{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T09:37:49Z","timestamp":1774690669704,"version":"3.50.1"},"publisher-location":"Cham","reference-count":51,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319068107","type":"print"},{"value":"9783319068114","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06811-4_13","type":"book-chapter","created":{"date-parts":[[2014,5,14]],"date-time":"2014-05-14T13:25:48Z","timestamp":1400073948000},"page":"76-94","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":38,"title":["Big Security for Big Data: Addressing Security Challenges for the Big Data Infrastructure"],"prefix":"10.1007","author":[{"given":"Yuri","family":"Demchenko","sequence":"first","affiliation":[]},{"given":"Canh","family":"Ngo","sequence":"additional","affiliation":[]},{"given":"Cees","family":"de Laat","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Membrey","sequence":"additional","affiliation":[]},{"given":"Daniil","family":"Gordijenko","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,15]]},"reference":[{"key":"13_CR1","unstructured":"Global Research Data Infrastructures: Towards a 10-year vision for global research data infrastructures. Final Roadmap, March 2012. http:\/\/www.grdi2020.eu\/Repository\/FileScaricati\/6bdc07fb-b21d-4b90-81d4-d909fdb96b87.pdf"},{"key":"13_CR2","unstructured":"Reflections on Big Data, Data Science and Related Subjects: Blog by Irving Wladawsky-Berger. http:\/\/blog.irvingwb.com\/blog\/2013\/01\/reflections-on-big-data-data-science-and-related-subjects.html"},{"key":"13_CR3","unstructured":"Roundup of Big Data Pundits\u2019 Predictions for 2013. Blog post by David Pittman. 18 Jan 2013. http:\/\/www.ibmbigdatahub.com\/blog\/roundup-big-data-pundits-predictions-2013"},{"key":"13_CR4","unstructured":"NIST Big Data Working Group (NBD-WG). http:\/\/bigdatawg.nist.gov\/home.php\/"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Demchenko, Y., Zhao, Z., Grosso, P., Wibisono, A., de Laat, C.: Addressing big data challenges for scientific data infrastructure. In: The 4th IEEE Conference on Cloud Computing Technologies and Science (CloudCom2012), Taipei, 3\u20136 Dec 2012","DOI":"10.1109\/CloudCom.2012.6427494"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Demchenko, Y., Membrey, P., Grosso, P., de Laat, C.: Addressing big data issues in scientific data infrastructure. In: First International Symposium on Big Data and Data Analytics in Collaboration (BDDAC 2013). Proceeding. The 2013 International Conference on Collaboration Technologies and Systems (CTS 2013), San Diego, 20\u201324 May 2013","DOI":"10.1109\/CTS.2013.6567203"},{"key":"13_CR7","unstructured":"The Forrester Wave: Big Data Predictive Analytics Solutions: Q1 2013. Mike Gualtieri, 31 Jan 2013. http:\/\/www.forrester.com\/pimages\/rws\/reprints\/document\/85601\/oid\/1-LTEQDI"},{"key":"13_CR8","unstructured":"Dumbill, E.: What is big data? An introduction to the big data landscape. http:\/\/strata.oreilly.com\/2012\/01\/what-is-big-data.html"},{"key":"13_CR9","unstructured":"The 3Vs that define Big Data. Posted by Diya Soubra on 5 July 2012. http:\/\/www.datasciencecentral.com\/forum\/topics\/the-3vs-that-define-big-data"},{"key":"13_CR10","unstructured":"IDG IDC\u2019s Latest Digital Data Study: A Deep Dive, Blogpost by Mary Ludloff. http:\/\/blog.patternbuilders.com\/2011\/07\/08\/idcs-latest-digital-data-study-deep-dive\/"},{"key":"13_CR11","unstructured":"The Big Data Long Tail. Blog post by Jason Bloomberg on 17 Jan 2013. http:\/\/www.devx.com\/blog\/the-big-data-long-tail.html"},{"key":"13_CR12","unstructured":"The Fourth Paradigm: Data-Intensive Scientific