메뉴 건너뛰기




Volumn 2, Issue 4, 2015, Pages 145-154

Privacy Aware Access Control for Big Data: A Research Roadmap

Author keywords

Access control enforcement; Big data; MapReduce systems; NoSQL datastores; Privacy policies

Indexed keywords

ACCESS CONTROL; DIGITAL STORAGE; SENSITIVE DATA;

EID: 84947043463     PISSN: None     EISSN: 22145796     Source Type: Journal    
DOI: 10.1016/j.bdr.2015.08.001     Document Type: Article
Times cited : (48)

References (38)
  • 2
    • 84929170243 scopus 로고    scopus 로고
    • Significance and challenges of big data research
    • Jin X., Wah B.W., Cheng X., Wang Y. Significance and challenges of big data research. Big Data Res. 2015, 2(2):59-64. 10.1016/j.bdr.2015.01.006.
    • (2015) Big Data Res. , vol.2 , Issue.2 , pp. 59-64
    • Jin, X.1    Wah, B.W.2    Cheng, X.3    Wang, Y.4
  • 4
    • 84919389514 scopus 로고    scopus 로고
    • Beyond the hype: big data concepts, methods, and analytics
    • Gandomi A., Haider M. Beyond the hype: big data concepts, methods, and analytics. Int. J. Inf. Manag. 2015, 35(2):137-144. 10.1016/j.ijinfomgt.2014.10.007.
    • (2015) Int. J. Inf. Manag. , vol.35 , Issue.2 , pp. 137-144
    • Gandomi, A.1    Haider, M.2
  • 5
    • 84866849883 scopus 로고    scopus 로고
    • A short survey on the state of the art in architectures and platforms for large scale data analysis and knowledge discovery from data
    • ACM, New York, NY, USA
    • Begoli E. A short survey on the state of the art in architectures and platforms for large scale data analysis and knowledge discovery from data. Proceedings of the WICSA/ECSA 2012 Companion Volume 2012, 177-183. ACM, New York, NY, USA. doi:10.1145/2361999.2362039.
    • (2012) Proceedings of the WICSA/ECSA 2012 Companion Volume , pp. 177-183
    • Begoli, E.1
  • 10
    • 84923202308 scopus 로고    scopus 로고
    • Enforcement of purpose based access control within relational database management systems
    • Colombo P., Ferrari E. Enforcement of purpose based access control within relational database management systems. IEEE Trans. Knowl. Data Eng. 2014, 26(11). 10.1109/TKDE.2014.2312112.
    • (2014) IEEE Trans. Knowl. Data Eng. , vol.26 , Issue.11
    • Colombo, P.1    Ferrari, E.2
  • 13
    • 84936866030 scopus 로고    scopus 로고
    • Efficient enforcement of action aware purpose based access control within relational database management systems
    • Colombo P., Ferrari E. Efficient enforcement of action aware purpose based access control within relational database management systems. IEEE Trans. Knowl. Data Eng. 2015, 27(8). 10.1109/TKDE.2015.2411595.
    • (2015) IEEE Trans. Knowl. Data Eng. , vol.27 , Issue.8
    • Colombo, P.1    Ferrari, E.2
  • 14
    • 45749089618 scopus 로고    scopus 로고
    • Purpose based access control for privacy protection in relational database systems
    • Byun J., Li N. Purpose based access control for privacy protection in relational database systems. VLDB J. 2008, 17(4).
    • (2008) VLDB J. , vol.17 , Issue.4
    • Byun, J.1    Li, N.2
  • 19
    • 85042973951 scopus 로고    scopus 로고
    • W3C, Enterprise privacy authorization language (epal 1.2)
    • W3C, Enterprise privacy authorization language (epal 1.2). http://www.w3.org/Submission/EPAL/.
  • 22
    • 84936883500 scopus 로고    scopus 로고
    • A role-involved conditional purpose-based access control model
    • Springer, Berlin, Heidelberg, M. Janssen, W. Lamersdorf, J. Pries-Heje, M. Rosemann (Eds.) E-Government, E-Services and Global Processes
    • Kabir M., Wang H., Bertino E. A role-involved conditional purpose-based access control model. IFIP Advances in Information and Communication Technology 2010, vol. 334:167-180. Springer, Berlin, Heidelberg. M. Janssen, W. Lamersdorf, J. Pries-Heje, M. Rosemann (Eds.).
    • (2010) IFIP Advances in Information and Communication Technology , vol.334 , pp. 167-180
    • Kabir, M.1    Wang, H.2    Bertino, E.3
  • 25
    • 84904665756 scopus 로고    scopus 로고
    • Enforcing obligations within relational database management systems
    • Colombo P., Ferrari E. Enforcing obligations within relational database management systems. IEEE Trans. Dependable Secure Comput. 2014, 11(4). 10.1109/TDSC.2013.48.
    • (2014) IEEE Trans. Dependable Secure Comput. , vol.11 , Issue.4
    • Colombo, P.1    Ferrari, E.2
  • 26
    • 57349158498 scopus 로고    scopus 로고
    • An obligation model bridging access control policies and privacy policies
    • Ni Q., Bertino E., Lobo J. An obligation model bridging access control policies and privacy policies. ACM SACMAT 2008.
    • (2008) ACM SACMAT
    • Ni, Q.1    Bertino, E.2    Lobo, J.3
  • 27
    • 85092057840 scopus 로고    scopus 로고
    • On practical specification and enforcement of obligations
    • Li N., Chen H., Bertino E. On practical specification and enforcement of obligations. ACM CODASPY 2012.
    • (2012) ACM CODASPY
    • Li, N.1    Chen, H.2    Bertino, E.3
  • 28
  • 31
    • 3042777385 scopus 로고    scopus 로고
    • Trust negotiations: concepts, systems, and languages
    • Bertino E., Ferrari E., Squicciarini A. Trust negotiations: concepts, systems, and languages. Comput. Sci. Eng. 2004, 6(4):27-34.
    • (2004) Comput. Sci. Eng. , vol.6 , Issue.4 , pp. 27-34
    • Bertino, E.1    Ferrari, E.2    Squicciarini, A.3
  • 34
    • 84973870925 scopus 로고    scopus 로고
    • Master's thesis, University of Western Ontario, Electronic Thesis and Dissertation Repository. Paper 1797
    • Shermin M. An access control model for nosql databases 2013, Master's thesis, University of Western Ontario, Electronic Thesis and Dissertation Repository. Paper 1797. http://ir.lib.uwo.ca/etd/1797.
    • (2013) An access control model for nosql databases
    • Shermin, M.1
  • 36
    • 3142702944 scopus 로고    scopus 로고
    • Extending query rewriting techniques for fine-grained access control
    • Rizvi S., Mendelzon A., Sudarshan S., Roy P. Extending query rewriting techniques for fine-grained access control. ACM SIGMOD 2004 2004, 551-562.
    • (2004) ACM SIGMOD 2004 , pp. 551-562
    • Rizvi, S.1    Mendelzon, A.2    Sudarshan, S.3    Roy, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.