没有合适的资源?快使用搜索试试~ 我知道了~
5G14-Zotero 报告-关键词(大数据安全+隐私+治理+爆发+风险)文献1
需积分: 0 1 下载量 31 浏览量
2022-08-03
23:53:29
上传
评论
收藏 1.37MB PDF 举报
温馨提示
试读
189页
摘要Abstract(#br)Inthiswork,aCubicsplinecurvebasedAsymmetricmodeencrypting data is
资源详情
资源评论
资源推荐
“复式转型”:地政府数据治改的逻辑分析
类型
期刊章
作者
张翔;
期
12
码
37-41
期刊
中国政管
ISSN
1006-0863
期
2018
引次数
11-1145/D
存档位置
CNKI
其它
00000
语
中;
摘要
地政府的数据治改内嵌于服务型政府建设的总情境中。当前,服务
型政府建设过程临着"增压"与"提质压"并存的"双重压"。由于"
双重压"的作,地政府的数据治改呈现出"复式转型"的逻辑特点,
即地政府是同时从"存数据治"与"增数据治"两个同维度推进
数据治改。在"复式转型"的过程中,地政府数据管平难以撑
数据治改的适应性困境逐渐显现出来。具体表现为三个基本盾:是
数据共享与数据安全之间的盾,是数据所有权与数据使权之间的盾,
三是数据公共性与部益性之间的盾。为解决这些盾,地政府的
数据治改需要抓住提"数据管平"为基础与建设"数据交平台"两
个改点,分层次地展开改。
添加期
4/11/2019, 5:20:47 AM
修改期
4/11/2019, 5:21:26 AM
标签:
地政府
,
data management
,
数据管
,
local government
,
" Duplex Transition"
,
“复式转型”
,
big
data governance
,
governmental reform
,
数据治
,
政府改
笔记:
The following values have no corresponding Zotero field:
AD 福建师范学公共管学院;福建师范学政治发展与地治研究中;
标签:
_RW import
Zotero 报告 zotero://report/library/items?itemKey=RQDCAESI,9YBY9BG...
1 of 189 2019/4/11, 05:29
《数据安全与隐私保护 过程》国际标准提案研究
类型
期刊章
作者
克鹏;朱红儒;张东;
期
05
码
21-23+38
期刊
信息技术与标准化
ISSN
1671-539X
期
2018
引次数
11-4753/TN
存档位置
CNKI
语
中;
摘要
基于我国主研究制定的国家标准《数据安全能成熟度模型》,提出《
数据安全与隐私保护过程》国际标准提案,通过定义数据安全与隐私保护
的过程参考模型、过程评估模型和过程成熟度模型,帮助数据的参与组织
评估身的数据安全与隐私保护的能准,建数据安全与隐私保护
能的提升案;并介绍该国际标准项提案的编制背景、标准进展、技术
内容。
添加期
4/11/2019, 5:20:47 AM
修改期
4/11/2019, 5:20:47 AM
标签:
数据安全
,
big data security
,
security standard
,
安全标准
,
maturity model
,
security and privacy
,
安全与隐私
,
成熟度模型
笔记:
The following values have no corresponding Zotero field:
AD 阿巴巴(中国)有限公司;
标签:
_RW import
A big data approach to the concordance of the toxicity of pharmaceuticals
in animals and humans
类型
期刊章
作者
Matthew Clark;;Thomas Steger-Hartmann
Zotero 报告 zotero://report/library/items?itemKey=RQDCAESI,9YBY9BG...
2 of 189 2019/4/11, 05:29
期刊
Regulatory Toxicology and Pharmacology
期
2018 vo 96
存档位置
CNKI
其它
00000
摘要
Abstract(#br)Although lack of efficacy is an important cause of late stage
attrition in drug development the shortcomings in the translation of toxicities
observed during the preclinical development to observations in clinical trials or
post-approval is an ongoing topic of research. The concordance between
preclinical and clinical safety observations has been analyzed only on relatively
small data sets, mostly over short time periods of drug approvals. We therefore
explored the feasibility of a big-data analysis on a set of 3,290 approved drugs
and formulations for which 1,637,449 adverse events were reported for both
humans animal species in regulatory submissions over a period of more than 70
years. The events reported in five species – rat, dog, mouse, rabbit, and
cynomolgus monkey - were treated as diagnostic tests for human events and the
diagnostic power was computed for each event/species pair using likelihood
ratios.(#br)The animal-human translation of many key observations is confirmed
as being predictive, such as QT prolongation and arrhythmias in dog. Our study
confirmed the general predictivity of animal safety observations for humans, but
also identified issues of such automated analyses which are on the one hand
related to data curation and controlled vocabularies, on the other hand to
methodological changes over the course of time.
添加期
4/11/2019, 5:20:47 AM
修改期
4/11/2019, 5:21:09 AM
标签:
Big data
,
Risk assessment
,
Adverse event
,
Concordance
,
Predictive value
,
Predictivity of animal
studies
,
Signal detection
,
Translation
笔记:
The following values have no corresponding Zotero field:
AD Elsevier R&D Solutions, 1600 JFK Blvd, Philadelphia, PA, 19103, USA;;Investigational
Toxicology, Bayer AG, 13353, Berlin, Germany
标签:
_RW import
A Big Data Privacy Protection Solution Based on Compressive Sensing
Theory
类型
期刊章
作者
DENG-LONG LV;;SHI-BING ZHU
Zotero 报告 zotero://report/library/items?itemKey=RQDCAESI,9YBY9BG...
