[1] 姜山,王刚.大数据对图书馆的启示[J].图书馆工作与研究,2013(4):52-54.
[2] 彭华杰.大数据时代图书馆读者的隐私危机与隐私保护[J].图书馆工作与研究,2014(12):56-59.
[3] TAJANI A[EB/OL].[2018-03-19].https://twitter.com/ep_president/status/975683240777453569.
[4] 清华大学数据库导航系统-x server版[EB/OL].[2018-11-20]. http://nav.lib.tsinghua.edu.cn/xport/dbdh.htm.
[5] POLANKA S. OverDrive announces a series of "Big Data" reports|NSR[EB/OL].[2017-03-20]. http://www.noshelfrequired.com/overdrive-announces-a-series-of-big-data-reports/.
[6] IEEE隐私政策. IEEE-privacy & opting out of cookies[EB/OL].[2017-04-05].http://www.ieee.org/about/help/security_privacy.html.
[7] Elsevier privacy policy[EB/OL].[2016-12-29]. https://www.elsevier.com/legal/privacypolicy.
[8] SpringerLink隐私声明. Legal information Springer[EB/OL].[2017-04-05].https://link.springer.com/termsandconditions.
[9] OverDrive帐户隐私政策[EB/OL].[2018-11-20]. http://company.overdrive.com/privacy-policy/.
[10] 廖璠,黄丹珠.国外图书馆用户隐私保护理论与实践研究进展[J].情报理论与实践,2012(4):120-123.
[11] 孟小峰,张啸剑.大数据隐私管理[J].计算机研究与发展,2015(2):265-281.
[12] 李爱国,曹翔,汪社教.图书馆用户信息资源化过程中用户隐私信息保护问题与对策[J].图书情报工作,2015,59(13):26-30.
[13] 中共中央网络安全和信息化领导小组办公室.国家网络空间安全战略[EB/OL].[2018-11-20].http://www.cac.gov.cn/2016-12/27/c_1120195926.htm?from=timeline.
[14] YOU L, YANG L, YU W, et al. A cancelable fuzzy vault algorithm based on transformed fingerprint features[J]. Chinese journal of electronics, 2017, 26(2):236-243.
[15] 张衠,李兆雄.大数据本地存留与跨境流动问题研究[J].信息安全与通信保密,2015(6):65-69.
[16] ENSERINK M, CHIN G. The end of privacy[J]. Science, 2015, 347(6221), 490-491.
[17] ROY I, SETTY S, KILZER A, et al. Airavat:security and privacy for MapReduce[C]//Proceedings of the 7th USENIX conference on networked systems design and implementation. San Jose:USENIX Association Berkeley, 2010:1-16.
[18] ZHANG G, YANG Y, CHEN J. A historical probability based noise generation strategy for privacy protection cloud computation[J]. Journal of computer and system sciences, 2012, 78(5):1374-1381.
[19] WANG C, WANG Q, REN K, et al. Privacy-preserving public auditing for data storage security in cloud computing[C]//Proceedings of the 29th INFOCOM 2010. Piscataway:IEEE, 2010:1-9.
[20] ZHANG L, YAN Z, KANTOLA R. A review of homomorphic encryption and its applications[C]//Proceedings of the 9th EAI international conference on mobile multimedia communication. Brussels:ICST, 2016:97-106.
[21] CHILLOTTI I, GAMA N, GEORGIEVA M, et al. Faster fully homomorphic encryption:bootstrapping in less than 0.1 Seconds[C]//Proceedings of the 22nd international conference on the theory and application of cryptology and information security (ASIACRYPT 2016). Berlin:Springer, 2016:3-33.
[22] ARDAGNA C, CREMONINI M, SABRINA D, et al. An obfuscation-based approach for protecting location privacy[J]. IEEE transactions on dependable and secure computing, 2010, 8(1):13-27.
[23] PAN X, XU J, MENG X. Protecting location privacy against location-dependent attacks in mobile services[J]. IEEE transactions on knowledge and data engineering, 2012, 24(8):1506-1519.
[24] YANG D, GAVIGAN J, O' HEARN Z. Survey of confidentiality and privacy preserving technologies for blockchains[EB/OL].[2018-04-05].https://www.r3cev.com/blog/2017/3/8/survey-of-confidentiality-and-privacy-preserving-technologies-for-blockchains. |