{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T18:10:03Z","timestamp":1755886203583,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"NIH (National Institutes of Health)","doi-asserted-by":"publisher","award":["SBIR 1R43LM013960"],"award-info":[{"award-number":["SBIR 1R43LM013960"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["SBIR 1647681, SBIR 1758628"],"award-info":[{"award-number":["SBIR 1647681, SBIR 1758628"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,4]]},"DOI":"10.1145\/3627106.3627132","type":"proceedings-article","created":{"date-parts":[[2023,12,2]],"date-time":"2023-12-02T18:13:22Z","timestamp":1701540802000},"page":"241-255","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8278-431X","authenticated-orcid":false,"given":"Fahad","family":"Shaon","sequence":"first","affiliation":[{"name":"Data Security Technologies, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1258-6470","authenticated-orcid":false,"given":"Sazzadur","family":"Rahaman","sequence":"additional","affiliation":[{"name":"The University of Arizona, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9795-9063","authenticated-orcid":false,"given":"Murat","family":"Kantarcioglu","sequence":"additional","affiliation":[{"name":"Data Security Technologies, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/hadoop.apache.org\/. Accessed","author":"Hadoop Apache","year":"2023","unstructured":"Apache Hadoop. https:\/\/hadoop.apache.org\/. Accessed October 1, 2023."},{"key":"e_1_3_2_1_2_1","volume-title":"https:\/\/hive.apache.org\/. Accessed","author":"Hive Apache","year":"2023","unstructured":"Apache Hive. https:\/\/hive.apache.org\/. Accessed October 1, 2023."},{"key":"e_1_3_2_1_3_1","volume-title":"https:\/\/maven.apache.org\/. Accessed","author":"Maven Apache","year":"2023","unstructured":"Apache Maven. https:\/\/maven.apache.org\/. Accessed October 1, 2023."},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/maven.apache.org\/plugins\/maven-shade-plugin\/index.html. Accessed","author":"Shade Plugin Apache Maven","year":"2023","unstructured":"Apache Maven Shade Plugin. https:\/\/maven.apache.org\/plugins\/maven-shade-plugin\/index.html. Accessed October 1, 2023."},{"key":"e_1_3_2_1_5_1","volume-title":"https:\/\/pig.apache.org\/. Accessed","author":"Pig Apache","year":"2023","unstructured":"Apache Pig. https:\/\/pig.apache.org\/. Accessed October 1, 2023."},{"key":"e_1_3_2_1_6_1","volume-title":"https:\/\/spark.apache.org\/. Accessed","author":"Spark Apache","year":"2023","unstructured":"Apache Spark. https:\/\/spark.apache.org\/. Accessed October 1, 2023."},{"key":"e_1_3_2_1_7_1","volume-title":"https:\/\/zeppelin.apache.org\/. Accessed","author":"Zeppelin Apache","year":"2023","unstructured":"Apache Zeppelin. https:\/\/zeppelin.apache.org\/. Accessed October 1, 2023."},{"key":"e_1_3_2_1_8_1","volume-title":"https:\/\/aws.amazon.com\/athena. Accessed","author":"Athena AWS","year":"2023","unstructured":"AWS Athena. https:\/\/aws.amazon.com\/athena. Accessed October 1, 2023."},{"key":"e_1_3_2_1_9_1","volume-title":"https:\/\/www.ic3.gov\/Media\/Y2022\/PSA220208. Accessed","author":"Swap Criminals Increasing SIM","year":"2023","unstructured":"Criminals Increasing SIM Swap Schemes to Steal Millions of Dollars from US Public. https:\/\/www.ic3.gov\/Media\/Y2022\/PSA220208. Accessed October 1, 2023."},{"key":"e_1_3_2_1_10_1","volume-title":"https:\/\/csrc.nist.gov\/pubs\/sp\/800\/162\/upd2\/final. Accessed","author":"Attribute Based Access Guide","year":"2023","unstructured":"Guide to Attribute Based Access Control (ABAC) Definition and Considerations. https:\/\/csrc.nist.gov\/pubs\/sp\/800\/162\/upd2\/final. Accessed October 1, 2023."},{"key":"e_1_3_2_1_11_1","unstructured":"HiBench is a big data benchmark suite.https:\/\/github.com\/Intel-bigdata\/HiBench. Accessed October 1 2023."},{"key":"e_1_3_2_1_12_1","volume-title":"https:\/\/docs.oracle.com\/javase\/8\/docs\/technotes\/guides\/security\/permissions.html. Accessed","author":"Java Development Permissions","year":"2023","unstructured":"Permissions in the Java Development Kit (JDK). https:\/\/docs.oracle.com\/javase\/8\/docs\/technotes\/guides\/security\/permissions.html. Accessed October 1, 2023."},{"volume-title":"https:\/\/luau-lang.org\/sandbox. Accessed","year":"2023","key":"e_1_3_2_1_13_1","unstructured":"Sandboxing. https:\/\/luau-lang.org\/sandbox. Accessed October 1, 2023."