共 90 条
[42]
Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
[43]
RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:1054-1067
[44]
Farkas C., 2002, ACM SIGKDD EXPLORATI, V4, P6, DOI DOI 10.1145/772862.772864
[45]
Fisher RA, 1988, UCI Machine Learning Repository
[46]
Goldberg I, 1996, PROCEEDINGS OF THE SIXTH ANNUAL USENIX SECURITY SYMPOSIUM: FOCUSING ON APPLICATIONS OF CRYPTOGRAPHY, P1
[47]
Gong L, 1997, PROCEEDINGS OF THE USENIX SYMPOSIUM ON INTERNET TECHNOLOGIES AND SYSTEMS, P103
[48]
Gupta A., 1995, DATA ENG B, V18, P3
[49]
POSTER: Access Control Model for the Hadoop Ecosystem
[J].
PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17),
2017,
:125-127
[50]
An Attribute-Based Access Control Model for Secure Big Data Processing in Hadoop Ecosystem
[J].
PROCEEDINGS OF THE THIRD ACM WORKSHOP ON ATTRIBUTE-BASED ACCESS CONTROL (ABAC'18),
2018,
:13-24