[ 1 ] Lawton G. New Technology Prevents Data Leakage[
J]. Computer,2008,41(9):14-17.
[ 2 ] 冯 梅,蒋鲁宁. DLP 产品的作为与不作为[J]. 中国
信息安全,2012,(2):84-86.
[ 3 ] Papadimitriou P,Garcia-Molina H. A Model for Data
Leakage Detection [ C ] / / Proceedings of the 25th
International Conference on Data Engineering,March 29-
April 2, 2009, Shanghai, China. Washington D. C. , USA:IEEE Press,2009:1307-1310.
[ 4 ] Papadimitriou P, Garcia-Molina H. Data Leakage
Detection [ J ]. IEEE Transactions on Knowledge and
Data Engineering,2011,23(1):51-63.
[ 5 ] Koneru A,Rao G S N,Rao J V. Data Leakage Detection
Using Encrypted Fake Objects[J]. International Journal
of P2P Network Trends and Technology,2013,3(2):
104-110.
[ 6 ] Shobana V, Shanmugasundaram M. Data Leak Data
Detection Using Cloud Computing [ J ]. International
Journal of Emerging Technology and Advanced
Engineering,2013,3(Special Issue 1):111-115.
[ 7 ] Ansari Z S, Jagtap A M, Raut S S. Data Leakage
Detection and E-mail Filtering[J]. International Journal
of Innovative Research in Computer and Communication
Engineering,2013,1(3):565-567.
[ 8 ] Czerwinski S, Fromm R, Hodes T. Digital Music
Distribution and Audio Watermarking [ EB / OL ].
[2014-03-14]. http:/ / www. scientificcommons. org / 4302
5658.
[ 9 ] Agrawal R, Kiernan J. Watermarking Relational
Databases [ C] / / Proceedings of the 28th International
Conference on Very Large Data Bases,August 20-23,
2002,Hong Kong,China. [S. l. ]:VLDB Endowment
Inc. ,2002:155-156.
[10] 赵 耀. 基于小波变换的抵抗几何攻击的鲁棒视频水
印[ J]. 中国科学E 辑: 信息科学,2006,36 (2):
137-152.
[11] Sweeney L. Achieving k-anonymity Privacy Protection
Using Generalization and Suppression [J]. International
Journal on Uncertainty,Fuzziness and Knowledge-based
Systems,2002,10(5):571-588.
[12] Conway W. How Enterprises Can Use Tokenization to
Reduce Risk and Minimize the Cost of PCI DSS
Compliance [ EB / OL ]. [ 2014-03-14 ]. http:/ / blog.
403labs. com.
[13] Choi D,Jin S,Yoon H. A Method for Preventing the
Leakage of the Personal Information on the Internet[
C]/ / Proceedings of ICA0T’06. Washington D. C. , USA:IEEE Press,2006:20-22.
[14] Buneman P,Khanna S,Tan W C. Why and Where:A
Characterization of Data Provenance [C] / / Proceedings
of the 8th International Conference on Database Theory, January 4-6, 2001, London, UK. Berlin, Germany: Springer,2001:316-330.
[15] Buneman P,Tan W C. Provenance in Databases[C] / /
Proceedings of ACM SIGMOD International Conference
on Management of Data, June 11-14, 2007, Beijing, China. New York,USA:ACM Press,2007:1171-1173.
[16] Cui Y, Widom J. Lineage Tracing for General Data
Warehouse Transformations [ J ]. The VLDB Journal,
2003,12(1):41-58.
[17] Jagtap N P,Patil S J,Bhavsar A K. Implementation of
Data Watcher in Data Leakage Detection System [J].
International Journal of Computer& Technology,2012,
3(1):318-322.
[18] Capizzi R, Longo A, Venkatakrishnan V N, et al.
Preventing Information Leaks Through Shadow Executions
[ C ] / / Proceedings of ACSAC ’ 08, Augest 4-6,
2008,Hsinchu, China. Washington D. c. , USA: IEEE
Press,2008:322-331.
[19] 张红艳. 强化非结构化数据管理深度挖掘企业信息价
值[J]. 电子技术与软件工程,2013,(17):261-262.
编辑 金胡考 |