Discovery. Hey, T., Tansley, S., Tolle, K. (eds.) Microsoft Corporation, Oct 2009. ISBN: 978-0-9825442-0-4. http:\/\/research.microsoft.com\/en-us\/collaboration\/fourthparadigm\/"},{"key":"13_CR13","unstructured":"NIST Big Data Workshop, 13\u201314 June 2012. http:\/\/www.nist.gov\/itl\/ssd\/is\/big-data.cfm"},{"key":"13_CR14","unstructured":"CSA Big Data Working Group. https:\/\/cloudsecurityalliance.org\/research\/big-data\/"},{"key":"13_CR15","unstructured":"Expanded Top Ten Big Data Security and Privacy Challenges. CSA Report, 16 June 2013. https:\/\/downloads.cloudsecurityalliance.org\/initiatives\/bdwg\/Expanded_Top_Ten_Big_Data_Security_and_Privacy_Challenges.pdf"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Peisert, S., Talbot, E., Bishop, M.: Turtles all the way down: a clean-slate, ground-up, first-principles approach to secure systems. In: Proceedings of the 2012 Workshop on New Security Paradigms, NSPW \u201912. ACM, New York (2012)","DOI":"10.1145\/2413296.2413299"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Bratus, S., Locasto, M., Ramaswamy, A., Smith, S.: VM-based security overkill: a lament for applied systems security research. In: Proceedings of the 2010 Workshop on New Security Paradigms, NSPW \u201910. ACM, New York (2010)","DOI":"10.1145\/1900546.1900554"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Morton, A., Sasse, A.: Privacy is a process, not a pet: a theory for effective privacy practice. In: Proceeding NSPW \u201912 Proceedings of the 2012 Workshop on New Security Paradigms. ACM, New York (2012). ISBN: 978-1-4503-1794-8","DOI":"10.1145\/2413296.2413305"},{"key":"13_CR19","series-title":"LNCS","first-page":"162","volume-title":"SDM 2012","author":"M Deng","year":"2012","unstructured":"Deng, M., Nalin, M., Petkovi\u0107, M., Baroni, I., Marco, A.: Towards trustworthy health platform cloud. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2012. LNCS, vol. 7482, pp. 162\u2013175. Springer, Heidelberg (2012)"},{"key":"13_CR20","series-title":"LNCS","first-page":"148","volume-title":"SDM 2012","author":"M Bienvenu","year":"2012","unstructured":"Bienvenu, M., Deutch, D., Suchanek, F.M.: Provenance for Web 2.0 data. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2012. LNCS, vol. 7482, pp. 148\u2013155. Springer, Heidelberg (2012)"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Demchenko, Y., de Laat, C., Koeroo, O., Groep, D.: Re-thinking grid security architecture. In: Proceedings of IEEE 4th Science 2008 Conference, pp. 79\u201386. IEEE Computer Society Publishing, Indianapolis, 7\u201312 Dec 2008. ISBN: 978-0-7695-3535-7","DOI":"10.1109\/eScience.2008.53"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Demchenko, Y., Ngo, C., de Laat, C., Wlodarczyk, T., Rong, C., Ziegler, W.: Security infrastructure for on-demand provisioned cloud infrastructure services. In: Proceedings of 3rd IEEE Conference on Cloud Computing Technologies and Science (CloudCom2011), 29 Nov\u20131 Dec 2011, Athens, Greece, ISBN: 978-0-7695-4622-3","DOI":"10.1109\/CloudCom.2011.42"},{"key":"13_CR23","unstructured":"Oracle Fusion Middleware Security Guide: Overview Java Security Models. http:\/\/docs.oracle.com\/cd\/E12839_01\/core.1111\/e10043\/introjps.htm"},{"key":"13_CR24","unstructured":"Hypervisors, virtualization, and the cloud: learn about hypervisors, system virtualization, and how it works in a cloud environment. By Bhanu P. Tholeti, IBM. http:\/\/www.ibm.com\/developerworks\/cloud\/library\/cl-hypervisorcompare\/"},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Prins, C.: When personal data, behavior and virtual identities become a commodity: