{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:16:02Z","timestamp":1730265362689,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/iisr.2018.8535990","type":"proceedings-article","created":{"date-parts":[[2018,11,15]],"date-time":"2018-11-15T21:18:10Z","timestamp":1542316690000},"page":"172-177","source":"Crossref","is-referenced-by-count":2,"title":["Comprehensive security management system for Hadoop platforms"],"prefix":"10.1109","author":[{"given":"Tao","family":"Shang","sequence":"first","affiliation":[]},{"given":"Haolin","family":"Zhuang","sequence":"additional","affiliation":[]},{"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Hadoop cluster deployment [J]","year":"2013","author":"zburivsky","key":"ref4"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.1109\/ACCESS.2014.2362522","article-title":"Information Security in Big Data: Privacy and Data Mining[J]","volume":"2","author":"xu","year":"2014","journal-title":"IEEE Access"},{"key":"ref10","first-page":"148s","volume":"11","author":"freier","year":"1996","journal-title":"The SSL protocol version 3 0"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/LISAT.2015.7160211"},{"journal-title":"Transparent encryption and access control for mass-storage devices","year":"2010","author":"usov","key":"ref11"},{"key":"ref5","first-page":"1","article-title":"Securing Big Data Hadoop: A Review of Security Issues, Threats and Solution [J]","volume":"5","author":"priya","year":"2015","journal-title":"International Journal of Computer Science & Information Technology"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1510"},{"journal-title":"DISTRIBUTED BIG DATA SECURITY ARCHITECTURE","year":"2017","author":"peppe","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(15)70009-7"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382913"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49340-4_25"}],"event":{"name":"2018 IEEE International Conference on Intelligence and Safety for Robotics (ISR)","start":{"date-parts":[[2018,8,24]]},"location":"Shenyang","end":{"date-parts":[[2018,8,27]]}},"container-title":["2018 IEEE International Conference on Intelligence and Safety for Robotics (ISR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8517202\/8535604\/08535990.pdf?arnumber=8535990","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T16:14:43Z","timestamp":1643213683000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8535990\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/iisr.2018.8535990","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]}}}