2V.M.Schonberger,K.Culier.Big data:a revolution that will transform how we live,work and think.Boston:Houghton Mifflin Harcourt,2013.
3S.Marchal,X.Y.Jiang,R.State,et al.A big data architecture for large scale security monitoring.IEEE International Congress on Big Data.2014,pp.56-63.
4R.X.Lu,H.Zhu,X.M.Liu,et al.Toward efficient and privacy-preserving computing in big data era.IEEE Network.2014,pp.46-50.
5L.Liu,J.Lin.Some special issues of network security monitoring on big data environments.IEEE Conference on Dependable,Autonomic and Secure Computing.2013,pp.10-15.
6M.C.Mont,S.Pearson,P.Bramhall.Towards accountable management of identity and privacy:sticky policies and enforceable tracing services.IEEE Conference on Database and Expert Systems Applications.2003,pp.377-382.
7裴新,虞慧群.安全策略驱动的资源分割技术.中国科技论文在线,2014.
8Y.Zhu,H.X.Hu.Cooperative provable data possession for integrity verification in multicloud storage,IEEE transactions on parallel and distributed systems.Vol.23,2012,pp.2231-2244.
9G.Ateniese,R.C.Bums,R.Curtmola,J.Herring,L.Kissner,Z.Peterson,D.Song.Provable data possession at untrusted stores,ACM CCS'07.2007,pp.598-609.
10K.Bowers,A.Juels,A.Oprea.HAIL:A high-availability and integrity layer for cloud storage.Proceedings 16th ACM Conference on Computer and Comm.Security.2009,pp.187-198.