Author:
Rahim Fiza Abdul,Ismail Zuraini,Samy Ganthan Narayana
Reference35 articles.
1. Mont MC, Pearson S, Creese S et al (2011) A conceptual model for privacy policies with consent and revocation requirements. In: Fischer-Hübner S, Duquenoy P, Hansen M et al (eds) Privacy and identity management for life. Springer, Berlin, pp 258–270
2. Manyika J, Chui M, Brown B et al (2011) Big data: the next frontier for innovation, competition, and productivity. McKinsey Global Institute, Sydney
3. Ghazinour K, Majedi M, Barker K (2009) A lattice-based privacy aware access control model. In: 2009 International conference on computational science and engineering, IEEE, Vancouver, BC, pp 154–159
4. Tankard C (2012) Big data security. Netw secur: 5–8. doi:
10.1016/S1353-4858(12)70063-6
5. Varonis (2012) Big data and infosecurity: Research Report
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献