Big data security features and operation practices
With the continuous refinement of data types, user roles and application requirements, as well as the complex data storage and flow scenarios of big data, the requirement of big data security is higher and higher.Starting from the security characteristics and operation practice of big data, the secu...
Saved in:
Main Authors: | Zhiyong LIU, Zhongjiang HE, Yilong RUAN, Junfeng SHAN, Chao ZHANG |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2021-05-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2021102/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Research and practice on power big data security governance system
by: Hongbin ZHU, et al.
Published: (2019-11-01) -
Data security and protection techniques in big data:a survey
by: Kai-min WEI, et al.
Published: (2016-04-01) -
Security access permission authentication simulation of multi-source network big data based on blockchain
by: Bin LI, et al.
Published: (2024-02-01) -
Comprehensive Survey of Big Data Mining Approaches in Cloud Systems
by: Zainab Salih Ageed, et al.
Published: (2021-04-01) -
Formal Description of Trusted Bebavior Oriented Security System for Big Data
by: Zhi Yan, et al.
Published: (2014-07-01)