5The big data security gap: protecting the Hadoop custer challenges and opportunities with big data. http://www.zettaset. com/info-center/datasheets/zettaset_wp_security_0413.pdf.
6聂元铭.大数据及其安全研究.信息安全与通信.2013(5):15-16.
7宋国华.某企业计算机网络安全系统设计与实现[D].电子科技大学,2012.
8Agrawal D,Bernstein P,Bertino E,et al.Challenges and Opportunities with Big Data[EB/OL].http://cra.org/ccc/docs/init/bigdatawhitepaper.pdf.