, 2005. HOU F Y . Research on Key Technologies of Storage System,Data Confidentiality and Integrity Protection[D]. Beijing:National Defense Science and Technology Unviersity, 2005.
|
[23] |
BELL D E , LAPADULA L J . Secure Computer Systems:Unified Exposition and Multics Interpretation[M]. Bedford,MA: The MITRE CorporationPress, 1976.
|
[24] |
BELL D E , LAPADULA L J . Secure Computer Systems:Mathematical Foundations[M]. Bedford,MA: Electronic Systems Division,Air Force System Command Corporation,Hanscom AFBPress, 1973.
|
[25] |
BELL D E , LAPADULA L J . Secure computer systems:a mathematical model[M]. Bedford,MA: Electronic Systems Division,Air Force System Command Corporation,Hanscom AFBPress, 1973.
|
[26] |
董婵, 范修斌, 李有文 等. 应用规律下的BLP模型密级赋值方法[J]. 通信学报, 2013,34(9): 142-149. DONG C , FAN X B , LI Y W ,et al. Secret level valuation method of BLP model based on some application properties[J]. Journal on Communications, 2013,34(9): 142-149.
|
[27] |
安宝宇 . 云存储中数据完整性保护关键技术研究[D]. 北京:北京邮电大学, 2012. AN BY . Cloud storage of data integrity research on Key Technologies of protection[D]. Beijing:Beijing University of Post & Telecommunication, 2012.
|
[28] |
BIBA K J . Integrity considerations for secure computer systems[R]. ESD-TR-76-372,Bedford,MA:USAF Electronic Systems Division,Hanscom Air Force Base, 1977.
|
[29] |
黎琳, 禄凯, 国强 等. 基于Biba模型的三权分立分析[J]. 北京交通大学学报, 2013,37(5): 1-7. LI L , LU K , GUO Q ,et al. Formal analysis of power separation mechanism based on Biba model[J]. Journal of Beijing Jiaotong University, 2013,37(5): 1-7.
|
[30] |
王宇, 卢晃 . 网络安全与控制技术[M]. 北京: 国防工业出版社, 2010. WANG Y , LU Y . Network security and control technology[M]. Beijing: NationalDefenceIndustryPressPress, 2010.
|
[31] |
SHANNON C E . A mathematical theory of communication[J]. Bell Syst.Tech. 1948,27: 379-423, 623-656.
|
[32] |
NOBERT W . The Human Use of Human Beings:Cybernetics and Society[M]. Da Capo Press; New edition, 1988.
|
[33] |
THOMAS M,COVER , JOY A . Thomas,Elements of Information Theor[M]. John Wiley & Sons,Inc. 2006.
|
[34] |
ANDREW N , WILLIAM D , CELIA J ,et al. PKI Implementing and Managing E-Security[M]. RSA PRSS, 2001.
|
[35] |
WATERS B . Efficient identity-based encryption without random oracles[J]. Lecture Notes in Computer Science, 2005,3494: 114-127.
|
[36] |
GENTRY C . Practical identity-based encryption without random oracles[J]. Lecture Notes in Computer Science, 2006,4004: 445-464.
|
[37] |
陈华平, 范修斌, 吕述望 . 基于标示的证书认证体制 CFL[P]. 2011102500094, 2011. CHEN H P , FAN X B , LV S W . Mark certification system based on CFL[P]. 2011102500094, 2011
|
[38] |
BUNNIN NICHOLAS E P . The Blackwell Companion to Philosophy[M]. Oxford: Blackwell Publishers LtdPress, 2001.
|
[39] |
夏甄陶, 崔建军, 纪虎民 . 西方认识论简史[M]. 北京: 中国人民出版社, 1987. XIA Z T , CUI J J , JI H M . The Epistemological History of Westen[M]. Beijing: Beijing People's PressPress, 1987.
|
[40] |
邱碧华 . 术语学、知识论和知识技术[M]. 北京: 商务印书馆, 2011. QIU B H . Terminology,Epistemology and Knowledge Technology[M]. Beijing: the Commercial PressPress, 2011.
|
[41] |
刘兵, 李正风 . 自然辩证法参考读物[M]. 北京: 清华大学出版社, 2003. LIU B , LI ZF . Dialectics of Nature of Reference Books[M]. Beijing: Tsinghua University PressPress, 2003.
|
[42] |
郭元林 . 复杂性科学知识论[M]. 中国书籍出版社, 2012. GUO Y L . Complexity Science Theory[M]. China Book Press, 2012.
|
[43] |
何兆 . 皙学问题[M]. 北京: 商务印书馆, 2004. HE Z . Problems of Philosophy[M]. Beijing: the Commercial PressPress, 2004.
|
[44] |
陈洪澜 . 知识分类与知识资源认识论[M]. 北京: 人民出版社, 2008. CHEN H L . Knowledge Classification and Knowledge resource epistemology[M]. Beijing: Beijing People's PressPress, 2008.
|
[45] |
史忠植 . 知识发现[M]. 北京: 清华大学出版社, 2002. SHI Z Z . Knowledge Discoverity[M]. Beijing: Tsinghua University PressPress, 2002.
|
[46] |
许文艳, 刘三阳 . 知识库系统的逻辑基础[J]. 计算机学报, 2009(32):11, 2123-2128. XU W Y , LIU S Y . Logic for knowledgebase systems[J] Chinese Journal of Computers, 2009(32):11, 2123-2128.
|
[47] |
LING M , PAUL V . An Introduction to Kolmogorov Complexity and Its Application[M]. Springer-Verlag, 1997.
|
[48] |
王飞跃 . 天命唯新:迈向知识自动化—《自动化学报》创刊50周年刊序[J]. 自动化学报, 2013,39(11): 1741-1743. WANG F Y . The destiny:towards knowledge automation—— preface of the special issue for the 50th anniversary of Acta Automatica Sinica[J]. Acta Automatic Sinica, 2013,39(11): 1741-1743.
|