-
2
-
-
84929170243
-
Significance and challenges of big data research
-
Jin X., Wah B.W., Cheng X., Wang Y. Significance and challenges of big data research. Big Data Res. 2015, 2(2):59-64. 10.1016/j.bdr.2015.01.006.
-
(2015)
Big Data Res.
, vol.2
, Issue.2
, pp. 59-64
-
-
Jin, X.1
Wah, B.W.2
Cheng, X.3
Wang, Y.4
-
3
-
-
84922915688
-
-
Academic Press
-
Holler J., Tsiatsis V., Mulligan C., Avesand S., Karnouskos S., Boyle D. From Machine-to-Machine to the Internet of Things: Introduction to a New Age of Intelligence 2014, Academic Press.
-
(2014)
From Machine-to-Machine to the Internet of Things: Introduction to a New Age of Intelligence
-
-
Holler, J.1
Tsiatsis, V.2
Mulligan, C.3
Avesand, S.4
Karnouskos, S.5
Boyle, D.6
-
4
-
-
84919389514
-
Beyond the hype: big data concepts, methods, and analytics
-
Gandomi A., Haider M. Beyond the hype: big data concepts, methods, and analytics. Int. J. Inf. Manag. 2015, 35(2):137-144. 10.1016/j.ijinfomgt.2014.10.007.
-
(2015)
Int. J. Inf. Manag.
, vol.35
, Issue.2
, pp. 137-144
-
-
Gandomi, A.1
Haider, M.2
-
5
-
-
84866849883
-
A short survey on the state of the art in architectures and platforms for large scale data analysis and knowledge discovery from data
-
ACM, New York, NY, USA
-
Begoli E. A short survey on the state of the art in architectures and platforms for large scale data analysis and knowledge discovery from data. Proceedings of the WICSA/ECSA 2012 Companion Volume 2012, 177-183. ACM, New York, NY, USA. doi:10.1145/2361999.2362039.
-
(2012)
Proceedings of the WICSA/ECSA 2012 Companion Volume
, pp. 177-183
-
-
Begoli, E.1
-
7
-
-
84856163132
-
Security issues in nosql databases
-
Okman L., Gal-Oz N., Gonen Y., Gudes E., Abramov J. Security issues in nosql databases. 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2011, 541-547.
-
(2011)
2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
, pp. 541-547
-
-
Okman, L.1
Gal-Oz, N.2
Gonen, Y.3
Gudes, E.4
Abramov, J.5
-
9
-
-
84883057675
-
Conditional privacy-aware role based access control
-
Q. Ni, D. Lin, E. Bertino, J. Lobo, Conditional privacy-aware role based access control, in: Computer Security-ESORICS, 2007.
-
(2007)
Computer Security-ESORICS
-
-
Ni, Q.1
Lin, D.2
Bertino, E.3
Lobo, J.4
-
10
-
-
84923202308
-
Enforcement of purpose based access control within relational database management systems
-
Colombo P., Ferrari E. Enforcement of purpose based access control within relational database management systems. IEEE Trans. Knowl. Data Eng. 2014, 26(11). 10.1109/TKDE.2014.2312112.
-
(2014)
IEEE Trans. Knowl. Data Eng.
, vol.26
, Issue.11
-
-
Colombo, P.1
Ferrari, E.2
-
13
-
-
84936866030
-
Efficient enforcement of action aware purpose based access control within relational database management systems
-
Colombo P., Ferrari E. Efficient enforcement of action aware purpose based access control within relational database management systems. IEEE Trans. Knowl. Data Eng. 2015, 27(8). 10.1109/TKDE.2015.2411595.
-
(2015)
IEEE Trans. Knowl. Data Eng.
, vol.27
, Issue.8
-
-
Colombo, P.1
Ferrari, E.2
-
14
-
-
45749089618
-
Purpose based access control for privacy protection in relational database systems
-
Byun J., Li N. Purpose based access control for privacy protection in relational database systems. VLDB J. 2008, 17(4).
-
(2008)
VLDB J.
, vol.17
, Issue.4
-
-
Byun, J.1
Li, N.2
-
15
-
-
84942549140
-
GuardMR: Fine-grained security policy enforcement for MapReduce systems
-
Ulusoy H., Colombo P., Ferrari E., Kantarcioglu M., Pattuk E. GuardMR: fine-grained security policy enforcement for MapReduce systems. ACM ASIACCS 2015, doi:10.1109/TKDE.2015.2411595.
-
(2015)
ASIACCS 2015 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
, pp. 285-296
-
-
Ulusoy, H.1
Colombo, P.2
Ferrari, E.3
Kantarcioglu, M.4
Pattuk, E.5
-
16
-
-
84914127459
-
Bootstrapping privacy compliance in big data systems
-
IEEE Computer Society
-
Sen S., Guha S., Datta A., Rajamani S.K., Tsai J., Wing J.M. Bootstrapping privacy compliance in big data systems. Proceedings of the 2014 IEEE Symposium on Security and Privacy 2014, IEEE Computer Society.
-
(2014)
Proceedings of the 2014 IEEE Symposium on Security and Privacy
-
-
Sen, S.1
Guha, S.2
Datta, A.3
Rajamani, S.K.4
Tsai, J.5
Wing, J.M.6
-
19
-
-
85042973951
-
-
W3C, Enterprise privacy authorization language (epal 1.2)
-
W3C, Enterprise privacy authorization language (epal 1.2). http://www.w3.org/Submission/EPAL/.
