共 90 条
- [41] Farkas C., 2002, ACM SIGKDD Explorations Newsletter, V4, P6, DOI [10.1145/772862.772864, DOI 10.1145/772862.772864]
- [42] Fisher RA, 1988, UCI Machine Learning Repository
- [43] Goldberg I, 1996, PROCEEDINGS OF THE SIXTH ANNUAL USENIX SECURITY SYMPOSIUM: FOCUSING ON APPLICATIONS OF CRYPTOGRAPHY, P1
- [44] Gong L, 1997, PROCEEDINGS OF THE USENIX SYMPOSIUM ON INTERNET TECHNOLOGIES AND SYSTEMS, P103
- [45] Gonzalez J. E., 2014, P 11 USENIX S OP SYS, P599
- [46] GUPTA A, 1995, IEEE DATA ENG B, V18, P3
- [47] POSTER: Access Control Model for the Hadoop Ecosystem [J]. PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 125 - 127
- [48] An Attribute-Based Access Control Model for Secure Big Data Processing in Hadoop Ecosystem [J]. PROCEEDINGS OF THE THIRD ACM WORKSHOP ON ATTRIBUTE-BASED ACCESS CONTROL (ABAC'18), 2018, : 13 - 24
- [49] Object-Tagged RBAC Model for the Hadoop Ecosystem [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXXI, DBSEC 2017, 2017, 10359 : 63 - 81
- [50] Hoffman Steve., 2013, Apache Flume: Distributed Log Collection for Hadoop