{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T23:21:29Z","timestamp":1751239289468,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/bigdata.2016.7840646","type":"proceedings-article","created":{"date-parts":[[2017,2,7]],"date-time":"2017-02-07T16:46:59Z","timestamp":1486486019000},"page":"548-554","source":"Crossref","is-referenced-by-count":7,"title":["Pick your choice in HBase: Security or performance"],"prefix":"10.1109","author":[{"given":"Frank","family":"Pallas","sequence":"first","affiliation":[]},{"given":"Johannes","family":"Gunther","sequence":"additional","affiliation":[]},{"given":"David","family":"Bermbach","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807152"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14778\/2732977.2732995"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04936-6_3"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14778\/2367502.2367512"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISPDC.2015.33"},{"article-title":"HBase in Action","year":"2012","author":"dimiduk","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48616-0_10"},{"key":"ref17","article-title":"Securing big data hadoop: a review of security issues, threats and solution","volume":"5","author":"sharma","year":"2014","journal-title":"Int J Comput Sci Inf Technol"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17040-4_20"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.751458"},{"article-title":"A fully homomorphic encryption scheme","year":"2009","author":"gentry","key":"ref4"},{"journal-title":"Cloud Security Alliance","article-title":"Security guidance for critical areas of focus in cloud computing v3.0","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-9278-8_2"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046682"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4120"},{"article-title":"HBase: The Definitive Guide","year":"2015","author":"george","key":"ref7"},{"key":"ref2","first-page":"27","article-title":"Benchmarking the Performance Impact of TransportLayer Security in Cloud Database Systems","author":"milller","year":"2014","journal-title":"Proceedings of the IC2E"},{"article-title":"Hadoop Security - Protecting Your Big Data Platform","year":"2015","author":"spivey","key":"ref9"},{"journal-title":"Apache Software Foundation","article-title":"Apache hbase reference guide","year":"2016","key":"ref1"},{"key":"ref20","first-page":"197","article-title":"Anatomy and performance of ssl processing","author":"zhao","year":"2005","journal-title":"Proc ISSPA 2005"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/QUATIC.2012.17"},{"key":"ref21","first-page":"360","article-title":"Perfor-mance comparison of security mechanisms for grid services","author":"shirasuna","year":"2004","journal-title":"Proc of GRIDNETS 2004"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2014.37"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1594156.1594168"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC.2014.23"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2093185.2093186"}],"event":{"name":"2016 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2016,12,5]]},"location":"Washington DC,USA","end":{"date-parts":[[2016,12,8]]}},"container-title":["2016 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7818133\/7840573\/07840646.pdf?arnumber=7840646","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,13]],"date-time":"2017-12-13T14:37:08Z","timestamp":1513175828000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7840646\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2016.7840646","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}