期刊文献+

大数据时代个人隐私的保护 被引量:1

Personal Privacy Protection in Big Data Era
下载PDF
导出
摘要 近年来,以云计算为基础平台的大数据时代正式到来,大数据因蕴藏有巨大的商业价值而使不法分子想方设法盗取个人隐私数据,从而影响用户的正常生活。本文通过分析大数据时代个人隐私安全面临的严峻挑战,对个人隐私保护所采用的技术措施进行总结,并提出了个人或企业应遵守的法律和行业规范,最后探索了个人隐私保护的进一步研究方向。 In recent years,the era of big data based on cloud computing platform officially arrived,and big data contains a huge commercial value and makes the criminals try to steal personal privacy data,thus affecting the normal life of the user.By analyzing the challenges faced by the privacy security in the era of big data,summarize the technical measures adopted in the protection of personal privacy,put forward the laws and industry standards the individual or enterprise should abide by,and finally explore the direction of further research on the protection of personal privacy.
作者 张永兵
出处 《价值工程》 2016年第35期187-188,共2页 Value Engineering
关键词 大数据 个人隐私保护 匿名化技术 数据加密 数据访问控制 big data personal privacy protection anonymity technology data encryption data access control
  • 相关文献

参考文献2

二级参考文献99

  • 1姜传贤,孙星明,易叶青,杨恒伏.基于JADE算法的数据库公开水印算法的研究[J].系统仿真学报,2006,18(7):1781-1784. 被引量:9
  • 2Chen M Y,Yang C C,Hwang M S.Privacy protection dataaccess control[J].International Journal of NetworkSecurity,2013,15(6):391-399. 被引量:1
  • 3Warren S D,Brandeis L D.The right to privacy[J].Harvard Law Review,1890,4(5):193-220. 被引量:1
  • 4Smith J,Dinev T,Xu H.Information privacy research:Aninterdisciplinary review[J].MIS Quarterly,2011,35(4):989-1016. 被引量:1
  • 5Bennett C J.The political economy of privacy:A review ofthe literature[R].Hackensack,NJ:Center for Social andLegal Research,1995. 被引量:1
  • 6Westin A F.Privacy and Freedom[M].New York:Atheneum,1968. 被引量:1
  • 7Bansal G,Zahedi F,Gefen D.The moderating influence ofprivacy concern on the efficacy of privacy assurance mechanisms for building trust:A multiple-contextinvestigation[C]//Proc of rhe Int Conf on Information System (ICIS 2008).Australian:AIS,2008:14-17. 被引量:1
  • 8Hanisar D,Davies S.Global trends in privacy protection:An international survey of privacy,data protection,and surveillance laws and developments[J].Journal of Computer Information Law,1999,18(1):3-111. 被引量:1
  • 9Soltani A,Canty S,Mayo Q,et al.Flash cookies andprivacy[C]//Proc of the AAAI Spring Symp:Intelligent Information Privacy Management 2010.Menlo Park,CA:AAAI,2010:1-8. 被引量:1
  • 10Ayenson M,Wambach D,Soltani A,et al.Flash cookiesand privacy II:Now with HTML5 and etag respawning[OL].(2011-07-29)[2013-02-13].http://ssm.com/abstract= 1898390. 被引量:1

共引文献942

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部