},{"volume-title":"https:\/\/www.axiomatics.com\/news\/axiomatics-launches-smartguard-for-data-spark-sql-edition\/. Accessed","year":"2023","key":"e_1_3_2_1_14_1","unstructured":"Smartguard. https:\/\/www.axiomatics.com\/news\/axiomatics-launches-smartguard-for-data-spark-sql-edition\/. Accessed October 1, 2023."},{"key":"e_1_3_2_1_15_1","volume-title":"https:\/\/github.com\/soot-oss\/soot. Accessed","author":"Soot","year":"2023","unstructured":"Soot - A Java optimization framework. https:\/\/github.com\/soot-oss\/soot. Accessed October 1, 2023."},{"key":"e_1_3_2_1_16_1","unstructured":"Spark SQL DataFrames and Datasets Guide. http:\/\/spark.apache.org\/docs\/3.1.1\/sql-programming-guide.html. Accessed October 1 2023."},{"key":"e_1_3_2_1_17_1","volume-title":"https:\/\/imagej.net\/develop\/uber-jars. Accessed","author":"JAR.","year":"2023","unstructured":"Uber-JAR. https:\/\/imagej.net\/develop\/uber-jars. Accessed October 1, 2023."},{"key":"e_1_3_2_1_18_1","volume-title":"https:\/\/www.mongodb.com\/unstructured-data. Accessed","author":"Data Unstructured","year":"2023","unstructured":"Unstructured Data. https:\/\/www.mongodb.com\/unstructured-data. Accessed October 1, 2023."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2742797"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.02.052"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1561\/1900000014"},{"key":"e_1_3_2_1_22_1","volume-title":"Broken Fingers: On the Usage of the Fingerprint API in Android. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018","author":"Bianchi Antonio","year":"2018","unstructured":"Antonio Bianchi, Yanick Fratantonio, Aravind Machiry, Christopher Kruegel, Giovanni Vigna, Simon Pak\u00a0Ho Chung, and Wenke Lee. 2018. Broken Fingers: On the Usage of the Fingerprint API in Android. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Amiangshu Bosu Fang Liu Danfeng\u00a0(Daphne) Yao and Gang Wang. 2017. Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications. In ACM AsiaCCS\u201917. 71\u201385.","DOI":"10.1145\/3052973.3053004"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-013-0489-0"},{"volume-title":"Determining HDP Memory Configuration Settings. https:\/\/docs.cloudera.com\/HDPDocuments\/HDP2\/HDP-2.6.4\/bk_command-line-installation\/content\/determine-hdp-memory-config.html. Accessed","year":"2023","key":"e_1_3_2_1_25_1","unstructured":"Cloudera. Determining HDP Memory Configuration Settings. https:\/\/docs.cloudera.com\/HDPDocuments\/HDP2\/HDP-2.6.4\/bk_command-line-installation\/content\/determine-hdp-memory-config.html. Accessed October 1, 2023."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(87)90122-2"},{"key":"e_1_3_2_1_27_1","volume-title":"10 Charts That Will Change Your Perspective Of Big Data\u2019s Growth. https:\/\/www.forbes.com\/sites\/louiscolumbus\/2018\/05\/23\/10-charts-that-will-change-your-perspective-of-big-datas-growth\/. Accessed","author":"Columbus Louis","year":"2023","unstructured":"Louis Columbus. 10 Charts That Will Change Your Perspective Of Big Data\u2019s Growth. https:\/\/www.forbes.com\/sites\/louiscolumbus\/2018\/05\/23\/10-charts-that-will-change-your-perspective-of-big-datas-growth\/. Accessed October 1, 2023."},{"key":"e_1_3_2_1_28_1","volume-title":"ALASTOR: Reconstructing the Provenance of Serverless Intrusions. In 31st USENIX Security Symposium, USENIX Security 2022","author":"Datta Pubali","year":"2022","unstructured":"Pubali Datta, Isaac Polinsky, Muhammad\u00a0Adil Inam, Adam Bates, and William Enck. 2022. ALASTOR: Reconstructing the Provenance of Serverless Intrusions. In 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022, Kevin R.\u00a0B. Butler and Kurt Thomas (Eds.). USENIX Association, 2443\u20132460."},{"key":"e_1_3_2_1_29_1","volume-title":"MapReduce: Simplified Data Processing on Large Clusters. In 6th Symposium on Operating System Design and Implementation (OSDI 2004","author":"Dean Jeffrey","year":"2004","unstructured":"Jeffrey Dean and Sanjay Ghemawat. 2004. MapReduce: Simplified Data Processing on Large Clusters. In 6th Symposium on Operating System Design and Implementation (OSDI 2004), San Francisco, California, USA, December 6-8, 2004. 137\u2013150."