JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2019, Vol. 54 ›› Issue (3): 1-9.doi: 10.6040/j.issn.1671-9352.2.2018.073
• • Next Articles
Tian-tian CHANG1(),Xing-shu CHEN2,3,*(),Yong-gang LUO3,Xiao LAN3
CLC Number:
1 | THURAISINGHAM B. Big data security and privacy[C]//Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. San Antonio: ACM, 2015: 279-280. |
2 | FLESCA S , GRECO S , MASCIARI E , et al. A comprehensive guide through the italian database research over the last 25 years[M]. Switzerland: Springer, 2018. |
3 | 冯登国, 张敏, 李昊. 大数据安全与隐私保护[J]. 计算机学报, 2014, 37 (1): 246- 258. |
FENG Dengguo , ZHANG Min , LI Hao . Big data security and privacy protection[J]. Chinese Journal of Computers, 2014, 37 (1): 246- 258. | |
4 | MORENO J, SERRANO M A, FERNÁNDEZ-MEDINA E, et al. Towards a security reference architecture for big data[C]//Proceedings of the 20th International Workshop on Design, Optimization, Languages and Analytical Processing of Big Data co-located with 10th EDBT/ICDT Joint Conference (EDBT/ICDT 2018). Vienna: CEUR Workshop, 2018. |
5 | SHAW S , VERMEULEN A F , GUPTA A , et al. Practical Hive: a guide to hadoop's data warehouse system[M]. New York: Apress, 2016: 11- 21. |
6 | THUSOO A, SARMA J S, JAIN N, et al. An attribute-based access control model for secure big data processing in Hadoop ecosystem[C]//Proceedings of the Third ACM Workshop on Attribute-Based Access Control. New York: ACM, 2018: 13-24. |
7 | 杨腾飞, 申培松, 田雪, 等. 对象云存储中分类分级数据的访问控制方法[J]. 软件学报, 2017, 28 (9): 2334- 2353. |
YANG Tengfei , SHEN Peisong , TIAN Xue , et al. Access control mechanism for classified and graded object storage in cloud computing[J]. Journal of Software, 2017, 28 (9): 2334- 2353. | |
8 | ZHANG H B, WANG J S, CHANG J. A multi-level security access control framework for cross-domain networks[C]//2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC). New York: IEEE, 2017: 316-319. |
9 | ROY K , BHOWMICK A . A Proposed mechanism for cross-domain authorization in grid computing environment[J]. International Journal of Emerging Technology and Advanced Engineering, 2012, 2 (4): 163- 166. |
10 | 熊雄, 王福喜, 左海洋. 面向多级多域信息系统的访问控制方法研究[J]. 计算机工程与设计, 2011, 32 (11): 3613- 3617. |
XIONG Xiong , WANG Fuxi , ZUO Haiyang . Research of access control method on multi-level & multi-domain information system[J]. Computer Engineering and Design, 2011, 32 (11): 3613- 3617. | |
11 | 沈晴霓, 杨雅辉, 禹熹, 等. 一种面向多租户云存储平台的访问控制策略[J]. 小型微型计算机系统, 2011, 32 (11): 2223- 2229. |
SHEN Qingni , YANG Yahui , YU Xi , et al. An access control policy for multi-tenancy cloud storage platform[J]. Journal of Chinese Computer Systems, 2011, 32 (11): 2223- 2229. | |
12 | BISWAS P, SANDHU R, KRISHNAN R. Label-based access control: an ABAC model with enumerated authorization policy[C]//Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control. New York: ACM, 2016: 1-12. |
13 | LANGSTON M E . Materials in an Atlas-Agena shroud[J]. Metal Progress, 1967, 91 (2): 125- 128. |
14 |
SANDHU R S . Lattice-based access control models[J]. Computer, 1993, 26 (11): 9- 19.
doi: 10.1109/2.241422 |
15 |
KUHN D R , COYNE E J , WEIL T R . Adding attributes to role-based access control[J]. Computer, 2010, 43 (6): 79- 81.
doi: 10.1109/MC.2010.155 |
16 |
NEUMAN B C , TS'O T . Kerberos: an authentication service for computer networks[J]. IEEE Communications Magazine, 1994, 32 (9): 33- 38.
doi: 10.1109/35.312841 |
[1] | LI Yu-xi, WANG Kai-xuan, LIN Mu-qing, ZHOU Fu-cai. A P2P network privacy protection system based on anonymous broadcast encryption scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 84-91. |
[2] | TANG Qian, YANG Fei, HUANG Qi, LIN Guo-yuan. Security transfer model of access control information based on TCB subsets [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(7): 98-106. |
[3] | CAI Hong-yun, MA Xiao-xue. Access control based on relationship strength for online social network [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(7): 90-97. |
[4] | ZHAO Bin, HE Jing-sha, ZHANG Yi-xuan. The method of determining decision attribute weight based on information entropy and membership [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(3): 86-90. |
[5] | FENG Guo-he, WANG Dan-di, LI Mei-chan. Text topic mining of archives research based on SVD [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(1): 95-100. |
[6] | LÜ Meng, LIU Zhe, LIU Jian-wei. A trusted inter-domain access control scheme for enterprise WLAN [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(11): 82-88. |
[7] | DU Xi-hua, SHI Xiao-qin, FENG Chang-jun, LI Liang. rediction of chromatograph retention index by artificial neural network by #br# study on volatile constituents of wild chinese chives [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(1): 50-53. |
[8] | ZOU De-qing, YANG Kai, ZHANG Xiao-xu, YUAN Bo-yang, FENG Ming-lu. Protection mechanism research of access control system in virtual domain [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(09): 135-141. |
[9] | YANG Xiao-hui, WANG Hong, JIANG Li-jun, CHANG Si-yuan. A cross-domain access control model of Web service based on trust measurement [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(09): 115-122. |
[10] | GAO Feng1, HE Jing-sha2. A privacy protection method based on a trust and information flow model [J]. J4, 2011, 46(5): 39-43. |
[11] | CHEN Qin,FENG Jian-hua . Design and accomplishment of enterprise multimedia databases [J]. J4, 2007, 42(9): 46-50 . |
|