would a property rights approach matter? J. Law Technol. Soc. 3(4) (2006). http:\/\/www2.law.ed.ac.uk\/ahrc\/script-ed\/vol3-4\/prins.pdf (SCRIPT-ed)","DOI":"10.2966\/scrip.030406.270"},{"key":"13_CR26","unstructured":"RFC6749: The OAuth 2.0 authorization framework. http:\/\/tools.ietf.org\/html\/rfc6749"},{"key":"13_CR27","unstructured":"European Union: A study on authentication and authorisation platforms for scientific resources in Europe. European Commission, Brussels 2012. Final Report. Contributing author. Internal identification SMART-Nr 2011\/0056. http:\/\/cordis.europa.eu\/fp7\/ict\/e-infrastructure\/docs\/aaa-study-final-report.pdf"},{"key":"13_CR28","unstructured":"Data Lifecycle Models and Concepts. http:\/\/wgiss.ceos.org\/dsig\/whitepapers\/Data%20Lifecycle%20Models%20and%20Concepts%20v8.docx"},{"key":"13_CR29","unstructured":"Koopa, D., et al.: A provenance-based infrastructure to support the life cycle of executable papers. In: International Conference on Computational Science, ICCS 2011. http:\/\/vgc.poly.edu\/~juliana\/pub\/vistrails-executable-paper.pdf"},{"key":"13_CR30","unstructured":"Open access: opportunities and challenges. European Commission for UNESCO. http:\/\/ec.europa.eu\/research\/science-society\/document_library\/pdf_06\/open-access-handbook_en.pdf"},{"key":"13_CR31","unstructured":"OpenAIR \u2013 Open access infrastructure for research in Europe. http:\/\/www.openaire.eu\/"},{"key":"13_CR32","unstructured":"Open Researcher and Contributor ID. http:\/\/about.orcid.org\/"},{"key":"13_CR33","doi-asserted-by":"crossref","unstructured":"Demchenko, Y., Lopez, D.R., Garcia Espin, J.A., de Laat, C.: Security services lifecycle management in on-demand infrastructure services provisioning. International Workshop on Cloud Privacy, Security, Risk and Trust (CPSRT 2010). In: 2nd IEEE International Conference on Cloud Computing Technology and Science (CloudCom2010), Indianapolis, 30 Nov\u20133 Dec 2010","DOI":"10.1109\/CloudCom.2010.91"},{"key":"13_CR34","doi-asserted-by":"crossref","unstructured":"Demchenko, Y., Makkes, M., Strijkers, R., Ngo, C., de Laat, C.: Intercloud architecture framework for heterogeneous multi-provider cloud based infrastructure services provisioning. Int. J. Next-Gener. Comput. (IJNGC) 4(2) (2013)","DOI":"10.1109\/WAINA.2013.237"},{"key":"13_CR35","unstructured":"Makkes, M., Ngo, C., Demchenko, Y., Strijkers, R., Meijer, R., de Laat, C.: Defining intercloud federation framework for multi-provider cloud services integration. In: The 4th International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2013), Valencia, Spain, 27 May\u20131 June 2013"},{"key":"13_CR36","unstructured":"eduGAIN - Federated access to network services and applications. http:\/\/www.edugain.org"},{"key":"13_CR37","doi-asserted-by":"crossref","unstructured":"Ngo, C., Membrey, P., Demchenko, Y., De Laat, C.: Policy and context management in dynamically provisioned access control service for virtualized cloud infrastructures. In: 2012 7th International Conference on Availability, Reliability and Security (ARES), pp. 343\u2013349, 20\u201324 Aug 2012","DOI":"10.1109\/ARES.2012.81"},{"key":"13_CR38","doi-asserted-by":"crossref","unstructured":"Ngo, C., Demchenko, Y., de Laat, C.: Toward a dynamic trust establishment approach for multi-provider intercloud environment. In: Proceedings of 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom), pp. 532\u2013538, 3\u20136 Dec 2012","DOI":"10.1109\/CloudCom.2012.6427548"},{"key":"13_CR39","doi-asserted-by":"crossref","unstructured":"Demchenko, Y., Gommans, L., de Laat, C.: Using SAML and XACML for complex resource provisioning