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2016.05.001"},{"key":"e_1_3_2_1_31_1","volume-title":"Data Frames. https:\/\/www.rdocumentation.org\/packages\/base\/versions\/3.6.2\/topics\/data.frame. Accessed","author":"Documentation R","year":"2023","unstructured":"R Documentation. Data Frames. https:\/\/www.rdocumentation.org\/packages\/base\/versions\/3.6.2\/topics\/data.frame. Accessed October 1, 2023."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Manuel Egele David Brumley Yanick Fratantonio and Christopher Kruegel. 2013. An empirical study of cryptographic misuse in Android applications. In ACM CCS\u201913. 73\u201384.","DOI":"10.1145\/2508859.2516693"},{"key":"e_1_3_2_1_33_1","unstructured":"\u00dalfar Erlingsson. 2004. The Inlined Reference Monitor Approach to Security Policy Enforcement. Ph.\u00a0D. Dissertation. USA. Advisor(s) Schneider Fred B. AAI3114521."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Sascha Fahl Marian Harbach Thomas Muders Matthew Smith Lars Baumg\u00e4rtner and Bernd Freisleben. 2012. Why Eve and Mallory love Android: an analysis of Android SSL (in)Security. In ACM CCS\u201912. 50\u201361.","DOI":"10.1145\/2382196.2382205"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180457.3180463"},{"key":"e_1_3_2_1_37_1","volume-title":"Tapping the power of unstructured data. https:\/\/mitsloan.mit.edu\/ideas-made-to-matter\/tapping-power-unstructured-data. Accessed","author":"Harbert Tam","year":"2023","unstructured":"Tam Harbert. Tapping the power of unstructured data. https:\/\/mitsloan.mit.edu\/ideas-made-to-matter\/tapping-power-unstructured-data. Accessed October 1, 2023."},{"key":"e_1_3_2_1_38_1","volume-title":"Guide to attribute based access control (ABAC) definition and considerations (draft). NIST special publication 800, 162","author":"Hu C","year":"2013","unstructured":"Vincent\u00a0C Hu, David Ferraiolo, Rick Kuhn, Arthur\u00a0R Friedman, Alan\u00a0J Lang, Margaret\u00a0M Cogdell, Adam Schnitzer, Kenneth Sandlin, Robert Miller, Karen Scarfone, 2013. Guide to attribute based access control (ABAC) definition and considerations (draft). NIST special publication 800, 162 (2013)."},{"key":"e_1_3_2_1_39_1","unstructured":"Robert Huie. 2020. Properly sizing workloads in the Oracle Government Cloud: Save costs and gain performance with OCPUs. https:\/\/blogs.oracle.com\/cloud-infrastructure\/post\/properly-sizing-workloads-in-the-oracle-government-cloud-save-costs-and-gain-performance-with-ocpus. Accessed October 1 2023."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053381"},{"key":"e_1_3_2_1_41_1","unstructured":"Stefan Kr\u00fcger Johannes Sp\u00e4th Karim Ali Eric Bodden and Mira Mezini. 2018. CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs. In ECOOP\u201918. 10:1\u201310:27."},{"key":"e_1_3_2_1_42_1","volume-title":"DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers. In 26th USENIX Security Symposium, USENIX Security 2017","author":"Machiry Aravind","year":"2017","unstructured":"Aravind Machiry, Chad Spensky, Jake Corina, Nick Stephens, Christopher Kruegel, and Giovanni Vigna. 2017. DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers. In 26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16-18, 2017, Engin Kirda and Thomas Ristenpart (Eds.). USENIX Association, 1007\u20131024. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/machiry"},{"key":"e_1_3_2_1_43_1","volume-title":"Cardpliance: PCI DSS Compliance of Android Applications. In 29th USENIX Security Symposium, USENIX Security 2020","author":"Mahmud Samin\u00a0Yaseer","year":"2020","unstructured":"Samin\u00a0Yaseer Mahmud, Akhil Acharya, Benjamin Andow, William Enck, and Bradley Reaves. 2020. Cardpliance: PCI DSS Compliance of Android Applications. In 29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020. 1517\u20131533."},{"key":"e_1_3_2_1_44_1","article-title":"MLlib: Machine Learning in Apache Spark","volume":"17","author":"Meng Xiangrui","year":"2016","unstructured":"Xiangrui Meng, Joseph\u00a0K. Bradley, Burak Yavuz, Evan\u00a0R. Sparks, Shivaram Venkataraman, Davies Liu, Jeremy Freeman, D.\u00a0B. Tsai, Manish Amde, Sean Owen, Doris Xin, Reynold Xin, Michael\u00a0J. Franklin, Reza Zadeh, Matei Zaharia, and Ameet Talwalkar. 2016. MLlib: Machine Learning in Apache Spark. J. Mach. Learn. Res. 17 (2016), 34:1\u201334:7.","journal-title":"J. Mach. Learn. Res."