Author:
Begum Gousiya,Huq S. Zahoor Ul,Siva Kumar A. P.
Reference29 articles.
1. Tang, Y., Yang, J.: Secure Deduplications of General Computations. Columbia University
2. Geczy, P.: Big data characteristics. Macrotheme Rev. 3(6), 94–104 (2014)
3. Khan, N., Naim, A., Hussain, M.R., Ahmad, N., Qamar, S.: The 51 V’s of big data: survey technologies characteristics opportunities issues and challenges. In: Proceedings of ACM Omni-layer Intelligent Systems Conference (COINS’19), ACM, Heraklion, Crete, May (2019)
4. Martis, M., Pai, N.V., Pragathi, R.S., Rakshatha, S., Dixit, S.: Comprehensive survey on hadoop security. Springer Nature Singapore Pte Ltd, (2019)
5. Horwitz, J., Nugent, A., Halper, F., Kaufman, M.: Big Data for Dummies. Wiley (2013)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. The Overview of Big Data Access Control;Computer Science and Application;2022