{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:50:08Z","timestamp":1774367408555,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,7]],"date-time":"2017-06-07T00:00:00Z","timestamp":1496793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1538418"],"award-info":[{"award-number":["CNS-1538418"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1111925"],"award-info":[{"award-number":["CNS-1111925"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1423481"],"award-info":[{"award-number":["CNS-1423481"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"DoD ARL","award":["W911NF-15-1-0518"],"award-info":[{"award-number":["W911NF-15-1-0518"]}]},{"name":"The Texas Sustainable Energy Research Institute at UTSA"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,7]]},"DOI":"10.1145\/3078861.3084173","type":"proceedings-article","created":{"date-parts":[[2017,5,31]],"date-time":"2017-05-31T19:31:40Z","timestamp":1496259100000},"page":"183-190","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Multi-Layer Authorization Framework for a Representative Hadoop Ecosystem Deployment"],"prefix":"10.1145","author":[{"given":"Maanak","family":"Gupta","sequence":"first","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]},{"given":"Farhan","family":"Patwa","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]},{"given":"James","family":"Benson","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]},{"given":"Ravi","family":"Sandhu","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Apache Ambari. https:\/\/ambari.apache.org\/.  Apache Ambari. https:\/\/ambari.apache.org\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Apache Atlas. http:\/\/atlas.apache.org\/.  Apache Atlas. http:\/\/atlas.apache.org\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Apache Hadoop. http:\/\/hadoop.apache.org\/.  Apache Hadoop. http:\/\/hadoop.apache.org\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Apache Knox. https:\/\/knox.apache.org\/.  Apache Knox. https:\/\/knox.apache.org\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Apache Ranger. http:\/\/ranger.apache.org\/.  Apache Ranger. http:\/\/ranger.apache.org\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Apache Sentry. http:\/\/sentry.apache.org\/.  Apache Sentry. http:\/\/sentry.apache.org\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Cloudera. Cloudera Distribution Hadoop. https:\/\/www.cloudera.com\/.  Cloudera. Cloudera Distribution Hadoop. https:\/\/www.cloudera.com\/."},{"key":"e_1_3_2_1_8_1","volume-title":"IBM","author":"Das Devaraj","year":"2011","unstructured":"Devaraj Das , Owen O'Malley , Sanjay Radia , and Kan Zhang . 2011. Adding Security to Apache Hadoop. Hortonworks , IBM ( 2011 ). Devaraj Das, Owen O'Malley, Sanjay Radia, and Kan Zhang. 2011. Adding Security to Apache Hadoop. Hortonworks, IBM (2011)."},{"key":"e_1_3_2_1_9_1","unstructured":"Balaji Ganeshan and Alok Nath. 2015. Dynamic Policy Hooks in Ranger. https:\/\/cwiki.apache.org\/confluence\/display\/RANGER\/Dynamic+Policy+Hooks+in+Ranger+-+Configure+and+Use. (2015).  Balaji Ganeshan and Alok Nath. 2015. Dynamic Policy Hooks in Ranger. https:\/\/cwiki.apache.org\/confluence\/display\/RANGER\/Dynamic+Policy+Hooks+in+Ranger+-+Configure+and+Use. (2015)."},{"key":"e_1_3_2_1_10_1","unstructured":"John Gantz et al. 2012. Digital universe in 2020: Big data bigger digital shadows and biggest growth in the far east. IDC iView: IDC Analyze the future (2012).  John Gantz et al. 2012. Digital universe in 2020: Big data bigger digital shadows and biggest growth in the far east. IDC iView: IDC Analyze the future (2012)."},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. of IFIP DBSec (To appear)","author":"Gupta Maanak","unstructured":"Maanak Gupta , Farhan Patwa , and Ravi Sandhu . 2017. Object-Tagged RBAC Model for the Hadoop Ecosystem . In Proc. of IFIP DBSec (To appear) . Springer , 18 Pages. Maanak Gupta, Farhan Patwa, and Ravi Sandhu. 2017. Object-Tagged RBAC Model for the Hadoop Ecosystem. In Proc. of IFIP DBSec (To appear). Springer, 18 Pages."