{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:17:23Z","timestamp":1730200643905,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/bigdata.2015.7363962","type":"proceedings-article","created":{"date-parts":[[2015,12,28]],"date-time":"2015-12-28T21:36:21Z","timestamp":1451338581000},"page":"1876-1885","source":"Crossref","is-referenced-by-count":5,"title":["A novel framework for mitigating insider attacks in big data systems"],"prefix":"10.1109","author":[{"given":"Santosh","family":"Aditham","sequence":"first","affiliation":[]},{"given":"Nagarajan","family":"Ranganathan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.03.003"},{"key":"ref11","first-page":"1","article-title":"TrIlnc: Small Trusted Hardware for Large Distributed Systems","volume":"9","author":"levin","year":"2009","journal-title":"NSDI"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2382536.2382540"},{"key":"ref13","article-title":"Raksha: a flexible information flow architecture for software security","volume":"35","author":"michael","year":"2007","journal-title":"ACM SIGARCH Computer Architecture News"},{"key":"ref14","article-title":"Introduction to hardware security and trust","author":"mohammad","year":"2011","journal-title":"Springer Science & Business Media"},{"key":"ref15","article-title":"Getting in control of your control flow with control-data isolation","author":"william","year":"2015","journal-title":"Proceedings of the Annual IEEE\/ACM International Symposium on Code Generation and Optimization"},{"article-title":"Short introduction to log4j","year":"2002","author":"ceki","key":"ref16"},{"key":"ref17","article-title":"ZooKeeper: Wait-free Coordination for Internet-scale Systems","volume":"8","author":"patrick","year":"2010","journal-title":"USENIX Annual Technical Conference"},{"article-title":"Storm, Distributed and Fault-Tolerant Realtime Computation","year":"2014","author":"apache","key":"ref18"},{"year":"2015","key":"ref19"},{"key":"ref4","article-title":"Spark: cluster computing with working sets","author":"matei","year":"2010","journal-title":"Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing"},{"key":"ref3","article-title":"Hadoop: The definitive guide","author":"tom","year":"2012","journal-title":"O'Reilly Media Inc"},{"year":"2015","key":"ref6"},{"year":"2015","key":"ref5"},{"key":"ref8","article-title":"Hadoop Security Design Just Add Kerberos? Really","author":"andrew","year":"2010","journal-title":"ISec Partners"},{"key":"ref7","article-title":"Integrating kerberos into apache hadoop","author":"owen","year":"2010","journal-title":"Kerberos Conference"},{"key":"ref2","first-page":"107","article-title":"MapReduce: simplified data processing on large clusters","volume":"51 1","author":"jeffrey","year":"2008","journal-title":"Communications of the ACM"},{"key":"ref9","article-title":"Attack Tolerant Big Data File System","author":"madan","year":"2013","journal-title":"The Big Data Analytics Workshop at SIGMETRICS"},{"journal-title":"International Data Corporation","year":"2015","key":"ref1"},{"key":"ref20","article-title":"Intel advanced encryption standard instructions (aes-ni)","author":"jeffrey","year":"2010","journal-title":"Technical Report Intel"},{"key":"ref22","article-title":"Secure coprocessors in electronic commerce applications","author":"bennet","year":"1995","journal-title":"Proceedings of the First USENIX Workshop on Electronic Commerce"},{"year":"2015","key":"ref21"},{"key":"ref24","article-title":"Design and Implementation of a TCG-based Integrity Measurement Architecture","volume":"13","author":"reiner","year":"2004","journal-title":"USENIX Security Symposium"},{"key":"ref23","first-page":"84","article-title":"Discovering and exploiting program phases","volume":"23 6","author":"timothy","year":"2003","journal-title":"Micro IEEE"},{"article-title":"Phoronix test suite","year":"2011","author":"michael","key":"ref25"}],"event":{"name":"2015 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2015,10,29]]},"location":"Santa Clara, CA, USA","end":{"date-parts":[[2015,11,1]]}},"container-title":["2015 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7347101\/7363706\/07363962.pdf?arnumber=7363962","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T00:21:21Z","timestamp":1490401281000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7363962\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2015.7363962","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}