-
2
-
-
79951736167
-
S4: Distributed stream computing platform
-
Washington, DC, USA
-
L. Neumeyer, B. Robbins, A. Nair, A. Kesari, "S4: Distributed Stream Computing Platform," in Proceedings of the 2010 IEEE International Conference on Data Mining Workshops, ser. ICDMW '10, Washington, DC, USA, 2010, pp. 170-177.
-
(2010)
Proceedings of the 2010 IEEE International Conference on Data Mining Workshops, Ser. ICDMW '10
, pp. 170-177
-
-
Neumeyer, L.1
Robbins, B.2
Nair, A.3
Kesari, A.4
-
4
-
-
79960530372
-
-
Greenwich, CT, USA: Manning Publications Co
-
S. Owen, R. Anil, T. Dunning, E. Friedman, Mahout in Action. Greenwich, CT, USA: Manning Publications Co., 2011.
-
(2011)
Mahout in Action
-
-
Owen, S.1
Anil, R.2
Dunning, T.3
Friedman, E.4
-
5
-
-
79959994168
-
Dremel: Interactive analysis of web-scale datasets
-
S. Melnik, A. Gubarev, J. J. Long, G. Romer, S. Shivakumar, M. Tolton, T. Vassilakis, "Dremel: interactive analysis of web-scale datasets," Commun. ACM, vol. 54, no. 6, pp. 114-123, 2011.
-
(2011)
Commun ACM
, vol.54
, Issue.6
, pp. 114-123
-
-
Melnik, S.1
Gubarev, A.2
Long, J.J.3
Romer, G.4
Shivakumar, S.5
Tolton, M.6
Vassilakis, T.7
-
6
-
-
85085251984
-
Spark: Cluster computing with working sets
-
Berkeley, CA, USA: USENIX Association
-
M. Zaharia, M. Chowdhury, M. J. Franklin, S. Shenker, I. Stoica, "Spark: Cluster Computing with Working Sets," in Proceedings of the 2Nd USENIX Conference on Hot Topics in Cloud Computing, ser. HotCloud'10. Berkeley, CA, USA: USENIX Association, 2010.
-
(2010)
Proceedings of the 2Nd USENIX Conference on Hot Topics in Cloud Computing, Ser. HotCloud'10
-
-
Zaharia, M.1
Chowdhury, M.2
Franklin, M.J.3
Shenker, S.4
Stoica, I.5
-
7
-
-
37549003336
-
MapReduce: Simplified data processing on large clusters
-
Jan.
-
J. Dean and S. Ghemawat, "MapReduce: simplified data processing on large clusters," Commun. ACM, vol. 51, no. 1, pp. 107-113, Jan. 2008.
-
(2008)
Commun ACM
, vol.51
, Issue.1
, pp. 107-113
-
-
Dean, J.1
Ghemawat, S.2
-
8
-
-
31444440239
-
The 8 requirements of real-time stream processing
-
Dec.
-
M. Stonebraker, U. Cetintemel, S. Zdonik, "The 8 requirements of real-time stream processing," ACM SIGMOD Record, vol. 34, no. 4, pp. 42-47, Dec. 2005.
-
(2005)
ACM SIGMOD Record
, vol.34
, Issue.4
, pp. 42-47
-
-
Stonebraker, M.1
Cetintemel, U.2
Zdonik, S.3
-
9
-
-
84904749330
-
-
O'Reilly, Tech. Rep., Jun. [Online]. Available
-
M. Barlow, "Real-Time Big Data Analytics: Emerging Architecture," O'Reilly, Tech. Rep., Jun. 2013. [Online]. Available: http://www.oreilly. com/data/free/big-data-analytics-emerging-architecture.csp
-
(2013)
Real-Time Big Data Analytics: Emerging Architecture
-
-
Barlow, M.1
-
10
-
-
84855339464
-
Processing flows of information: From data stream to complex event processing
-
Jun.
-
G. Cugola and A. Margara, "Processing Flows of Information: From Data Stream to Complex Event Processing," ACM Comput. Surv., vol. 44, no. 3, pp. 15:1-15:62, Jun. 2012.
-
(2012)
ACM Comput. Surv.
, vol.44
, Issue.3
, pp. 151-1562
-
-
Cugola, G.1
Margara, A.2
-
11
-
-
84924389830
-
MillWheel: Fault-Tolerant stream processing at internet scale
-
T. Akidau, A. Balikov, K. Bekiroglu, S. Chernyak, J. Haberman, R. Lax, S. McVeety, D. Mills, P. Nordstrom, S. Whittle, "MillWheel: Fault-Tolerant Stream Processing at Internet Scale," in Very Large Data Bases, 2013, pp. 734-746.
-
(2013)
Very Large Data Bases
, pp. 734-746
-
-
Akidau, T.1
Balikov, A.2
Bekiroglu, K.3
Chernyak, S.4
Haberman, J.5
Lax, R.6
McVeety, S.7
Mills, D.8
Nordstrom, P.9
Whittle, S.10
-
12
-
-
0027699087
-
Lattice-Based access control models
-
Nov.
-
R. S. Sandhu, "Lattice-Based Access Control Models," Computer, vol. 26, no. 11, pp. 9-19, Nov. 1993.
-
(1993)
Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.S.1
-
13
-
-
0028513932
-
Access control: Principle and practice
-
Sept
-
R. Sandhu and P. Samarati, "Access control: principle and practice," Communications Magazine, IEEE, vol. 32, no. 9, pp. 40-48, Sept 1994.
