Table of Contents - X.1471 (09/2024) - Reference monitor for online analytics services

1	Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview of the reference monitor
6.1 Basic reference monitor
6.2 Reference monitor for network-based analytics applications
7 Security threats and countermeasures of the reference monitor
7.1 Security requirement for data protection in the reference monitor
7.2 Security requirement for code protection of reference monitor
7.3 Security requirement for unstructured data
7.4 Security requirement for resource protection of a reference monitor
8 Reference monitor for analytical services
8.1 Reference monitor for online analytical processing (OLAP)
8.2 Reference monitor for network-based application systems
9 Reference monitor for video and audio analysis services
9.1 Knowledge representation for video and audio data analysis
9.2 An analysis of video data and its related metadata for services
9.3 An analysis of audio data and its related metadata for services
9.4 A reasoning process for visual data
9.5 A reasoning process for auditory data
9.6 Reference monitor for video and audio analysis
10 Reference monitor for relational data analysis services
10.1 Relationship analysis through social data
10.2 Relationship analysis through unstructured data
10.3 Reference monitor to block the relationship analysis
10.4 Dynamic reference monitors
Appendix I � Online analytics application and privacy
I.1 Data analytics
Appendix II � Identifiers and de-identification mechanisms
II.1 Identifiers
II.2 De-identification mechanisms
Appendix III � Use cases of reference monitor
III.1 Big data analysis (de-identification � direct use)
Page
III.2 Visual data monitoring (CCTV case � indirect use)
III.3 Detection of illegal or abnormal action in networked systems (expanded use)
Appendix IV � Technical analysis for access control and reference monitors
IV.1 Introduction
IV.2 Access control: a broad framework
IV.3 Reference monitor: the enforcement mechanism
IV.4 Comparative analysis of access control and the reference monitors
IV.5 Difference between ITU-T X.1471 and traditional reference monitor
IV.6 Weakness of access control � Single point of failure
Bibliography