3 of 189 2019/4/11, 05:29
期
2017
存档位置
CNKI
其它
00000
摘要
This paper analyzes the progress of privacy protection in big data environment,
and introduces the theory of compressive sensing, and then, proposes a new big
data privacy protection method based on compressed sensing and discusses the
realization of the method. According to the analysis, this new method has a
certain reference value in the realization of big data privacy preserving
technology.
添加期
4/11/2019, 5:20:47 AM
修改期
4/11/2019, 5:21:12 AM
A big–data security mechanism based on fully homomorphic encryption
using cubic spline curve public key cryptography
类型
期刊章
作者
Addepalli V. N. Krishna
期
6 vo 39
期刊
Journal of Information and Optimization Sciences
期
2018
存档位置
CNKI
其它
00000
摘要
Abstract(#br)In this work, a Cubic spline curve based Asymmetric mode
encrypting data is used for Fully Homomorphic encryption on Big–Data. A
steady state, one dimensional equation is integrated over a control volume to
generate global variables. These global variables are used to calculate public key
from chosen private key. Known the Public and private keys, the mechanism is
used in providing security on Big data. The mechanism can be extended to
Homorphic encryption where Arithmetic operations like addition and
multiplication can be done on cipher texts without disturbing their integrity. Thus
the proposed work supports the Security features even though the data is stored in
Public Domain like cloud.
添加期
4/11/2019, 5:20:47 AM
修改期
4/11/2019, 5:21:22 AM
标签:
Big Data Security
,
Crypto Analysis
,
Fully Homomorphic Encryption
,
Information theory
,
Numerical Analysis
,
Plain and Cipher texts
,
Public & Private Keys
笔记:
Zotero 报告 zotero://report/library/items?itemKey=RQDCAESI,9YBY9BG...
4 of 189 2019/4/11, 05:29
The following values have no corresponding Zotero field:
AD Department of Computer Science & Engineering, Faculty of Engineering , Christ University ,
Bengaluru 560074 , Karnataka , India
标签:
_RW import
A Distributed Authentication and Authorization Scheme for In-Network
Big Data Sharing
类型
期刊章
作者
Ruidong Li;;Hitoshi Asaeda;;Jie Li;;Xiaoming Fu
期刊
Digital Communications and Networks
期
2017
存档位置
CNKI
其它
00000
摘要
Abstract(#br)Big data strongly demands a network infrastructure having the
capability to efficiently support data sharing and retrieval. Information-Centric
Networking (ICN) approach is an emerging approach to satisfy this demand,
where big data is ubiquitously cached in the network and retrieved through
names. However, the existing authentication and authorization schemes mostly
rely on the centralized servers to provide certificate and mediation services for
data retrieval, which causes much traffic overhead for securely sharing data in a
distributed manner. To solve this problem, we employ the Identity-Based
Cryptography (IBC) to propose a distributed authentication and authorization
scheme (DAAS), where the Identity-Based Signature (IBS) is used to achieve
distributed verifications on the identities of Publishers and Users and the
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is used to enable the
distributed and fine-grained authorization. DAAS consists of three phases,
initialization, secure data publication, and secure data retrieval, which seamlessly
integrate authentication and authorization with the Interest/Data communication
paradigm in ICN. In particular, we propose trustworthy registration and Network
Operator and Authority Manifest (NOAM) dissemination to provide initial secure
registration and enable efficient authentication for global data retrieval.
Meanwhile, Attribute Manifest (AM) distribution coupling with automatic
attribute update is proposed to reduce the cost for attribute retrieval. We examine
the performance of the proposed DAAS, which shows that it can achieve lower
bandwidth cost compared to the existing schemes.
添加期
4/11/2019, 5:20:47 AM
修改期
4/11/2019, 5:21:05 AM
标签:
Big data
,
security
,
access control
,
authentication
,
in-network data sharing
,
information-centric
network
Zotero 报告 zotero://report/library/items?itemKey=RQDCAESI,9YBY9BG...
5 of 189 2019/4/11, 05:29
剩余188页未读,继续阅读
色空空色
- 粉丝: 53
- 资源: 331
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 筷手引流工具.apk
- 论文(最终)_20240430235101.pdf
- 基于python编写的Keras深度学习框架开发,利用卷积神经网络CNN,快速识别图片并进行分类
- 最全空间计量实证方法(空间杜宾模型和检验以及结果解释文档).txt
- 5uonly.apk
- 蓝桥杯Python组的历年真题
- 2023-04-06-项目笔记 - 第一百十九阶段 - 4.4.2.117全局变量的作用域-117 -2024.04.30
- 2023-04-06-项目笔记 - 第一百十九阶段 - 4.4.2.117全局变量的作用域-117 -2024.04.30
- 前端开发技术实验报告:内含4四实验&实验报告
- Highlight Plus v20.0.1
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
评论0