Enhancing security elements for MapReduce processing with whitelist
暂无分享,去创建一个
[1] Jinjun Chen,et al. Combining Top-Down and Bottom-Up: Scalable Sub-tree Anonymization over Big Data Using MapReduce on Cloud , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[2] Christopher Garcia. Demystifying MapReduce , 2013, Complex Adaptive Systems.
[3] Tianbo Lu,et al. Next Big Thing in Big Data: The Security of the ICT Supply Chain , 2013, 2013 International Conference on Social Computing.
[4] Raymond Gardiner Goss,et al. Heading towards big data building a better data warehouse for more data, more speed, and more users , 2013, ASMC 2013 SEMI Advanced Semiconductor Manufacturing Conference.
[5] Young-Gab Kim,et al. A quantitative approach to estimate a website security risk using whitelist , 2012, Secur. Commun. Networks.
[6] Adilah Sabtu,et al. Enhancing security and privacy protection for MapReduce processing: the initial simulation work flow , 2015, SOCO 2015.
[7] Lavanya Ramakrishnan,et al. Benchmarking MapReduce Implementations for Application Usage Scenarios , 2011, 2011 IEEE/ACM 12th International Conference on Grid Computing.
[8] Vrinda Tokekar,et al. Prominence of MapReduce in Big Data Processing , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.
[9] Yonggang Wen,et al. Toward Scalable Systems for Big Data Analytics: A Technology Tutorial , 2014, IEEE Access.
[10] Ping Yang,et al. A Sketch of Big Data Technologies , 2013, 2013 Seventh International Conference on Internet Computing for Engineering and Science.
[11] Miriam A. M. Capretz,et al. Challenges for MapReduce in Big Data , 2014, 2014 IEEE World Congress on Services.
[12] Miriam A. M. Capretz,et al. Data management in cloud environments: NoSQL and NewSQL data stores , 2013, Journal of Cloud Computing: Advances, Systems and Applications.