Security and privacy in big data

被引:1
作者
Xiang, Yang [1 ,2 ]
Au, Man Ho [3 ]
Kutylowsky, Miroslaw [4 ]
机构
[1] Deakin Univ, Sch Informat Technol, Burwood, Vic, Australia
[2] Deakin Univ, Ctr Cyber Secur Res, Burwood, Vic, Australia
[3] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Hong Kong, Peoples R China
[4] Wroclaw Univ Technol, Fac Fundamental Problems Technol, Wroclaw, Poland
关键词
D O I
10.1002/cpe.3796
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
引用
收藏
页码:2856 / 2857
页数:2
相关论文
共 10 条
[1]   Vertex re-identification attack using neighbourhood-pair properties [J].
Abawajy, Jemal ;
Ninggal, Mohd Izuan Hafez ;
Herawan, Tutut .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (10) :2906-2919
[2]   A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storage [J].
Chen, Zhenhua ;
Li, Shundong ;
Huang, Qiong ;
Wang, Yilei ;
Zhou, Sufang .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (10) :2858-2876
[3]   Secure routing and resource allocation based on game theory in cooperative cognitive radio networks [J].
Fang, He ;
Xu, Li ;
Xiao, Liang .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (10) :2958-2977
[4]   QoS and trust-aware coalition formation game in data-intensive cloud federations [J].
Hassan, Mohammad Mehedi ;
Abdullah-Al-Wadud, Mohammad ;
Almogren, Ahmad ;
Rahman, S. K. Md Mizanur ;
Alelaiwi, Abdulhameed ;
Alamri, Atif ;
Hamid, Md Abdul .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (10) :2889-2905
[5]   Versatile lightweight key distribution for big data privacy in vehicular ad hoc networks [J].
Qin, Bo ;
Wang, Linxiao ;
Wang, Yujue ;
Wu, Qianhong ;
Shi, Wenchang ;
Liang, Bin .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (10) :2920-2939
[6]   An overview of Fog computing and its security issues [J].
Stojmenovic, Ivan ;
Wen, Sheng ;
Huang, Xinyi ;
Luan, Hao .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (10) :2991-3005
[7]   Quantum private comparison protocol with cloud quantum computing [J].
Tan, Xiaoqing ;
Zhang, Xiaoqian .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (10) :3006-3020
[8]   Improved handover authentication and key pre-distribution for wireless mesh networks [J].
Yang, Xu ;
Huang, Xinyi ;
Han, Jinguang ;
Su, Chunhua .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (10) :2978-2990
[9]   SDIVIP2: shared data integrity verification with identity privacy preserving in mobile clouds [J].
Yu, Yong ;
Ni, Jianbing ;
Xia, Qi ;
Wang, Xiaofen ;
Yang, Haomiao ;
Zhang, Xiaosong .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (10) :2877-2888
[10]   Partial fingerprint indexing: a combination of local and reconstructed global features [J].
Zhou, Wei ;
Hu, Jiankun ;
Wang, Song ;
Petersen, Ian ;
Bennamoun, Mohammed .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (10) :2940-2957