Formal Description of Trusted Bebavior Oriented Security System for Big Data
Usually the process of storing and analyzing with big data is under the framework of Hadoop within the environment of cloud computing while the risks of big data application on cloud derive from cloud service providers and remote users who access data without authorization. Based on the security iss...
Saved in:
| Main Authors: | Zhi Yan, Jing Zhan |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Beijing Xintong Media Co., Ltd
2014-07-01
|
| Series: | Dianxin kexue |
| Subjects: | |
| Online Access: | http://www.telecomsci.com/thesisDetails#10.3969/j.issn.1000-0801.2014.07.006 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A comprehensive survey on big data privacy and Hadoop security: Insights into encryption mechanisms and emerging trends
by: Youness Filaly, et al.
Published: (2025-09-01) -
Research on formal description and verification of automated trust negotiation
by: GUAN Shang-yuan 1, et al.
Published: (2011-01-01) -
Research on formal description and verification of automated trust negotiation
by: GUAN Shang-yuan 1, et al.
Published: (2011-01-01) -
A Study of Big Data in Cloud Computing
by: Imran Khan
Published: (2024-08-01) -
An associated perception import method for big data
by: Huaiyu GONG, et al.
Published: (2016-03-01)