Computer Science ›› 2022, Vol. 49 ›› Issue (4): 67-73.doi: 10.11896/jsjkx.211000010
• Special Issue of Social Computing Based Interdisciplinary Integration • Previous Articles Next Articles
SUN Xuan1,2,3, WANG Huan-xiao1
CLC Number:
[1] SUN X,SUN T.Dynamic Urban Governance in a Big Data Computing Environment:Conceptual Connotation and Application Framework[J].E-government,2020(1):20-28. [2] MARRISON C.Gartner warns of big data security problems[J].Network Security,2014(6):1-20. [3] MEHMOOD A,NATGUNANATHAN I,XIANG Y,et al.Pro-tection of big data privacy[J].IEEE Access,2016,4:1821-1834. [4] CARDENAS A,MANADHATA P,RAJAN S.Big Data Analytics for Security[J].IEEE Security & Privacy,2013,11(6):74-76. [5] ERDMANN J.As Personal Genomes Join Big Data Will Privacy and Access Shrink?[J].Chemistry & Biology,2013,20(1):1-2. [6] WANG D,ZHAO W B,DING Z M.An Overview of Key Tech-nology Analysis of Big Data Security Assurance[J].Journal of Beijing University of Technology,2017,43(3):335-349,322. [7] CHEN X S,YANG L,LUO Y G.Big data security protection technology[J].Advanced Engineering Sciences,2017,49(5):1-12. [8] WEI K M,WENG J,REN K.Big data security protection technology[J].Chinese Journal of Network and Information Security,2016,2(4):1-11. [9] TIAN H L,ZHANG Y,XU X H,et al.Trusted solid state-drive:a new foundation for big data security[J].Chinese Journal of Computers,2016,39(1):154-168. [10] Information technology—Security techniques—Information se-curity management systems—Requirements:ISO/IEC 27001:2013[S].Switzerland:Schweizerische Normen-Vereinigung(SNV),2013. [11] TANKARD C.Big data security[J].Network Security,2012(7):5-8. [12] KSHETRI N.Big data’s impact on privacy,security and consumer welfare[J].Telecommunications Policy,2014,38(11):1134-1145. [13] FENG D G,ZHANG M,LI H.Big data security and privacy protection[J].Chinese Journal of Computers,2014,37(1):246-258. [14] TIAN W.The Connotation,Current Situation and Basis of Public Big Data Information Security Legislation[J].Henan Social Sciences,2018,26(7):86-91. [15] HAN W.The balance of security and freedom-analysis of the purpose of data security legislation[J].Science Technology and Law,2019(6):41-48,67. [16] HU K,LIU D,LIU M H.Research on the Security Understan-ding and Countermeasures of Big Data[J].Telecommunication Science,2014,30(2):112-117,122. [17] HUANG G B,ZHENG L.Research on Big Data Information Security Risk Framework and Countermeasures[J].Researches in Library Science,2015(13):24-29. [18] XU Y.Challenges and countermeasures facing China in the era of big data[J].Forum on Science and Technology in China,2015 (3):24-29. [19] LIU Y,DENG Q,PENG Y S.Security Challenges Facing Data Sovereignty and Privacy Protection in the Big Data Era[J].Modernization of Management,2019,39(1):104-107. [20] MENG X F,CHI X.Big data management:concepts,technolo-gies and challenges[J].Journal of Computer Research and Development,2013,50(1):146-169. [21] CHEN H,WANG X X,DUAN Y Q.Analysis and Research on the Value Orientation of Chinese Government’s Big Data Policy[J].Library and Information Service,2020,64(11):19-27. [22] ZHANG X J,WANG W Q,TANG C L.Research on the Policies and Regulations of China-US Government Data Opening and Personal Privacy Protection[J].Information Studies:Theory & Application,2016,39(1):38-43. [23] CAI Q X,HUANG R H.Policy and Regulation Guarantee of U.S.Government Data Opening and Its Enlightenment to my country[J].Library and Information,2017(1):10-17. [24] YU H.Opportunities,Challenges and Countermeasures of Go-vernment Data Management in the Big Data Era[J].Chinese Public Administration,2015(3):127-130. [25] DU H H.Research on the Construction of Evaluation Systemfor Privacy Protection of my country’s Government Data Open Platform[J].Journal of Information,2020(3):172-179. [26] WANG C H.Analysis of the Six Legal Systems of “Network Security Law”[J].Journal of Nanjing University of Posts and Telecommunications (Natural Science),2017,37(1):1-13. [27] The network security grade protection system 2.0 standard is officially released[EB/OL].