References
[1]. Beyer, M.A., and Laney, D. (2012). “The importance of
'big data': A definition”. Stamford, CT: Gartner, pp. 2014-
2018.
[2]. Abbott R.P, Chin J.S, and Donnelley, J.E, (1976).
“Security Analysis and Enhancements of Computer
Operating Systems”. Security Analysis & Enhancements of Computer Operating Systems (No. NBSIR-76-1041).
[3]. Steve Lipner, (2015). “The Birth and Death of the
Orange Book”. IEEE Annals of the History of Computing.
Vol. 2, No. 37, pp. 19-31.
[4]. Jong Hyuk Park, K.I Jung Y.I, and Young Sikjeong,
(2014). “An Enhanced Smartphone Security Model based
on Information Security Management System (ISMS)”.
Electronic Commerce Research, Vol. 14, No. 3, pp. 321-
348.
[5]. Qin Hao, (2012). “Research Status and Developing
Trend of Information Security”. Computer Knowledge and
Technology, Vol. 8, No. 31, pp. 56-58.
[6]. Siwach, Gautam, Esmailpour, and Amir, (2014).
“Encrypted Search & Cluster Formation in Big Data”. ASEE
2014 Zone I Conference, University of Bridgeport,
Bridgeport, Connecticut, USA.
[7]. T. Vijay, and A. Aiiad, (2015). “Big Data Security Issues
based on Quantum Cryptography and Privacy with
Authentication for Mobile Data Center”. Procedia
Computer Science, Vol. 50, pp. 149–156.
[8]. B. Matturdi, and X., (2014). “Big Data security and
privacy: A review”. Big Data, Cloud & Mobile Computing,
China Communications, Vol. 11, No. 14, pp. 135–145.
[9]. H. Cheng, C. Rong, K. Hwang, W. Wang, and Y. Li,
“Secure big data storage and sharing scheme for cloud
tenants”. China Communications, Vol. 12, No. 6, pp. 106-
115.
[10]. B. Gerhardt, K. Griffin, and R. Klemann, (2012).
“Unlocking Value in the Fragmented World of Big Data
Analytics”. Cisco Internet Business Solutions Group.
[11]. R.D. Schneider, Hadoop for Dummies Special
Edition. John Wiley & Sons Canada.
[12]. S. Singh, and N. Singh, (2011). “Big Data Analytics”.
IEEE 2012 International Conference on Communication,
Information & Computing Technology, Mumbai, India.
[13]. S. Madden, (2012). “From Databases to Big Data”.
IEEE Internet Computing, Vol. 16, No. 3, pp. 4-6.
[14]. Ardagna, C.A., and Damiani, E. (n.d). “Business
Intelligence meets Big Data: An Overview on Security and
Privacy”. Retrieved from csi.utdallas.eduleventslNSFl paperslpaper04pdf, pp. 1-6.
[15]. Data to Decisions, (2013). Flow - A Comparison to
Custom Code Solutions. Retrieved from http://data-todecisions.
com/
[16]. Big Data, (2013). In Wikipedia. Retrieved from
http://en.wikipedia.org/wiki/Big_data, on 11.03.2013.
[17]. Data Engineering, 2006. ICDE'06. Proceedings of the
22nd International Conference on IEEE, pp. 25-25.
[18]. Rajasekar A, Moore R, and Wan M, (2010). “Applying
rules as policies for large-scale data sharing”. In Intelligent
Systems, Simulation (ISMS), 2010 International
Conference on IEEE, pp. 322-327.
[19]. Gregory R. Doddrell, (1996). “Information Security
and the Internet”. Information Management & Computer
Security, Vol. 3, No. 4, pp. 15-19.
[20]. Feng Guodeng, and Zhang Min, (2014). “Big Data
Security and Privacy Protection”. Chinese Journal of
Computer, Vol. 37, No. 1, pp. 27-31.
[21]. Dean J., and Ghemawat S., (2008). “MapReduce:
Simplified Data Processing on large Cluster ”.
Communications of ACM, Vol. 51, No. 1, pp. 107-1l3.
[22]. Mary Madden, Susannah Fox, Aaron Smith, and
Jessica Vitak, (2007). “Digital Footprints: Online Identity
Management and Search in the Age of Transparency”.
Pew Research Center.
[23]. Alcaraz C., and Turan M.S, (2013). “PDR: A
Prevention, Detection and Response Mechanism for
Anomalies in Energy Control Systems”. Critical
Information Infrastructures Security, pp. 22-33.