Formal Description of Trusted Bebavior Oriented Security System for Big Data
Usually the process of storing and analyzing with big data is under the framework of Hadoop within the environment of cloud computing while the risks of big data application on cloud derive from cloud service providers and remote users who access data without authorization. Based on the security iss...
Saved in:
Main Authors: | Zhi Yan, Jing Zhan |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2014-07-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.07.006/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Research on formal description and verification of automated trust negotiation
by: GUAN Shang-yuan 1, et al.
Published: (2011-01-01) -
Big Data with Cloud Computing: Discussions and Challenges
by: Amanpreet Kaur Sandhu
Published: (2022-03-01) -
Applications of a big data platform based on PaaS
by: Haiyong XU, et al.
Published: (2018-01-01) -
Research on Data Modeling Platform Based on Big Data of Telecom
by: Leiming Shen, et al.
Published: (2014-06-01) -
Big Data Analytics for Healthcare Industry: Impact, Applications, and Tools
by: Sunil Kumar, et al.
Published: (2019-03-01)