(2019-05-16) [2021-09-13].http://it.people.com.cn/n1/2019/0516/c1009-31087714.html. [28] KOU G,WANG S,Tang G.Research on Key Technologies of Network Security Situational Awareness for Attack Tracking Prediction[J].Chinese Journal of Electronics,2019,28(1):166-175. [29] SINGH S,SHARMA P K,MOON S Y,et al.A comprehensive study on APT attacks and countermeasures for future networks and communications:challenges and solutions[J].Journal of Supercomputing,2016,75:4543-4574. [30] BREAUX T,BAUMER D.Legally “reasonable” security re-quirements:A 10-year FTC retrospective-Science Direct[J].Computers & Security,2011,30(4):178-193. [31] LIN C,SU W B,MENG K,et al.Cloud computing security:architecture,mechanism and model evaluation[J].Chinese Journal of Computers,2013,36(9):1765-1784. [32] JAIN R,PAUL S.Network virtualization and software defined networking for cloud computing:a survey. [J].IEEE Communications Magazine,2013,51(11):24-31. [33] FAWCETT L,SCOTT-HAYWARD S,BROADBENT M,et al.Tennison:A Distributed SDN Framework for Scalable Network Security[J].IEEE Journal on Selected Areas in Communications,2018,36(12):2805-2818. [34] LI B H,LI B,REN W,et al.Research on Resource Security Management Mechanism Oriented to Trusted Cloud Computing[J].Journal of Cyber Security,2018,3(2):76-86. [35] ZHANG K,MA L,XU Y F.Research on Security Assurance System of Complex Information System[J].Chinese Journal of Management Science,2000(S1):336-346. [36] LI J H.Overview of Threat Intelligence Awareness,Sharing and Analysis Technology in Cyberspace[J].Chinese Journal of Network and Information Security,2016,2(2):16-29. [37] DING H F,MENG Q Q,WANG X,et al.Analysis of data security and privacy protection countermeasures of government data opening oriented to data life cycle[J].Journal of Information,2019,38(7):151-159. [38] CHEN C B,CHENG S.Regulatory Responsibility in Government Data Opening:Practical Dilemma and Optimal Path[J].Journal of Information,2019,38(10):188-194. |
[1] | GU Xiao-yan and XIA Zhi-qiang. Design and Implementation of Teaching Equipment Management System Based on Two-dimensional Code [J]. Computer Science, 2017, 44(Z6): 523-525. |
[2] | SUN Zhen-yu, SHI Jing-yan, JIANG Xiao-wei, ZOU Jia-heng and DU Ran. Evaluation of Resource Management Methods for Large High Energy Physics Computer Cluster [J]. Computer Science, 2017, 44(10): 85-90. |
[3] | CHEN Guang-zhi,PAN Rong and LI Lei. Survey and Research Trends of Workflow Modeling Techniques [J]. Computer Science, 2014, 41(Z6): 11-17. |
[4] | YU Jun-yang and GU Zi-yao. Design and Implementation of Personnel Training Information MS Based on Business Rule Engine [J]. Computer Science, 2013, 40(Z11): 428-431. |
[5] | YANG Yang , JIA Jun-jun ,LI Wei-wei. Development and Application Research of Network File Management System Based on ASP. NET [J]. Computer Science, 2011, 38(Z10): 222-224. |
[6] | ZHONG Guo-xiang (Chongqing Education College, Chongqing 400067, China). [J]. Computer Science, 2009, 36(4): 125-128. |
[7] | LI Heng YANG Dan FANG Wei-tao HU Yue WANG Xian-wei (Department of Information Center,Chongqing University,Chongqing 400030,China). [J]. Computer Science, 2008, 35(8): 293-296. |
[8] | WU Di JIA ,Zhuo-Sheng (Institute of Computer Science and Engineering, Beijing Jiaotong University, Beijing 100044). [J]. Computer Science, 2008, 35(3): 120-122. |
[9] | HE Wei, WANG Hai-Yang (School of Computer Science and Technology, Shandong University,Jinan 250100). [J]. Computer Science, 2008, 35(3): 117-119. |
[10] | ZHAO Zheng (Graduate University of Chinese Academy of Sciences, Beijing 100049). [J]. Computer Science, 2008, 35(2): 104-106. |
[11] | . [J]. Computer Science, 2007, 34(8): 184-186. |
[12] | . [J]. Computer Science, 2007, 34(7): 203-207. |
[13] | . [J]. Computer Science, 2007, 34(3): 87-89. |
[14] | XI Lei ,SHI Lei, CHE Yin-Chao ,WANG Xiao-Lei (Information & Management Science College, Henan Agricultural University, Zhengzhou 450002). [J]. Computer Science, 2007, 34(3): 132-134. |
[15] | . [J]. Computer Science, 2007, 34(10): 149-151. |
|