[1] |
李凤华, 王彦超, 殷丽华 ,等. 面向网络空间的访问控制模型[J]. 通信学报, 2016,37(5): 9-20.
|
|
LI F H , WANG Y C , YIN L H ,et al. Novel cyberspace-oriented access control model[J]. Journal on Communications, 2016,37(5): 9-20.
|
[2] |
COLOMBO P , FERRARI E . Access control in the era of big data:state of the art and research directions[C]// Proceedings of the 23rd ACM on Symposium on Access Control Models and Technologies. New York:ACM Press, 2018: 185-192.
|
[3] |
ULUSOY H , COLOMBO P , FERRARI E ,et al. GuardMR:fine-grained security policy enforcement for MapReduce systems[C]// Proceedings of the 10th ACM Symposium on Information,Computer and Communications Security. New York:ACM Press, 2015: 285-296.
|
[4] |
ULUSOY H , KANTARCIOGLU M , PATTUK E ,et al. Vigiles:fine-grained access control for MapReduce systems[C]// Proceedings of 2014 IEEE International Congress on Big Data. Piscataway:IEEE Press, 2014: 40-47.
|
[5] |
GUPTA M , PATWA F , SANDHU R . POSTER:access control model for the hadoop ecosystem[C]// Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies. New York:ACM Press, 2017: 125-127.
|
[6] |
GUPTA M , PATWA F , SANDHU R . Object-tagged RBAC model for the Hadoop ecosystem[C]// Data and Applications Security and Privacy (DBSec). Berlin:Springer, 2017: 63-81.
|
[7] |
SANDHU R S , COYNE E J , FEINSTEIN H L ,et al. Role-based access control models[J]. Computer, 1996,29(2): 38-47.
|
[8] |
GUPTA M , PATWA F , SANDHU R . An attribute-based access control model for secure big data processing in Hadoop ecosystem[C]// Proceedings of the 3rd ACM Workshop on Attribute-Based Access Control. New York:ACM Press, 2018: 13-24.
|
[9] |
AWAYSHEH F M , ALAZAB M , GUPTA M ,et al. Next-generation big data federation access control:a reference model[J]. Future Generation Computer Systems, 2020,108: 726-741.
|
[10] |
GUPTA M , PATWA F , BENSON J ,et al. Multi-layer authorization framework for a representative Hadoop ecosystem deployment[C]// Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies. New York:ACM Press, 2017: 183-190.
|
[11] |
UGOBAME U U , SCHNEIDER K A , HOSSEINZADEH K S ,et al. Blockchain access control ecosystem for big data security[C]// Proceedings of 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber,Physical and Social Computing (CPSCom) and IEEE Smart Data. Piscataway:IEEE Press, 2018: 1373-1378.
|
[12] |
HU V C , FERRAIOLO D , KUHN R ,et al. Guide to attribute based access control (ABAC) definition and considerations[R]. 2014.
|
[13] |
MELL P , SHOOK J , HARANG R ,et al. Linear time algorithms to restrict insider access using multi-policy access control systems[J]. Journal of Wireless Mobile Networks,Ubiquitous Computing,and Dependable Applications, 2017,8(1): 4-25.
|
[14] |
SANDHU R , PARK J . Usage control:a vision for next generation access control[C]// Computer Network Security. Berlin:Springer, 2003: 17-31.
|
[15] |
BALDI G , DIAZ-TELLEZ Y , DIMITRAKOS T ,et al. Session-dependent usage control for big data[J]. Journal of Internet Services and Information Security, 2020,10(3): 76-92.
|
[16] |
OASIS Open . OASIS eXtensible access control markup language (XACML) TC version 3.0[EB]. 2013.
|
[17] |
PREMKAMAL P K , PASUPULETI S K , ALPHONSE P J A . A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud[J]. Journal of Ambient Intelligence and Humanized Computing, 2019,10(7): 2693-2707.
|
[18] |
KAPIL G , AGRAWAL A , ATTAALLAH A ,et al. Attribute based honey encryption algorithm for securing big data:Hadoop distributed file system perspective[J]. PeerJ Computer Science, 2020,6:e259.
|
[19] |
SHAFAGH H , BURKHALTER L , RATNASAMY S ,et al. Droplet:decentralized authorization and access control for encrypted data streams[C]// Proceedings of the 29th USENIX Conference on Security Symposium. Berkeley:USENIX Association, 2020: 2469-2486.
|
[20] |
金伟, 余铭洁, 李凤华 ,等. 支持高并发的Hadoop高性能加密方法研究[J]. 通信学报, 2019,40(12): 29-40.
|
|
JIN W , YU M J , LI F H ,et al. High-performance and high-concurrency encryption scheme for Hadoop platform[J]. Journal on Communications, 2019,40(12): 29-40.
|
[21] |
李凤华, 陈天柱, 王震 ,等. 复杂网络环境下跨网访问控制机制[J]. 通信学报, 2018,39(2): 1-10.
|
|
LI F H , CHEN T Z , WANG Z ,et al. Cross-network access control mechanism for complex network environment[J]. Journal on Commu-nications, 2018,39(2): 1-10.
|
[22] |
D?RNYEI Z . Motivational strategies in the language classroom[M]. Cambridge: Cambridge University Press, 2001.
|