in grid based applications. In: Proceedings of IEEE Workshop on Policies for Distributed Systems and Networks (POLICY 2007), Bologna, Italy, 13\u201315 June 2007","DOI":"10.1109\/POLICY.2007.48"},{"key":"13_CR40","doi-asserted-by":"crossref","unstructured":"Demchenko, Y., Cristea, M., de Laat, C.: XACML Policy profile for multidomain Network Resource Provisioning and supporting authorisation infrastructure. In: IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY 2009), London, UK, 20\u201322 July 2009","DOI":"10.1109\/POLICY.2009.33"},{"key":"13_CR41","doi-asserted-by":"crossref","unstructured":"Ngo, C., Makkes, M., Demchenko, Y., de Laat, C.: Multi-data-types interval decision diagrams for XACML evaluation engine. In: 11th International Conference on Privacy, Security and Trust 2013 (PST 2013), 10\u201312 July 2013 (to be published)","DOI":"10.1109\/PST.2013.6596061"},{"key":"13_CR42","unstructured":"MongoDB. http:\/\/www.mongodb.org\/"},{"key":"13_CR43","unstructured":"Apache Cassandra. http:\/\/cassandra.apache.org\/"},{"key":"13_CR44","unstructured":"Apache Accumulo. http:\/\/accumulo.apache.org\/"},{"key":"13_CR45","unstructured":"Goyal, V., Pandeyy, O., Sahaiz, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS \u201906. http:\/\/research.microsoft.com\/en-us\/um\/people\/vipul\/abe.pdf"},{"key":"13_CR46","series-title":"LNCS","first-page":"515","volume-title":"TCC 2007","author":"M Chase","year":"2007","unstructured":"Chase, M.: Multi-authority attribute based encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 515\u2013534. Springer, Heidelberg (2007). http:\/\/cs.brown.edu\/~mchase\/papers\/multiabe.pdf"},{"key":"13_CR47","doi-asserted-by":"crossref","unstructured":"Demchenko, Y., Gommans, L., de Laat, C.: Extending user-controlled security domain with TPM\/TCG in grid-based virtual collaborative environment. In: Proceedings The 2007 International Symposium on Collaborative Technologies and Systems (CTS 2007), pp. 57\u201365, Orlando, 21\u201325 May 2007. ISBN: 0-9785699-1-1","DOI":"10.1109\/CTS.2007.4621738"},{"key":"13_CR48","doi-asserted-by":"crossref","unstructured":"Membrey, P., Chan, K.C.C., Ngo, C., Demchenko, Y., de Laat, C.: Trusted virtual infrastructure bootstrapping for on demand services. In: The 7th International Conference on Availability, Reliability and Security (AReS 2012), Prague, 20\u201324 Aug 2012. ISBN: 978-0-7695-4775-6","DOI":"10.1109\/ARES.2012.82"},{"key":"13_CR49","doi-asserted-by":"crossref","unstructured":"Yahalom, R., Klein, B., Beth, T.: Trust relationships in secure systems-a distributed authentication perspective. In: Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 150\u2013164. IEEE (1993)","DOI":"10.1109\/RISP.1993.287635"},{"key":"13_CR50","doi-asserted-by":"crossref","unstructured":"Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Proceedings of the 11th ACM Conference on Trust and Security in Computer Systems (2004). http:\/\/portal.acm.org\/citation.cfm?id=1030083.1030103","DOI":"10.1145\/1030083.1030103"},{"key":"13_CR51","unstructured":"Research Data Alliance (RDA). http:\/\/rd-alliance.org\/"}],"container-title":["Lecture Notes in Computer Science","Secure Data Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06811-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T22:33:57Z","timestamp":1746225237000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-06811-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319068107","9783319068114"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06811-4_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"15 May 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}