-
(1994)
Communications Magazine IEEE
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.1
Samarati, P.2
-
14
-
-
0030086382
-
Role-based access control models
-
Feb.
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, C. E. Youman, "Role-Based Access Control Models," Computer, vol. 29, no. 2, pp. 38-47, Feb. 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
15
-
-
84864355928
-
A unified attribute-based access control model covering DAC, MAC and RBAC
-
Berlin, Heidelberg: Springer-Verlag
-
X. Jin, R. Krishnan, R. Sandhu, "A Unified Attribute-based Access Control Model Covering DAC, MAC and RBAC," in Proceedings of the 26th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, ser. DBSec'12. Berlin, Heidelberg: Springer-Verlag, 2012, pp. 41-55.
-
(2012)
Proceedings of the 26th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, Ser. DBSec'12
, pp. 41-55
-
-
Jin, X.1
Krishnan, R.2
Sandhu, R.3
-
16
-
-
80455140352
-
An attribute based framework for risk-adaptive access control models
-
Aug
-
S. Kandala, R. Sandhu, V. Bhamidipati, "An Attribute Based Framework for Risk-Adaptive Access Control Models," in Availability, Reliability and Security (ARES), 2011 Sixth International Conference on, Aug 2011, pp. 236-241.
-
(2011)
Availability, Reliability and Security (ARES), 2011 Sixth International Conference on
, pp. 236-241
-
-
Kandala, S.1
Sandhu, R.2
Bhamidipati, V.3
-
17
-
-
77954482365
-
Risk-based access control systems built on fuzzy inferences
-
New York, NY, USA: ACM
-
Q. Ni, E. Bertino, J. Lobo, "Risk-based Access Control Systems Built on Fuzzy Inferences," in Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ser. ASIACCS '10. New York, NY, USA: ACM, 2010, pp. 250-260.
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, Ser. ASIACCS '10
, pp. 250-260
-
-
Ni, Q.1
Bertino, E.2
Lobo, J.3
-
18
-
-
84944048132
-
The ponder policy specification language
-
London, UK, UK: Springer-Verlag
-
N. Damianou, N. Dulay, E. Lupu, M. Sloman, "The Ponder Policy Specification Language," in Proceedings of the International Workshop on Policies for Distributed Systems and Networks, ser. POLICY '01. London, UK, UK: Springer-Verlag, 2001, pp. 18-38.
-
(2001)
Proceedings of the International Workshop on Policies for Distributed Systems and Networks, Ser. POLICY '01
, pp. 18-38
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
19
-
-
0242308055
-
Semantic web languages for policy representation and reasoning: A Comparison of KAoS, Rei, Ponder
-
D. Fensel, K. P. Sycara, J. Mylopoulos, Eds. Springer
-
G. Tonti, J. M. Bradshaw, R. Jeffers, R. Montanari, N. Suri, A. Uszok, "Semantic Web Languages for Policy Representation and Reasoning: A Comparison of KAoS, Rei, Ponder," in International Semantic Web Conference, ser. Lecture Notes in Computer Science, D. Fensel, K. P. Sycara, J. Mylopoulos, Eds., vol. 2870. Springer, 2003, pp. 419-437.
-
(2003)
International Semantic Web Conference, Ser. Lecture Notes in Computer Science
, vol.2870
, pp. 419-437
-
-
Tonti, G.1
Bradshaw, J.M.2
Jeffers, R.3
Montanari, R.4
Suri, N.5
Uszok, A.6
-
20
-
-
84955483452
-
-
XACML-V3.0, eXtensible Access Control Markup Language (XACML) Version 3.0. Candidate OASIS Standard 01 September [Online]. Available: http://docs.oasis-open. org/xacml/3.0/xacml-3.0-core-spec-cos01-en.html
-
XACML-V3.0, "eXtensible Access Control Markup Language (XACML) Version 3.0. Candidate OASIS Standard 01," http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-cos01-en.html, September 2012. [Online]. Available: http://docs.oasis-open. org/xacml/3.0/xacml-3.0-core-spec-cos01-en.html
-
(2012)
-
-
-
21
-
-
77955203039
-
A framework to enforce access control over data streams
-
B. Carminati, E. Ferrari, J. Cao, K.-L. Tan, "A framework to enforce access control over data streams." ACM Trans. Inf. Syst. Secur., vol. 13, no. 3, 2010.
-
(2010)
ACM Trans. Inf. Syst. Secur.
, vol.13
, Issue.3
-
-
Carminati, B.1
Ferrari, E.2
Cao, J.3
Tan, K.-L.4
-
22
-
-
84874872678
-
Fence: Continuous access control enforcement in dynamic data stream environments
-
New York, NY, USA: ACM
-
R. V. Nehme, H.-S. Lim, E. Bertino, "Fence: Continuous access control enforcement in dynamic data stream environments," in Proceedings of the Third ACM Conference on Data and Application Security and Privacy, ser. CODASPY '13. New York, NY, USA: ACM, 2013, pp. 243-254.
-
(2013)
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, Ser. CODASPY '13
, pp. 243-254
-
-
Nehme, R.V.1
Lim, H.-S.2
Bertino, E.3
-
23
-
-
84907023884
-
Urban computing: Concepts, methodologies, applications
-
Y. Zheng, L. Capra, O. Wolfson, H. Yang, "Urban Computing: Concepts, Methodologies, Applications," ACM Transaction on Intelligent Systems and Technology, 2014.
-
(2014)
ACM Transaction on Intelligent Systems and Technology
-
-
Zheng, Y.1
Capra, L.2
Wolfson, O.3
Yang, H.4
|