1 |
Sung-Jae Jung, Yu-Mi Bae, "Trend analysis of Threats and Technololgies for Cloud Security," Journal of Security Engineering, vol.10, no.2, pp.199-212, 2013. 4.
|
2 |
Openstack, http://www.openstack.org/
|
3 |
D. Nurmi, et al., "Eucalyptus: A Technical Report on an Elastic Utility computing Architecture Linking Your Programs to Useful System," Technical Report 2008-10, UCSB Computer Science, 2008.
|
4 |
K. Schvachko, et al., "The Hadoop Distributed File System," in 26th IEEE Symposium on Massive Storage Systems and Technologies, May 2010.
|
5 |
Wikipedia, http://en.wikipedia.org/wiki/Hadoop
|
6 |
Seung-Je Park, Heeyoul Kim, "Improving Hadoop Security Through Hash-chain," The Journal of Korean Institute of Information Technology, vol.10, no.6, pp.65-73, 2012.06.
|
7 |
Apache Hadoop, http://hadoop.apache.org/
|
8 |
S. Ghemawat, H. Gobioff, and S. Leung, "The google file system," Proceedings of ACM Symposium on Operating Systems Principles, pp.29-43, Oct. 2003.
|
9 |
T. White, "Hadoop: the definition guide," O'Reilly edia, Yahoo! Press, Jun 2009.
|
10 |
So Hyeon Park, Ik Rae Jeong, "A Study on Security Improvement in Hadoop Distributed File System Based on Kerberos," Journal of The Korea Institute of Information Security & Cryptology(JKIISC), vol.23, no.5, pp.803-813, 2013.10.
DOI
|
11 |
O. O'Malley, K. Zhang, S. Radia, R. Marti, C. Harrell, "Hadoop security design," Oct. 2009. http://techcat.org/wp-content/uploads/2013/04/hadoop-security-design.pdf
|
12 |
So Won Jeong, Kee Sung Kim, Ik Rae Jeong, "Secure Authentication Protocol in Hadoop Distributed File System based on Hash Chan," Journal of The Korea Institute of Information Security & Cryptology(JKIISC), vol 23, no.5, pp.831-847, 2013.10.
DOI
|
13 |
B. C. Beuman, T. Tso, "Kerberos: An authentication service for computer network," IEEE Communications, vol. 32, no.9, pp. 33-38, Sep. 1994.
DOI
|