[1] |
S. Wang, H. Wang, X. P. Qin , et al., “Architecting Big Data: Challenges, Studies, and Forecasts,” Chinese Journal of Computers, Vol. 3, No. 10, pp. 1741-1752, 2011
|
[2] |
X. F. Meng , “Overview of Big Data Management, ” Mechanical Industry Press , pp. 84-110, 2017
|
[3] |
G. D. Abowd, A. K. Dey, P. J. Brown , et al., “Towards a Better Understanding of Context and Context-Awareness,” International Symposium on Handheld & Ubiquitous Computing, Vol. 1707, pp. 304-307, 1999
|
[4] |
R. J. Hulsebosch, A. H. Salden , et al., “Context Sensitive Access Control,” in Proceedings of the SACMAT, pp. 111-118, Stockholm, Sweden, 2005
|
[5] |
Z. K. Zhang, J. G. Xiao, X. N. Kong , “XML-based Context-Constraint Access Control Policy Management,” Acta Scientiarum Naturalium Universitatis Pekinensis, Vol. 46, No. 4, pp. 539-546, 2010
|
[6] |
S. S. Emami and S. Zokaei, “A Context-Sensitive Dynamic Role-based Access Control Model for Pervasive Computing Environments,” The ISC Int'l Journal of Information Security, Vol. 2, No. 1, pp. 47-66, 2010
|
[7] |
J. Zhang and F. Xiong, “Survey on Technologies of Internet Privacy Preservation,” Application Research of Computers, Vol. 22, No. 7, pp. 9-411, 2005
|
[8] |
S. A. Mcilraith, T. C. Son, H. L. Zeng , “Semantic Web Services,” IEEE Intelligent Systems, Vol. 16, No. 2, pp. 46-53, 2001
|
[9] |
A. Tumer, A. Dogac, I. H. Toroslu . “A Semantic based Privacy Framework for Web Services,” in Proceedings of WWW'03 Workshop on E-Services and the Semantic Web, pp. 356-362, 2003
|
[10] |
T. H. Hinke, H. S. Delugach, P.W. Randall , “Protecting Databases from Inference Attacks,” Computers & Security, Vol. 16, No. 8, pp. 687-708, 1997
|
[11] |
K. Hashimoto, H. Kawai, Y. Ishihara , et al., “ Decidability of the Security Against Inference Attacks Using a Functional Dependency on XML Databases, ” IEICE Transactions on Information & Systems, Vol. 95, No. D, pp. 1365- 1374. 2012
|
[12] |
Y. Xu, J. Ma, Q. F. He , et al., “The Inference Control of Functional Dependency based on Inference Channel,” Computer Simulation, Vol. 25, No. 1, pp. 88-91, 2008
|
[13] |
Z. J. Zhang, J. S. Dai, J. M Xiao , “Approach to Inference Disclosure Detection in Secure Database,” Journal of Jilin University (Information Science Edition), Vol. 23, No. 3, pp. 294-298, 2005
|
[14] |
Z. Xu, G. L. Chen, J. H. Li , “Inference Control of XML based on Inference Tree,” Communications Technology, Vol. 48, No. 2, pp. 208-213, 2015
|
[15] |
Z. Li , “Research on Database Reasoning Control Technology, ” Huazhong University of Science and Technology, 2006
|
[16] |
M. J. Wang, J. Wang, L. H. Guo , et al., “Inverted XML Access Control Model based on Ontology Semantic Dependency,” Computers, Materials & Continua, Vol. 55, No. 3, pp. 465-482, 2018
|
[17] |
C. Zhang, J. F. Naughton, D. J. DeWitt , et al., “On Supporting Containment Queries in Relational Database Management Systems,” in Proceedings of the 27th ACM SIGMOD, pp. 1-12, Santa Barbara, 2001
|
[18] |
S. Tatarinov, D. Viglas, K. J. Beyer , et al., “Storing and Query in Ordered XML Using a Relational Database System,” in Proceedings of the IEEE Computer Society ACM SIGMOD 2002, pp. 204-215, Los Alamitos, CA, 2002
|
[19] |
X. Wu, M. Lee, W. Hsu , “A Prime Number Labeling Scheme for Dynamic Ordered XML Trees,” in Proceedings of the IEEE Computer Society 20th International Conference on Data Engineering (ICDE 2004), pp. 66-78, Los Alamitos, CA, 2004
|
[20] |
L. H. Guo, J. Wang, H. Du , “An XML Encoding Scheme based on Concentric Circular Cutting,” Computer Engineering, Vol. 39, No. 6, pp. 52-55, 2013
|
[21] |
Niagara, “NIAGARA Experimental Data [EB/OL],” ( http://www.cs.wisc.edu/niagara/data/
|
[22] |
R. Indrajit, T. V. S. Srinath, K. Ann , et al., “Airavat: Security and Privacy for MapReduce,” Usenix Symposium on Networked Systems Design & Implementation, pp. 297-312, 2009
|