1 |
McKinsey, "Big Data: The next frontier for innovation, competition, and productivity", May 2011.
|
2 |
가드너 그룹, http://www.gartner.com
|
3 |
P. Golle, J. Staddon, and B. Waters, "Secure Conjunctive Keyword Search over Encrypted Data," In Applied Cryptography and Network Security Conference 2004, June 2004.
|
4 |
B. Waters, D. Balfanz, G. Durfee, and D. Smetters, "Building an Encrypted and Searchable Auditlog," NDSS 2004, Feb. 2004.
|
5 |
R. Ostrovsky and W. Skeith, "Private Searching on Streaming Data," Crypto 2005, August 2005.
|
6 |
J. Bethencourt, H. Chan, A. Perrig, E. Shi, and D. Song, "Anonymous Multi-Attribute Encryption with Range Query Conditional Decryption," Technical Report, C.M.U., 2006.
|
7 |
조남수, 홍도원, "검색 가능 암호 시스템 기술 동향," 전자통신동향분석 제23권 제4호 2008년 8월.
|
8 |
GStreamer, http://www.gstreamer.net
|
9 |
OpenStack, http://www.openstack.org
|