{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:10Z","timestamp":1750221250589,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,27]],"date-time":"2018-08-27T00:00:00Z","timestamp":1535328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,27]]},"DOI":"10.1145\/3230833.3232816","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T12:29:48Z","timestamp":1534163388000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["New authentication concept using certificates for big data analytic tools"],"prefix":"10.1145","author":[{"given":"Paul J. E.","family":"Velthuis","sequence":"first","affiliation":[{"name":"Fraunhofer Institute for Secure, Information Technology SIT, Darmstadt, Germany"}]},{"given":"Marcel","family":"Sch\u00e4fer","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Secure, Information Technology SIT, Darmstadt, Germany"}]},{"given":"Martin","family":"Steinebach","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Secure, Information Technology SIT, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2018,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Amazon. 2016. AWS LAMBDA. https:\/\/aws.amazon.com\/lambda\/details\/. (2016). Accessed: 2018-02-03.  Amazon. 2016. AWS LAMBDA. https:\/\/aws.amazon.com\/lambda\/details\/. (2016). Accessed: 2018-02-03."},{"key":"e_1_3_2_1_2_1","unstructured":"Slim Baltagi. 2015. Flink vs. Spark. https:\/\/de.slideshare.net\/sbaltagi\/flink-vs-spark. (2015). Accessed: 2017-05-10.  Slim Baltagi. 2015. Flink vs. Spark. https:\/\/de.slideshare.net\/sbaltagi\/flink-vs-spark. (2015). Accessed: 2017-05-10."},{"key":"e_1_3_2_1_3_1","volume-title":"Taming the beast: Assess Kerberos-protected networks. Black Hat EU","author":"Bouillon Emmanuel","year":"2009","unstructured":"Emmanuel Bouillon . 2009. Taming the beast: Assess Kerberos-protected networks. Black Hat EU ( 2009 ). Emmanuel Bouillon. 2009. Taming the beast: Assess Kerberos-protected networks. Black Hat EU (2009)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Tim Dierks. 2008. The transport layer security (TLS) protocol version 1.2. (2008).  Tim Dierks. 2008. The transport layer security (TLS) protocol version 1.2. (2008).","DOI":"10.17487\/rfc5246"},{"volume-title":"Hadoop security","author":"Dutta Shivaji","key":"e_1_3_2_1_5_1","unstructured":"Shivaji Dutta . 2015. Hadoop security . http:\/\/de.slideshare.net\/duttashivaji\/hadoop-security-48127428. (2015). Accessed: 2017-01-30. Shivaji Dutta. 2015. Hadoop security. http:\/\/de.slideshare.net\/duttashivaji\/hadoop-security-48127428. (2015). Accessed: 2017-01-30."},{"key":"e_1_3_2_1_6_1","unstructured":"Apache Flink. 2017. Apache Flink is an open source platform for distributed stream and batch data processing. https:\/\/flink.apache.org\/. (2017). Accessed: 2017-01-10.  Apache Flink. 2017. Apache Flink is an open source platform for distributed stream and batch data processing. https:\/\/flink.apache.org\/. (2017). Accessed: 2017-01-10."},{"key":"e_1_3_2_1_7_1","unstructured":"Ajit Gaddam. 2015. Securing Your Big Data Environment. https:\/\/www.blackhat.com\/docs\/us-15\/materials\/us-15-Gaddam-Securing-Your-Big-Data-Environment.pdf. (2015). Accessed: 2017-05-30 Whitepaper: https:\/\/www.blackhat.com\/docs\/us-15\/materials\/us-15-Gaddam-Securing-Your-Big-Data-Environment-wp.pdf.  Ajit Gaddam. 