ОБЗОР ВОПРОСОВ ОБЕСПЕЧЕНИЯ ИНФОРМАЦИОННОЙ БЕЗОПАСНОСТИ БОЛЬШИХ ДАННЫХ
Аннотация
Ключевые слова
Полный текст:
PDFЛитература
E. Kern, Facebook is collecting your data – 500 terabytes a day. August 2012. [Электронный ресурс]. URL:
https://gigaom.com/2012/08/22/facebook-is-collecting-your-data-500-terabytes-a-day/ (дата обращения
15.10.2015).
R. Dube, Here Are The Fastest Growing Social Networks You Need To Join. September 2015. [Электронный
ресурс]. URL: http://www.makeuseof.com/tag/7-fastest-growing-social-networks-according-google-trends/
(дата обращения 20.10.2015).
D. Chaffey, Global social media research summary 2016. February 2016. [Электронный ресурс]. URL:
http://www.smartinsights.com/social-media-marketing/social-media-strategy/new-global-social-media-research/
(дата обращения 20.02.2016).
J. Chen, D. DeWitt, F. Tian, and Y.Wang. NiagaraCQ: a Scalable Continuous Query System for Internet
Databases. In Proceedings of SIGMOD’00, Dallas, Texas, 2000, pages 379–390.
C. Olston, J. Jiang, and J.Widom, Adaptive Filters for Continuous Queries over Distributed Data Streams. In
Proceedings of SIGMOD’03, San Diego, California, 2003, pages 563–574.
R. Govindan, and D. Estrin, Computing Aggregates for Monitoring Wireless Sensor Networks. In Proceedings
of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003, pages 139–148.
Office of Science and Technology Policy, The Big Data Research and Development Initiative. March, 2012.
E. Pinheiro, W.-D. Weber, and L. A. Barroso, “Failure trends in a large disk drive population,” inProceedings
of the 5th USENIX Conference on File and Storage Technologies (FAST '07), 2007, pages 17–29.
IBM Security Intelligence with Big Data [Электронный ресурс]. URL: http://www-
03.ibm.com/security/solution/intelligence-big-data/ (дата обращения 17.10.2015).
Oracle Big Data [Электронный ресурс]. URL: https://www.oracle.com/big-data/index.html (дата обращения
10.11.2015).
Understanding Microsoft big data solutions [Электронный ресурс]. URL: https://msdn.microsoft.com/enus/library/dn749804.aspx
(дата обращения 12.11.2015).
L. Lyon, Load Testing in a Big Data Environment. March, 2014.
K. Liu, C. Giannella, and H. Kargupta, An attacker’s view of distance preserving maps for privacy preserving
data mining. In Proceedings of PKDD’06, Berlin, Germany, September 2006.
S. R. M. Oliveira and O. R. Za¨ıane, Privacy preservation when sharing data for clustering. In Proceedings of
the International Workshop on Secure Data Management in a Connected World, Toronto, Canada, August
2004, pages 67–82.
K. Chen and L. Liu, Privacy preserving data classification with rotation perturbation. In Proceedings of
ICDM’05, Houston, TX, November 2005, pages 589–592.
S. Mukherjee, Z. Chen, and A. Gangopadhyay, A privacy-preserving technique for euclidean distance-based
mining algorithms using fourier-related transforms. VLDB Journal, 2006, 15(4):293–315.
L. Sweeney, k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and
Knowledge-based Systems, 2002, 10(5):557–570.
A. Evfimevski, J. Gehrke, and R. Srikant, Limiting privacy breaches in privacy preserving data mining. In
Proceedings of SIGMOD/PODS’03, San Diego, CA, June 2003.
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam.,ℓ-diversity: Privacy beyond kanonymity.
In Proceedings of ICDE’06, Atlanta, GA, April 2006, page 24.
C. Dwork, Differential privacy. In Proceedings of ICALP’06. Springer, 2006, volume 4052, pages 1–12.
Ernst & Young, Cyber Insurance, Security and data integrity, 2014, page 15.
R. Möller, V. Haarslev, M. Vessel, On the scalability of description logic instance retrieval. In 29. Lecture
Notes in Artificial Intelligence. Springer, 2006.
Ссылки
- На текущий момент ссылки отсутствуют.
Это произведение доступно по лицензии Creative Commons «Attribution» («Атрибуция») 4.0 Всемирная.