-
-
-
-
21
-
-
84992227458
-
Proposed nist standard for role-based access control
-
Ferraiolo D., Sandhu R., Gavrila S., Kuhn D., Chandramouli R. Proposed nist standard for role-based access control. ACM Trans. Inf. Syst. Secur. 2001, 4(3).
-
(2001)
ACM Trans. Inf. Syst. Secur.
, vol.4
, Issue.3
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.4
Chandramouli, R.5
-
22
-
-
84936883500
-
A role-involved conditional purpose-based access control model
-
Springer, Berlin, Heidelberg, M. Janssen, W. Lamersdorf, J. Pries-Heje, M. Rosemann (Eds.) E-Government, E-Services and Global Processes
-
Kabir M., Wang H., Bertino E. A role-involved conditional purpose-based access control model. IFIP Advances in Information and Communication Technology 2010, vol. 334:167-180. Springer, Berlin, Heidelberg. M. Janssen, W. Lamersdorf, J. Pries-Heje, M. Rosemann (Eds.).
-
(2010)
IFIP Advances in Information and Communication Technology
, vol.334
, pp. 167-180
-
-
Kabir, M.1
Wang, H.2
Bertino, E.3
-
23
-
-
77955210831
-
Privacy-aware role-based access control
-
Ni Q., Bertino E., Lobo J., Brodie C., Karat C.-M., Karat J., Trombeta A. Privacy-aware role-based access control. ACM Trans. Inf. Syst. Secur. 2010, 13(3):24.
-
(2010)
ACM Trans. Inf. Syst. Secur.
, vol.13
, Issue.3
, pp. 24
-
-
Ni, Q.1
Bertino, E.2
Lobo, J.3
Brodie, C.4
Karat, C.-M.5
Karat, J.6
Trombeta, A.7
-
25
-
-
84904665756
-
Enforcing obligations within relational database management systems
-
Colombo P., Ferrari E. Enforcing obligations within relational database management systems. IEEE Trans. Dependable Secure Comput. 2014, 11(4). 10.1109/TDSC.2013.48.
-
(2014)
IEEE Trans. Dependable Secure Comput.
, vol.11
, Issue.4
-
-
Colombo, P.1
Ferrari, E.2
-
26
-
-
57349158498
-
An obligation model bridging access control policies and privacy policies
-
Ni Q., Bertino E., Lobo J. An obligation model bridging access control policies and privacy policies. ACM SACMAT 2008.
-
(2008)
ACM SACMAT
-
-
Ni, Q.1
Bertino, E.2
Lobo, J.3
-
27
-
-
85092057840
-
On practical specification and enforcement of obligations
-
Li N., Chen H., Bertino E. On practical specification and enforcement of obligations. ACM CODASPY 2012.
-
(2012)
ACM CODASPY
-
-
Li, N.1
Chen, H.2
Bertino, E.3
-
29
-
-
33847092871
-
Geo-rbac: a spatially aware rbac
-
Damiani M.L., Bertino E., Catania B., Perlasca P. Geo-rbac: a spatially aware rbac. ACM Trans. Inf. Syst. Secur. 2007, 10(1):2.
-
(2007)
ACM Trans. Inf. Syst. Secur.
, vol.10
, Issue.1
, pp. 2
-
-
Damiani, M.L.1
Bertino, E.2
Catania, B.3
Perlasca, P.4
-
30
-
-
77950189737
-
A survey of context modelling and reasoning techniques
-
Bettini C., Brdiczka O., Henricksen K., Indulska J., Nicklas D., Ranganathan A., Riboni D. A survey of context modelling and reasoning techniques. Pervasive Mob. Comput. 2010, 6(2):161-180.
-
(2010)
Pervasive Mob. Comput.
, vol.6
, Issue.2
, pp. 161-180
-
-
Bettini, C.1
Brdiczka, O.2
Henricksen, K.3
Indulska, J.4
Nicklas, D.5
Ranganathan, A.6
Riboni, D.7
-
31
-
-
3042777385
-
Trust negotiations: concepts, systems, and languages
-
Bertino E., Ferrari E., Squicciarini A. Trust negotiations: concepts, systems, and languages. Comput. Sci. Eng. 2004, 6(4):27-34.
-
(2004)
Comput. Sci. Eng.
, vol.6
, Issue.4
, pp. 27-34
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.3
-
34
-
-
84973870925
-
-
Master's thesis, University of Western Ontario, Electronic Thesis and Dissertation Repository. Paper 1797
-
Shermin M. An access control model for nosql databases 2013, Master's thesis, University of Western Ontario, Electronic Thesis and Dissertation Repository. Paper 1797. http://ir.lib.uwo.ca/etd/1797.
-
(2013)
An access control model for nosql databases
-
-
Shermin, M.1
-
36
-
-
3142702944
-
Extending query rewriting techniques for fine-grained access control
-
Rizvi S., Mendelzon A., Sudarshan S., Roy P. Extending query rewriting techniques for fine-grained access control. ACM SIGMOD 2004 2004, 551-562.
-
(2004)
ACM SIGMOD 2004
, pp. 551-562
-
-
Rizvi, S.1
Mendelzon, A.2
Sudarshan, S.3
Roy, P.4
-
38
-
-
81055138684
-
-
Tech. rep., McKinsey Global Institute
-
Manyika J., Chui M., Brown B., Bughin J., Dobbs R., Roxburgh C., Byers A.H. Big data: the next frontier for innovation, competition, and productivity 2011, Tech. rep., McKinsey Global Institute.
-
(2011)
Big data: the next frontier for innovation, competition, and productivity
-
-
Manyika, J.1
Chui, M.2
Brown, B.3
Bughin, J.4
Dobbs, R.5
Roxburgh, C.6
Byers, A.H.7
|