2015. Securing Your Big Data Environment. https:\/\/www.blackhat.com\/docs\/us-15\/materials\/us-15-Gaddam-Securing-Your-Big-Data-Environment.pdf. (2015). Accessed: 2017-05-30 Whitepaper: https:\/\/www.blackhat.com\/docs\/us-15\/materials\/us-15-Gaddam-Securing-Your-Big-Data-Environment-wp.pdf."},{"key":"e_1_3_2_1_8_1","volume-title":"A study on implementing iterative algorithms using big data frameworks. School of IT Research Conversazione Posters","author":"Galilee Jack","year":"2014","unstructured":"Jack Galilee and Ying Zhou . 2014. A study on implementing iterative algorithms using big data frameworks. School of IT Research Conversazione Posters ( 2014 ). Jack Galilee and Ying Zhou. 2014. A study on implementing iterative algorithms using big data frameworks. School of IT Research Conversazione Posters (2014)."},{"key":"e_1_3_2_1_9_1","volume-title":"Kerberos Attacks: What You Need to Know. https:\/\/www.cyberark.com\/blog\/kerberos-attacks-what-you-need-to-know\/.","author":"Hart Matan","year":"2015","unstructured":"Matan Hart . 2015 . Kerberos Attacks: What You Need to Know. https:\/\/www.cyberark.com\/blog\/kerberos-attacks-what-you-need-to-know\/. (2015). Accessed : 2017-06-29. Matan Hart. 2015. Kerberos Attacks: What You Need to Know. https:\/\/www.cyberark.com\/blog\/kerberos-attacks-what-you-need-to-know\/. (2015). Accessed: 2017-06-29."},{"key":"e_1_3_2_1_10_1","unstructured":"Internet Engineering Task Force (IETF). 2011. RFC 6238 - TOTP: Time-Based One-Time Password Algorithm. https:\/\/tools.ietf.org\/html\/rfc6238. (2011). Accessed: 2017-01-30.  Internet Engineering Task Force (IETF). 2011. RFC 6238 - TOTP: Time-Based One-Time Password Algorithm. https:\/\/tools.ietf.org\/html\/rfc6238. (2011). Accessed: 2017-01-30."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCKE.2014.6993455"},{"key":"e_1_3_2_1_12_1","unstructured":"Nicolas Williams Jeffrey Altman Viktor Dukhovni. 2017. Orpheus' Lyre puts Kerberos to Sleep! https:\/\/www.orplieus-lyre.info\/. (2017). Accessed: 2017-07-24.  Nicolas Williams Jeffrey Altman Viktor Dukhovni. 2017. Orpheus' Lyre puts Kerberos to Sleep! https:\/\/www.orplieus-lyre.info\/. (2017). Accessed: 2017-07-24."},{"key":"e_1_3_2_1_13_1","volume-title":"David Ngo Chek Ling, and Alwyn Goh","author":"Beng Jin Andrew Teoh","year":"2004","unstructured":"Andrew Teoh Beng Jin , David Ngo Chek Ling, and Alwyn Goh . 2004 . Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern recognition 37, 11 (2004), 2245--2255. Andrew Teoh Beng Jin, David Ngo Chek Ling, and Alwyn Goh. 2004. Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern recognition 37, 11 (2004), 2245--2255."},{"volume-title":"Fraunhofer SIT: OmniCloud for Secure Data Backups in Multiple Storage Clouds","author":"Kuech Oliver","key":"e_1_3_2_1_14_1","unstructured":"Oliver Kuech . 2012. Fraunhofer SIT: OmniCloud for Secure Data Backups in Multiple Storage Clouds . http:\/\/www.businesswire.com\/news\/home\/20120229006190\/en\/Fraunhofer-SIT-OmniCloud-Secure-Data-Backups-Multiple. (2012). Accessed: 2017-01-30. Oliver Kuech. 2012. Fraunhofer SIT: OmniCloud for Secure Data Backups in Multiple Storage Clouds. http:\/\/www.businesswire.com\/news\/home\/20120229006190\/en\/Fraunhofer-SIT-OmniCloud-Secure-Data-Backups-Multiple. (2012). Accessed: 2017-01-30."},{"key":"e_1_3_2_1_15_1","unstructured":"Steve Loughran. 