3The big data security gap: protecting the Hadoop custer challenges and opportunities with big data. http://www.zettaset. com/info-center/datasheets/zettaset_wp_security_0413.pdf. 被引量:1
6Tony Hey, Stewart Tansley: The Fourth Paradigm: Data-I ntensive Scientific Discovery.Microsoft.2009. 被引量:1
7Benjamin Woo World wide Big Data Technology and Servi ces 2012-2015 Forecast.2012.5116]Big data http: //www.gartner. corn/it- glossary/big-data. 被引量:1
9Sweeney L.K-anonymity: A model for protecting privacy.In ternational Journal on Uncertainty, Fuzziness and Knowledge-b ased Systems.2002. 被引量:1
10Cheng P C, Rohtgi P, Keser C, et al, Fuzzy multi-level security: An experiment on quantified risk-adaptive access cont rol//Proceedings of the 2007 IEEE symposium on Security and Privacy. Oakland. USA. 2007. 被引量:1