Login / Signup
A Novel Hadoop Security Model for Addressing Malicious Collusive Workers.
Amr M. Sauber
Ahmed Awad
Amr F. Shawish
Passent M. ElKafrawy
Published in:
Comput. Intell. Neurosci. (2021)
Keyphrases
</>
security model
access control
public key
security analysis
security requirements
security architecture
open source
provably secure
cloud computing
information technology
distributed systems
designated verifier
smart card
public key cryptography
data sharing
encryption scheme
object oriented
real time