[ 1 ] Economic and Social Scientific Council. ScientificData Policy [EB/OL]. [2019-03-31]. https://esrc.ukri.org/funding/guidance-for-grant-holders/scientific-data-policy/.
[ 2 ] National Science Foundation. Disseminationand Sharing of Scientific Results [EB/OL].[2019-03-31]. https://www.nsf.gov/bfa/dias/policy/dmp.jsp.
[ 3 ] Australian Code for the Responsible Conduct ofScientific 2007[EB/OL]. [2019-04-02]. https://www.nhmrc.gov.au/about-us/publications/australiancode-responsible-conduct-scientific-2007.
[ 4 ] The FAIR Guiding Principles for scientificdata management and stewardship [EB/OL].[2019-03-31]. https://www.nature.com/articles/sdata201618#references.
[ 5 ] General Data Protection Regulation [EB/OL].[2019-03-31]. https://gdpr-info.eu/.
[ 6 ] UC Berkeley How to Classify Research Data [EB/OL]. [2019-04-02] https://security.berkeley.edu/resources/best-practices-how-articles/securityawareness/how-classify-research-data.
[ 7 ] Harvard Research Data Security Policy (HRDSP)[EB/OL]. [2019-04-02]. https://vpr.harvard.edu/pages/harvard-research-data-security-policy.
[ 8 ] 《科学数据管理办法》[EB/OL].[2019-03-31].http://www.gov.cn/zhengce/content/2018-04/02/content_5279272.htm.
[ 9 ] 矫真, 王兆军, 刘丽君, 等. 营销系统敏感数据分级分类管理[J]. 通信电源技术, 2017, 34(4):182-183, 220.
[10] 高潮. 大数据时代用户消费型数据的分级分类隐私保护策略研究[J]. 广东通信技术, 2016, 36(9):10-12, 17.
[11] Z Wu, L Liu, C Yan, et al. “The approach of SWIMdata sharing based on multi-dimensional dataencryption,” 2017 25th International Conferenceon Software, Telecommunications and ComputerNetworks (SoftCOM), Split, 2017: 1-6.
[12] SYDES M R, JOHNSON A L, MEREDITH S K, etal. Sharing data from clinical trials: the rationale fora controlled access approach [J]. Trials, 2015, 16(1):1-6.
[13] MALIN B, BENITEZ K, MASYS D. Never too oldfor anonymity: a statistical standard for demographicdata sharing via the HIPAA Privacy Rule [J]. Journalof the American Medical Informatics Association,2011, 18(1): 3-10.
[14] CHU C K, CHOW S S M, TZENG W G, et al. KeyAggregateCryptosystem for Scalable Data Sharing inCloud Storage[J]. IEEE Transactions on Parallel &Distributed Systems, 2014, 25(2): 468-477.
[15] M Schapranow, et al. “Towards an integrated healthresearch process: A cloud-based approach,” 2016IEEE International Conference on Big Data (BigData), Washington, DC, 2016: 2813-2818.
[16] M Bar-Sinai, L Sweeney and M Crosas. “DataTags,Data Handling Policy Spaces and the TagsLanguage,” 2016 IEEE Security and PrivacyWorkshops (SPW), San Jose, CA, 2016: 1-8.
[17] 张计龙, 殷沈琴, 张用, 等. 社会科学数据的共享与服务——以复旦大学社会科学数据共享平台为例[J]. 大学图书馆学报, 2015, 33(1): 74-79.
[18] 罗鹏程, 朱玲, 崔海媛, 等. 基于Dataverse的北京大学开放研究数据平台建设[J]. 图书情报工作,2016, 60(3): 52-58.
[19] 哈 佛 大 学 隐 私 工 具 —— 项 目 描 述 [ E B / O L ] .[2019-03-31]. https://privacytools.seas.harvard.edu/project-description.
[20] 哈佛大学隐私工具——数据标签[EB/OL]. [2019-03-31]. https://privacytools.seas.harvard.edu/datatags.
[21] Sweeney L, Crosas M, Bar-Sinai M. SharingSensitive Data with Confidence: The DatatagsSystem. Technology Science. 2015101601. October16, 2015. https://techscience.org/a/2015101601.
[22] CARTER K M, IDIKA N, STREILEIN W W.Probabilistic Threat Propagation for NetworkSecurity[J]. IEEE Transactions on InformationForensics and Security, 2014, 9 (9): 1394-1405.
[23] PIRRETTI M, TRAYNOR P, MCDANIEL P, etal. Secure Attribute-Based Systems[J]. Journal ofComputer Security, 2010, 18 (5): 799-837.
[24] Harvard University Data Security Level [EB/OL].[2019-04-02] https://policy.security.harvard.edu/view-data-security-level.
|