2Lawton G. New Technology Prevents Data Leak- age[ J]. Computer,2008,41 (9) :14-17.
3Papadimitriou P, Garcia-Molina H. A Model for Data Leakage Detection [ C] //Proceedings of the 25th International Conference on Data Engineering, March 29- April 2, 2009, Shanghai, China. Washington D. C. , USA : IEEE Press, 2009 : 1307-1310.
4Papadimitriou P, Garcia-Molina H. Data Leakage Detection [ J ]. IEEE Transactions on Knowledge and Data Engineering ,2011,23 ( 1 ) :51-63.
5Koneru A, Rao G S N,Rao J V. Data Leakage Detection Using Encrypted Fake Objects [ J ]. International Journal of P2P Network Trends and Technology, 2013,3 ( 2 ) : 104-110.
6Shobana V, Shanmugasundaram M. Data Leak Data Detection Using Cloud Computing [ J ]. International Journal of Emerging Technology and Advanced Engineering ,2013,3 ( Special Issue 1 ) : 111-115.
7Ansari Z S, Jagtap A M, Raut S S. Data Leakage Detection and E-mail Filtering [ J ]. International Journal of Innovative Research in Computer and Communication Engineering ,2013,1 (3) :565-567.
8Czerwinski S, Fromm R, Hodes T. Digital Music Distribution and Audio Watermarking [ EB/OL ]. [ 2014-03 -14 ]. http ://www. scientificcommons, org/4302 5658.
9Agrawal R, Kiernan J. Watermarking Relational Databases [ C ]//Proceedings of the 28th International Conference on Very Large Data Bases, August 20-23, 2002, Hong Kong, China. [ S. 1. ] . VLDB Endowment Inc. ,2002 : 155-156.
10Sweeney L. Achieving k-anonymity Privacy Protection Using Generalization and Suppression [ J ]. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems ,2002,10(5 ) :571-588.