},{"key":"e_1_3_2_1_45_1","volume-title":"Spotlight on Insider Fraud in the Financial Services Industry. https:\/\/apps.dtic.mil\/sti\/pdfs\/AD1123958.pdf. Accessed","author":"Miller Sarah","year":"2023","unstructured":"Sarah Miller. Spotlight on Insider Fraud in the Financial Services Industry. https:\/\/apps.dtic.mil\/sti\/pdfs\/AD1123958.pdf. Accessed October 1, 2023."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23092"},{"volume-title":"30th { USENIX} Security Symposium ({ USENIX} Security 21).","author":"Oltrogge Marten","key":"e_1_3_2_1_47_1","unstructured":"Marten Oltrogge, Nicolas Huaman, Sabrina Amft, Yasemin Acar, Michael Backes, and Sascha Fahl. 2021. Why Eve and Mallory Still Love Android: Revisiting { TLS} (In) Security in Android Applications. In 30th { USENIX} Security Symposium ({ USENIX} Security 21)."},{"volume-title":"Pandas Data Frame. https:\/\/pandas.pydata.org\/pandas-docs\/stable\/user_guide\/dsintro.html#dataframe. Accessed","year":"2023","key":"e_1_3_2_1_48_1","unstructured":"Pandas. Pandas Data Frame. https:\/\/pandas.pydata.org\/pandas-docs\/stable\/user_guide\/dsintro.html#dataframe. Accessed October 1, 2023."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/IE.2015.21"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345659"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133923"},{"key":"e_1_3_2_1_52_1","volume-title":"Erman Pattuk. GuardMR: Fine-grained Security Policy Enforcement for MapReduce Systems. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS \u201915","author":"Ulusoy Huseyin","year":"2015","unstructured":"Huseyin Ulusoy, Pietro Colombo, Elena Ferrari, Murat Kantarcioglu, and Erman Pattuk. GuardMR: Fine-grained Security Policy Enforcement for MapReduce Systems. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS \u201915, Singapore, April 14-17, 2015."},{"key":"e_1_3_2_1_53_1","volume-title":"Vigiles: Fine-Grained Access Control for MapReduce Systems. In 2014 IEEE International Congress on Big Data","author":"Ulusoy Huseyin","year":"2014","unstructured":"Huseyin Ulusoy, Murat Kantarcioglu, Erman Pattuk, and Kevin\u00a0W. Hamlen. 2014. Vigiles: Fine-Grained Access Control for MapReduce Systems. In 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27 - July 2, 2014. IEEE Computer Society, 40\u201347."},{"key":"e_1_3_2_1_54_1","volume-title":"One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant APIs in WeChat. In 32nd USENIX Security Symposium, USENIX Security 2023","author":"Wang Chao","year":"2023","unstructured":"Chao Wang, Yue Zhang, and Zhiqiang Lin. 2023. One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant APIs in WeChat. In 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, Joseph\u00a0A. Calandrino and Carmela Troncoso (Eds.). USENIX Association."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427640"},{"key":"e_1_3_2_1_56_1","volume-title":"Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2012","author":"Zaharia Matei","year":"2012","unstructured":"Matei Zaharia, Mosharaf Chowdhury, Tathagata Das, Ankur Dave, Justin Ma, Murphy McCauly, Michael\u00a0J. Franklin, Scott Shenker, and Ion Stoica. 2012. Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing. In Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2012, San Jose, CA, USA, April 25-27, 2012. 15\u201328."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522737"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934664"},{"volume-title":"Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps","author":"Zuo Chaoshun","key":"e_1_3_2_1_59_1","unstructured":"Chaoshun Zuo, Zhiqiang Lin, and Yinqian Zhang. 2019. Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps. In IEEE S&P\u201916."}],"event":{"name":"ACSAC '23: Annual Computer Security Applications Conference","acronym":"ACSAC '23","location":"Austin TX USA"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627106.3627132","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3627106.3627132","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:39:16Z","timestamp":1755884356000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627106.3627132"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,4]]},"references-count":59,"alternative-id":["10.1145\/3627106.3627132","10.1145\/3627106"],"URL":"https:\/\/doi.org\/10.1145\/3627106.3627132","relation":{},"subject":[],"published":{"date-parts":[[2023,12,4]]},"assertion":[{"value":"2023-12-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}