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078861.3084164"},{"key":"e_1_3_2_1_13_1","volume-title":"Proc","author":"Gupta Maanak","unstructured":"Maanak Gupta and Ravi Sandhu . 2016. The GURAG Administrative Model for User and Group Attribute Assignment . In Proc . of NSS. Springer , 318--332. Maanak Gupta and Ravi Sandhu. 2016. The GURAG Administrative Model for User and Group Attribute Assignment. In Proc. of NSS. Springer, 318--332."},{"key":"e_1_3_2_1_14_1","unstructured":"Hortonworks. Hortonworks Data Platform. https:\/\/hortonworks.com\/.  Hortonworks. Hortonworks Data Platform. https:\/\/hortonworks.com\/."},{"key":"e_1_3_2_1_15_1","unstructured":"Robert Hryniewicz. 2016. Best Practices in HDFS Autorization with Apache Ranger. https:\/\/hortonworks.com\/blog\/best-practices-in-hdfs-authorization-with-apache-ranger\/. (2016).  Robert Hryniewicz. 2016. Best Practices in HDFS Autorization with Apache Ranger. https:\/\/hortonworks.com\/blog\/best-practices-in-hdfs-authorization-with-apache-ranger\/. (2016)."},{"key":"e_1_3_2_1_16_1","unstructured":"Robert Hryniewicz. 2016. Best Practices in Hive Autorization with Apache Ranger. https:\/\/hortonworks.com\/blog\/best-practices-for-hive-authorization-using-apache-ranger -in-hdp-2--2\/. (2016).  Robert Hryniewicz. 2016. Best Practices in Hive Autorization with Apache Ranger. https:\/\/hortonworks.com\/blog\/best-practices-for-hive-authorization-using-apache-ranger -in-hdp-2--2\/. (2016)."},{"key":"e_1_3_2_1_17_1","unstructured":"MapR. Converged Data Platform. https:\/\/mapr.com\/.  MapR. Converged Data Platform. https:\/\/mapr.com\/."},{"key":"e_1_3_2_1_18_1","unstructured":"Madhan Neethiraj. 2016. Geo-location based policies. https:\/\/cwiki.apache.org\/confluence\/display\/RANGER\/Geo-location+based+policies. (2016).  Madhan Neethiraj. 2016. Geo-location based policies. https:\/\/cwiki.apache.org\/confluence\/display\/RANGER\/Geo-location+based+policies. (2016)."},{"key":"e_1_3_2_1_19_1","volume-title":"Hadoop Security Design. Yahoo","author":"O'Malley Owen","year":"2009","unstructured":"Owen O'Malley , Kan Zhang , Sanjay Radia , Ram Marti , and Christopher Harrell . 2009. Hadoop Security Design. Yahoo , Inc., Tech. Rep ( 2009 ). Owen O'Malley, Kan Zhang, Sanjay Radia, Ram Marti, and Christopher Harrell. 2009. Hadoop Security Design. Yahoo, Inc., Tech. Rep (2009)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_21_1","volume-title":"Protecting your Platform. \"O'Reilly Media","author":"Spivey Ben","unstructured":"Ben Spivey and Joey Echeverria . 2015. Hadoop Security . Protecting your Platform. \"O'Reilly Media , Inc .\" Ben Spivey and Joey Echeverria. 2015. Hadoop Security. Protecting your Platform. \"O'Reilly Media, Inc.\""},{"key":"e_1_3_2_1_22_1","volume-title":"Hadoop: The Definitive Guide. \"O'Reilly Media","author":"White Tom","year":"2012","unstructured":"Tom White . 2012 . Hadoop: The Definitive Guide. \"O'Reilly Media , Inc .\". Tom White. 2012. Hadoop: The Definitive Guide. \"O'Reilly Media, Inc.\"."},{"key":"e_1_3_2_1_23_1","volume-title":"Big Data: Intel IT's Secure Hadoop Platform.","author":"Chandhu Yalla","year":"2016","unstructured":"Chandhu Yalla et al. 2016 . Big Data: Intel IT's Secure Hadoop Platform. (2016). Chandhu Yalla et al. 2016. Big Data: Intel IT's Secure Hadoop Platform. (2016)."}],"event":{"name":"SACMAT'17: The 22nd ACM Symposium on Access Control Models and Technologies","location":"Indianapolis Indiana USA","acronym":"SACMAT'17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078861.3084173","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3078861.3084173","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3078861.3084173","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:09Z","timestamp":1750215789000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078861.3084173"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,7]]},"references-count":23,"alternative-id":["10.1145\/3078861.3084173","10.1145\/3078861"],"URL":"https:\/\/doi.org\/10.1145\/3078861.3084173","relation":{},"subject":[],"published":{"date-parts":[[2017,6,7]]},"assertion":[{"value":"2017-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}