HDFS-oriented cryptographic key resource control mechanism
The big data environment presents the characteristics of multi-user cross-network cross-access, multi-service collaborative computing, cross-service data flow, and complex management of massive files.The existing access control models and mechanisms are not fully applicable for big data scenarios.In...
Saved in:
Main Authors: | Wei JIN, Fenghua LI, Mingjie YU, Yunchuan GUO, Ziyan ZHOU, Liang FANG |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2022-09-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2022165/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
On-demand and efficient scheduling scheme for cryptographic service resource
by: Wenlong KOU, et al.
Published: (2022-06-01) -
Cache of cryptographic key based on query popularity
by: Wei JIN, et al.
Published: (2023-02-01) -
A combined method of formation of a cryptographic key with secret modification of the results of synchronization of artificial neural networks
by: M. L. Radziukevich
Published: (2021-10-01) -
Model checking of trusted cryptographic module
by: CHEN Xiao-feng, et al.
Published: (2010-01-01) -
Achieving efficient dynamic cryptographic access control in cloud storage
by: HONG Cheng, et al.
Published: (2011-01-01)