{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T06:57:41Z","timestamp":1763535461393,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,7]],"date-time":"2017-06-07T00:00:00Z","timestamp":1496793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1538418","CNS-1423481"],"award-info":[{"award-number":["CNS-1538418","CNS-1423481"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"DoD ARL","award":["W911NF-15-1-0518"],"award-info":[{"award-number":["W911NF-15-1-0518"]}]},{"name":"NSF Grants","award":["CNS-1111925"],"award-info":[{"award-number":["CNS-1111925"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,7]]},"DOI":"10.1145\/3078861.3084164","type":"proceedings-article","created":{"date-parts":[[2017,5,31]],"date-time":"2017-05-31T19:31:40Z","timestamp":1496259100000},"page":"125-127","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["POSTER"],"prefix":"10.1145","author":[{"given":"Maanak","family":"Gupta","sequence":"first","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]},{"given":"Farhan","family":"Patwa","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]},{"given":"Ravi","family":"Sandhu","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Apache Hadoop. http:\/\/hadoop.apache.org\/.  Apache Hadoop. http:\/\/hadoop.apache.org\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Apache Knox. http:\/\/knox.apache.org\/.  Apache Knox. http:\/\/knox.apache.org\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Apache Ranger. http:\/\/ranger.apache.org\/.  Apache Ranger. http:\/\/ranger.apache.org\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Apache Sentry. http:\/\/sentry.apache.org\/.  Apache Sentry. http:\/\/sentry.apache.org\/."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bdr.2015.08.001"},{"key":"e_1_3_2_1_6_1","volume-title":"IBM","author":"Das Devaraj","year":"2011","unstructured":"Devaraj Das , Owen O'Malley , Sanjay Radia , and Kan Zhang . 2011. Adding security to Apache Hadoop. Hortonworks , IBM ( 2011 ). Devaraj Das, Owen O'Malley, Sanjay Radia, and Kan Zhang. 2011. Adding security to Apache Hadoop. Hortonworks, IBM (2011)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078861.3084173"},{"volume-title":"Proc. of IFIP DBSec (To appear)","author":"Gupta Maanak","key":"e_1_3_2_1_8_1","unstructured":"Maanak Gupta , Farhan Patwa , and Ravi Sandhu . 2017. Object-Tagged RBAC Model for the Hadoop Ecosystem . In Proc. of IFIP DBSec (To appear) . Springer , 18 Pages. Maanak Gupta, Farhan Patwa, and Ravi Sandhu. 2017. Object-Tagged RBAC Model for the Hadoop Ecosystem. In Proc. of IFIP DBSec (To appear). Springer, 18 Pages."},{"volume-title":"Proc","author":"Gupta Maanak","key":"e_1_3_2_1_9_1","unstructured":"Maanak Gupta and Ravi Sandhu . 2016. The GURAG Administrative Model for User and Group Attribute Assignment . In Proc . of NSS. Springer , 318--332. Maanak Gupta and Ravi Sandhu. 2016. The GURAG Administrative Model for User and Group Attribute Assignment. In Proc. of NSS. Springer, 318--332."},{"volume-title":"Proc. of IEEE CollaborateCom. 1--7.","author":"Hu Vincent C.","key":"e_1_3_2_1_10_1","unstructured":"Vincent C. Hu , Tim Grance , David F. Ferraiolo , and D. Rick Kuhn . 2014. An access control scheme for Big Data processing . In Proc. of IEEE CollaborateCom. 1--7. Vincent C. Hu, Tim Grance, David F. Ferraiolo, and D. Rick Kuhn. 2014. An access control scheme for Big Data processing. In Proc. of IEEE CollaborateCom. 1--7."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.33"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31540-4_4"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33704-8_8"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.155"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435370"},{"key":"e_1_3_2_1_16_1","volume-title":"Hadoop security design. Yahoo","author":"O'Malley Owen","year":"2009","unstructured":"Owen O'Malley , Kan Zhang , Sanjay Radia , Ram Marti , and Christopher Harrell . 2009. Hadoop security design. Yahoo , Inc., Tech. Rep ( 2009 ). Owen O'Malley, Kan Zhang, Sanjay Radia, Ram Marti, and Christopher Harrell. 2009. Hadoop security design. Yahoo, Inc., Tech. Rep (2009)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.Congress.2014.16"}],"event":{"name":"SACMAT'17: The 22nd ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Indianapolis Indiana USA","acronym":"SACMAT'17"},"container-title":["Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078861.3084164","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3078861.3084164","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3078861.3084164","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:09Z","timestamp":1750215789000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078861.3084164"}},"subtitle":["Access Control Model for the Hadoop Ecosystem"],"short-title":[],"issued":{"date-parts":[[2017,6,7]]},"references-count":18,"alternative-id":["10.1145\/3078861.3084164","10.1145\/3078861"],"URL":"https:\/\/doi.org\/10.1145\/3078861.3084164","relation":{},"subject":[],"published":{"date-parts":[[2017,6,7]]},"assertion":[{"value":"2017-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}