Table of Contents - X.1471 (09/2024) - Reference monitor for online analytics services
1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Overview of the reference monitor 6.1 Basic reference monitor 6.2 Reference monitor for network-based analytics applications 7 Security threats and countermeasures of the reference monitor 7.1 Security requirement for data protection in the reference monitor 7.2 Security requirement for code protection of reference monitor 7.3 Security requirement for unstructured data 7.4 Security requirement for resource protection of a reference monitor 8 Reference monitor for analytical services 8.1 Reference monitor for online analytical processing (OLAP) 8.2 Reference monitor for network-based application systems 9 Reference monitor for video and audio analysis services 9.1 Knowledge representation for video and audio data analysis 9.2 An analysis of video data and its related metadata for services 9.3 An analysis of audio data and its related metadata for services 9.4 A reasoning process for visual data 9.5 A reasoning process for auditory data 9.6 Reference monitor for video and audio analysis 10 Reference monitor for relational data analysis services 10.1 Relationship analysis through social data 10.2 Relationship analysis through unstructured data 10.3 Reference monitor to block the relationship analysis 10.4 Dynamic reference monitors Appendix I � Online analytics application and privacy I.1 Data analytics Appendix II � Identifiers and de-identification mechanisms II.1 Identifiers II.2 De-identification mechanisms Appendix III � Use cases of reference monitor III.1 Big data analysis (de-identification � direct use) Page III.2 Visual data monitoring (CCTV case � indirect use) III.3 Detection of illegal or abnormal action in networked systems (expanded use) Appendix IV � Technical analysis for access control and reference monitors IV.1 Introduction IV.2 Access control: a broad framework IV.3 Reference monitor: the enforcement mechanism IV.4 Comparative analysis of access control and the reference monitors IV.5 Difference between ITU-T X.1471 and traditional reference monitor IV.6 Weakness of access control � Single point of failure Bibliography
|