[1] 郭晓科. 大数据[M]. 北京:清华大学出版社, 2013.
[2] 高汉松,桑梓勤. 医疗行业大数据生命周期及治理[J]. 医学信息学杂志, 2013,34(9):7-11.
[3] PORTA A, FAES L, MASE M, et al. An integrated approach based on uniform quantization for the evaluation of complexity of short-term heart period variability: Application to 24 h Holter recordings in healthy and heart failure humans[J]. Chaos, 2007,17(1), DOI: 10.1063/1.2404630.
[4] 胡新平. 医疗数据挖掘中的隐私保护[J]. 医学信息学杂志, 2009,30(8):1-4.
[5] 于广军,杨家泓. 医疗大数据[M]. 上海:上海科学技术出版社, 2015.
[6] 张丞. 移动互联网隐私泄露研究[D]. 北京:北京邮电大学, 2013.
[7] 李威. 移动互联网用户行为分析研究[D]. 北京:北京邮电大学, 2013.
[8] 郭艳华. 位置服务中轨迹隐私保护方法的研究[D]. 武汉:华中师范大学, 2011.
[9] 李响. Android平台下用户隐私泄露研究[D]. 郑州:河南工业大学, 2016.
[10]吴小同. 大数据环境下隐私保护及其关键技术研究[D]. 南京:南京大学, 2017.
[11]孟小峰,张啸剑. 大数据隐私管理[J]. 计算机研究与发展, 2015,52(2):265-281.
[12]SWEENEY L. k-Anonymity: A model for protecting privacy[J]. International Journal of Uncertainty, Fuzziness and Knowledge-based Systems, 2002,10(5):557-570.
[13]LI N H, LI T C, VENKATASUBRAMANIAN S. t-Closeness: Privacy beyond k-Anonymity and l-Diversity[C]// Proceedings of the 2007 IEEE 23rd International Conference on Data Engineering. 2007,1:106-115.〖HJ1.08mm〗
[14]LI N H, LI T C, VENKATASUBRAMANIAN S. Closeness: A new privacy measure for data publishing[J]. IEEE Transactions on Knowledge and Data Engineering, 2010,22(7):943-956.
[15]DWORK C, MCSHERRY F, NISSIM K, et al. Calibrating noise to sensitivity in private data analysis[C]// Proceedings of the 2006 Theory of Cryptography Conference. 2006:265-284.
[16]SANDHU R S, SAMARATI P. Access control: Principle and practice[J]. IEEE Communications Magazine, 1994,32(9):40-48.
[17]RAY I, KUMAR M, YU L J. LRBAC: A location-aware role-based access control model[C]// Proceedings of the 2nd International Conference on Information Systems Security. 2006:147-161.
[18]苏晴,李永珍. 基于访问控制的隐私保护方法的研究[J]. 延边大学学报(自然科学版), 2016,42(1):69-74.
[19]于光许. 计算机网络安全中数据加密技术的运用研究[J]. 电脑知识与技术, 2013,9(6):1338-1339.
[20]LIN H Y, SHEN S T, TZENG W G, et al. Toward data confidentiality via integrating hybrid encryption schemes and hadoop distributed file system[C]// Proceedings of the 2012 IEEE 26th International Conference on Advanced Information Networking and Applications. 2012:740-747.
[21]ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data possession at untrusted stores[C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. 2007:598-609.
[22]黄永刚. 基于区块链技术的电子健康档案安全建设[J]. 中华医学图书情报杂志, 2016,25(10):38-40.
[23]李涛,王永剑,邢月秀,等. 移动终端的多维度隐私泄露评估模型研究[J]. 计算机学报, 2018,41(9):2134-2147.
[24]邢月秀,胡爱群,王永剑,等. 多维度iOS隐私泄露评估模型研究[J]. 网络与信息安全学报, 2016,2(4):73-79.
[25]邢月秀. 智能手机隐私泄露检测技术的研究与实现[D]. 南京:东南大学, 2016.
[26]陈细平. 移动环境下基于区域互换的位置隐私保护模型与算法研究[D]. 秦皇岛:燕山大学, 2014.
[27]戴威. 基于细粒度着色权限机制的Android隐私数据保护模型的设计与实现[D]. 南京:南京大学, 2012.
[28]孙庆庆. 一种权限粒度可控的Android隐私保护模型的设计与实现[D]. 北京:北京邮电大学, 2014.
[29]WANG B Y, LI B C, LI H. Oruta: Privacy-preserving public auditing for shared data in the cloud[C]// Proceedings of the 2012 IEEE 5th International Conference on Cloud Computing. 2012:295-302.
[30]WANG B Y, LI B C, LI H. Panda: Public auditing for shared data with efficient user revocation in the cloud[J]. IEEE Transactions on Services Computing, 2015,8(1):92-106.
[31]AGGARWAL C C, YU P S. A general survey of privacy-preserving data mining models and algorithms[M]// Privacy-Preserving Data Mining. Boston: Springer, 2008:11-52.
[32]VAIDYA J, CLIFTON C. Privacy-preserving k-means clustering over vertically partitioned data[C]// Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2003:206-215. |