A model for attribute-based user-role assignment, 18th Annual Computer Security Applications Conference, 2002. Proceedings., pp.353-362, 2002. ,
DOI : 10.1109/CSAC.2002.1176307
Risk-Based Privacy-Aware Information Disclosure, International Journal of Secure Software Engineering, vol.6, issue.2, pp.70-89, 2015. ,
DOI : 10.4018/IJSSE.2015040104
Risk Based Access Control Using Classification, pp.79-95, 2013. ,
DOI : 10.1007/978-3-319-01433-3_5
Secure and Privacy-Preserving Execution Model for Data Services, Proc. of CAISE, pp.35-50, 2013. ,
DOI : 10.1007/978-3-642-38709-8_3
URL : https://hal.archives-ouvertes.fr/hal-00960863
Complementing mongodb with advanced access control features: Concepts and research challenges, Proc. of SEBD, p.2015, 2015. ,
DOI : 10.1109/tdsc.2015.2497680
Privacy Aware Access Control for Big Data: A Research Roadmap, Big Data Research, vol.2, issue.4, pp.145-154, 2015. ,
DOI : 10.1016/j.bdr.2015.08.001
Security and privacy aspects in MapReduce on clouds: A survey, Computer Science Review, vol.20, pp.1-28, 2016. ,
DOI : 10.1016/j.cosrev.2016.05.001
Protecting Access Confidentiality with Data Distribution and Swapping, 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, pp.167-174, 2014. ,
DOI : 10.1109/BDCloud.2014.59
Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, vol.4, issue.3, pp.224-274, 2001. ,
DOI : 10.1145/501978.501980
URL : http://csrc.nist.gov/rbac/rbacSTD-ACM.pdf
Multi-Layer Authorization Framework for a Representative Hadoop Ecosystem Deployment, Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies , SACMAT '17 Abstracts, 2017. ,
DOI : 10.1109/2.485845
POSTER, Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies , SACMAT '17 Abstracts, 2017. ,
DOI : 10.1109/BigData.Congress.2014.16
The GURAG administrative model for user and group attribute assignment, Proc. of NSS, pp.318-332, 2016. ,
Specification and Enforcement of Location-Aware Attribute-Based Access Control for Online Social Networks, Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, ABAC '16, pp.25-34, 2016. ,
DOI : 10.1109/TNET.2006.886332
An Access Control Scheme for Big Data Processing, Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp.1-7, 2014. ,
DOI : 10.4108/icst.collaboratecom.2014.257649
Attribute-Based Access Control, Computer, vol.48, issue.2, pp.85-88, 2015. ,
DOI : 10.1109/MC.2015.33
A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC, Proc. of IFIP DBSec, pp.41-55, 2012. ,
DOI : 10.1145/501983.502004
URL : https://hal.archives-ouvertes.fr/hal-01534757
RABAC: Role-Centric Attribute-Based Access Control, Proc. of MMM-ACNS, pp.84-96, 2012. ,
DOI : 10.1007/978-3-642-33704-8_8
Towards attributebased access control policy engineering using risk, Proc. of RISK, pp.80-90, 2013. ,
DOI : 10.1007/978-3-319-07076-6_6
Adding Attributes to Role-Based Access Control, Computer, vol.43, issue.6, pp.79-81, 2010. ,
DOI : 10.1109/MC.2010.155
Towards user-oriented RBAC model, Journal of Computer Security, vol.17, issue.2, pp.107-129, 2015. ,
DOI : 10.3233/JCS-2009-0341
URL : https://hal.archives-ouvertes.fr/hal-01490719
Toward efficient and privacy-preserving computing in big data era, IEEE Network, vol.28, issue.4, pp.46-50, 2014. ,
DOI : 10.1109/MNET.2014.6863131
A Conceptual Framework for Trust Models, Proc. of TrustBus, pp.93-104, 2012. ,
DOI : 10.1007/978-3-642-32287-7_8
Delegated Access for Hadoop Clusters in the Cloud, 2014 IEEE 6th International Conference on Cloud Computing Technology and Science, pp.374-379, 2014. ,
DOI : 10.1109/CloudCom.2014.50
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
URL : http://www.list.gmu.edu/journals/computer/pdf_ver/i93lbacm.pdf
Trust and Big Data: A Roadmap for Research, 2014 25th International Workshop on Database and Expert Systems Applications, pp.278-282, 2014. ,
DOI : 10.1109/DEXA.2014.63
HGABAC: Towards a Formal Model of Hierarchical Attribute-Based Access Control, International Symposium on Foundations and Practice of Security, pp.187-204, 2014. ,
DOI : 10.1007/978-3-319-17040-4_12
Securing big data Hadoop: a review of security issues, threats and solution, IJCSIT, vol.5, 2014. ,
Big Data Privacy: Challenges to Privacy Principles and Models, Data Science and Engineering, vol.23, issue.5, pp.21-28, 2016. ,
DOI : 10.1145/2588555.2588573
Big data for all: Privacy and user control in the age of analytics, Nw. J. Tech. & Intell. Prop, vol.11, p.xxvii, 2012. ,
GuardMR, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, pp.285-296, 2015. ,
DOI : 10.1145/2535505
Vigiles: Fine-Grained Access Control for MapReduce Systems, 2014 IEEE International Congress on Big Data, pp.40-47, 2014. ,
DOI : 10.1109/BigData.Congress.2014.16
Shuffle Index, ACM Transactions on Storage, vol.11, issue.4, p.19, 2015. ,
DOI : 10.1007/978-3-642-23822-2_29
URL : https://hal.archives-ouvertes.fr/hal-01633667
A logic-based framework for attribute based access control, Proceedings of the 2004 ACM workshop on Formal methods in security engineering , FMSE '04, pp.45-55, 2004. ,
DOI : 10.1145/1029133.1029140
URL : http://users.encs.concordia.ca/~wang/papers/fmse04.pdf
Hadoop: The Definitive Guide, 2012. ,
Assisted content-based labelling and classification of documents, 2016 International Conference on Military Communications and Information Systems (ICMCIS), pp.1-7, 2016. ,
DOI : 10.1109/ICMCIS.2016.7496589
Attribute based data sharing with attribute revocation, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pp.261-270, 2010. ,
DOI : 10.1145/1755688.1755720
A security framework in G-Hadoop for big data computing across distributed Cloud data centres, Journal of Computer and System Sciences, vol.80, issue.5, pp.994-1007, 2014. ,
DOI : 10.1016/j.jcss.2014.02.006