2017. Hadoop and Kerberos: The Madness Beyond the Gate. https:\/\/www.gitbook.com\/book\/steveloughran\/kerberos_and_hadoop\/details. (2017). Accessed: 2017-09-02.  Steve Loughran. 2017. Hadoop and Kerberos: The Madness Beyond the Gate. https:\/\/www.gitbook.com\/book\/steveloughran\/kerberos_and_hadoop\/details. (2017). Accessed: 2017-09-02."},{"key":"e_1_3_2_1_16_1","volume-title":"OSCON 2016: Netflix BLESS. https:\/\/www.youtube.com\/watch?v=JwLGsWYVjqU&t=6s. (2016","author":"Netflix Security","year":"2016","unstructured":"Security Netflix . 2016 . OSCON 2016: Netflix BLESS. https:\/\/www.youtube.com\/watch?v=JwLGsWYVjqU&t=6s. (2016 ). Accessed : 2017-01-30. Security Netflix. 2016. OSCON 2016: Netflix BLESS. https:\/\/www.youtube.com\/watch?v=JwLGsWYVjqU&t=6s. (2016). Accessed: 2017-01-30."},{"key":"e_1_3_2_1_17_1","volume-title":"5 Myths about Spark & Big Data","author":"Nik Rouda Jennifer Gahm","year":"2016","unstructured":"Jennifer Gahm Nik Rouda , Bill Lundell . 2016. 5 Myths about Spark & Big Data . The Enterprise Strategy Group . https:\/\/manahkalpita.files.wordpress.com\/ 2016 \/03\/9gnikrouda-160224012711.pdf Jennifer Gahm Nik Rouda, Bill Lundell. 2016. 5 Myths about Spark & Big Data. The Enterprise Strategy Group. https:\/\/manahkalpita.files.wordpress.com\/2016\/03\/9gnikrouda-160224012711.pdf"},{"key":"e_1_3_2_1_18_1","unstructured":"U.S. Department of Health & Human Services. 2013. HIPAA Privacy Rule. https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/laws-regulations\/index.html. (2013). Accessed: 2018-04-15.  U.S. Department of Health & Human Services. 2013. HIPAA Privacy Rule. https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/laws-regulations\/index.html. (2013). Accessed: 2018-04-15."},{"key":"e_1_3_2_1_19_1","volume-title":"Michael Dolinsky, Ohad Plotnik, Gregory Messerman, and Sivan Krigsman.","author":"Plotnik Idan","year":"2014","unstructured":"Idan Plotnik , Tal Arieh Be'ery , Michael Dolinsky, Ohad Plotnik, Gregory Messerman, and Sivan Krigsman. 2014 . System, Method and Process for Detecting Advanced and Targeted Attacks with the Recoupling of Kerberos Authentication and Authorization. (Sept. 1 2014). US Patent App . 14\/474,198. Idan Plotnik, Tal Arieh Be'ery, Michael Dolinsky, Ohad Plotnik, Gregory Messerman, and Sivan Krigsman. 2014. System, Method and Process for Detecting Advanced and Targeted Attacks with the Recoupling of Kerberos Authentication and Authorization. (Sept. 1 2014). US Patent App. 14\/474,198."},{"key":"e_1_3_2_1_20_1","volume-title":"Big data analytics. TDWI best practices report, fourth quarter 19","author":"Russom Philip","year":"2011","unstructured":"Philip Russom and others. 2011. Big data analytics. TDWI best practices report, fourth quarter 19 ( 2011 ), 40. Philip Russom and others. 2011. Big data analytics. TDWI best practices report, fourth quarter 19 (2011), 40."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CTS.2013.6567202"},{"volume-title":"Apache Spark is a fast and general engine for large-scale data processing","author":"Spark Apache","key":"e_1_3_2_1_22_1","unstructured":"Apache Spark . 2017. Apache Spark is a fast and general engine for large-scale data processing . http:\/\/spark.apache.org\/. (2017). Accessed: 2017-03-09. Apache Spark. 