Author:
Xin Wu,Shen Qingni,Yang Yahui,Wu Zhonghai
Publisher
Springer International Publishing
Reference10 articles.
1. Hadoop.
https://hadoop.apache.org/
2. Feng, D.G., Zhang, M., Li, H.: Big data security and privacy protection. Chin. J. Comput. 37(1), 246–258 (2014)
3. Molloy, I., Park, Y., Chari, S.: Generative models for access control policies: applications to role mining over logs with attribution. In: ACM Symposium on Access Control Models and Technologies, pp. 45–56 (2012)
4. Zeng, W., Yang, Y., Luo, B.: Access control for big data using data content. In: IEEE International Conference on Big Data, pp. 45–47 (2013)
5. Gupta, C., Sinha, R., Zhang, Y.: Eagle: user profile-based anomaly detection for securing Hadoop clusters. In: IEEE International Conference on Big Data, pp. 1336–1343 (2015)