2017. Apache Spark is a fast and general engine for large-scale data processing. http:\/\/spark.apache.org\/. (2017). Accessed: 2017-03-09."},{"key":"e_1_3_2_1_23_1","volume-title":"Hadoop Security: Protecting your big data platform","author":"Spivey Ben","year":"2015","unstructured":"Ben Spivey and Joey Echeverria . 2015 . Hadoop Security: Protecting your big data platform . O'Reilly Media, Inc. Ben Spivey and Joey Echeverria. 2015. Hadoop Security: Protecting your big data platform. O'Reilly Media, Inc."},{"key":"e_1_3_2_1_24_1","volume-title":"Kerberos: An Authentication Service for Open Network Systems. In Usenix Winter. 191--202.","author":"Steiner Jennifer G","year":"1988","unstructured":"Jennifer G Steiner , B Clifford Neuman , and Jeffrey I Schiller . 1988 . Kerberos: An Authentication Service for Open Network Systems. In Usenix Winter. 191--202. Jennifer G Steiner, B Clifford Neuman, and Jeffrey I Schiller. 1988. Kerberos: An Authentication Service for Open Network Systems. In Usenix Winter. 191--202."},{"key":"e_1_3_2_1_25_1","unstructured":"Trunomi. 2018. GDPR. https:\/\/www.eugdpr.org. (2018). Accessed: 2018-04-15.  Trunomi. 2018. GDPR. https:\/\/www.eugdpr.org. (2018). Accessed: 2018-04-15."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523616.2523633"},{"volume-title":"How to Secure Data in Hadoop","author":"Venkatesh Sudeep","key":"e_1_3_2_1_27_1","unstructured":"Sudeep Venkatesh . 2015. How to Secure Data in Hadoop . http:\/\/data-informed.com\/how-to-secure-data-in-hadoop\/. (2015). Accessed: 2017-06-18. Sudeep Venkatesh. 2015. How to Secure Data in Hadoop. http:\/\/data-informed.com\/how-to-secure-data-in-hadoop\/. (2015). Accessed: 2017-06-18."},{"volume-title":"Network Security with OpenSSL: Cryptography for Secure Communications. \" O'Reilly Media","author":"Viega John","key":"e_1_3_2_1_28_1","unstructured":"John Viega , Matt Messier , and Pravir Chandra . 2002. Network Security with OpenSSL: Cryptography for Secure Communications. \" O'Reilly Media , Inc .\". John Viega, Matt Messier, and Pravir Chandra. 2002. Network Security with OpenSSL: Cryptography for Secure Communications. \" O'Reilly Media, Inc.\"."},{"key":"e_1_3_2_1_29_1","volume-title":"Hadoop: The definitive guide","author":"White Tom","year":"2012","unstructured":"Tom White . 2012 . Hadoop: The definitive guide . O'Reilly Media, Inc. 43, 93 pages. Tom White. 2012. Hadoop: The definitive guide. O'Reilly Media, Inc. 43, 93 pages."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2013.6737583"}],"event":{"name":"ARES 2018: International Conference on Availability, Reliability and Security","sponsor":["Universit\u00e4t Hamburg Universit\u00e4t Hamburg"],"location":"Hamburg Germany","acronym":"ARES 2018"},"container-title":["Proceedings of the 13th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3232816","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230833.3232816","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:50Z","timestamp":1750212470000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3232816"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,27]]},"references-count":30,"alternative-id":["10.1145\/3230833.3232816","10.1145\/3230833"],"URL":"https:\/\/doi.org\/10.1145\/3230833.3232816","relation":{},"subject":[],"published":{"date-parts":[[2018,8,27]]},"assertion":[{"value":"2018-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}