[report]
유영성
/ 2014
/ 빅데이터와 사회안전
: 1~25
[confproc]
이승하
/ 2014
/ 보안 로그/이벤트 수집을 위한 Big Data ETL 모델 설계
/ 한국통신학회 종합학술 발표회 논문집(하계)
2014
: 886~887
[confproc]
조영복
/ 2012
/ ID 기반의 빅 데이터 정보보호 방안
/ 2012 중소기업정보기술융합학회 추계학술대회 논문집
2(1)
: 18~21
[confproc]
최주영
/ 2015
/ 빅데이터 서비스의 보안품질평가 모델에 관한 연구
/ 2015년도 한국인터넷정보학회 춘계학술발표대회 논문집
: 145~146
[book]
황경태
/ 2011
/ 정보시스템 감사: IT 거버넌스의 핵심수단
/ 탑북스
[confproc]
Kang, B. S.
/ 2015
/ A Study on SmartGrid Security Monitoring Based on Big Data Platform
/ 중소기업융합학회 국제학술대회 논문집
2(1)
: 49~50
[journal]
Abawajy, J. H.
/ 2014
/ Large Iterative Multitier Ensemble Classifiers for Security of Big Data
/ IEEE Transactions on Emerging Topics in Computing
2(3)
: 352~363
[confproc]
Adluru, P.
/ 2015
/ Hadoop Eco System for Big Data Security and Privacy
/ 2015 IEEE Long Island Systems, Applications and Technology Conference
: 1~6
[journal]
Ahmed, E. S. A.
/ 2014
/ A Survey of Big Data Cloud Computing Security
/ International Journal of Computer Science and Software Engineering
3(1)
: 78~85
[journal]
Ahmed, W.
/ 2013
/ Security Visualization on Big Data
/ Journal of Independent Studies and Research
11(2)
: 18~22
[journal]
Alavi, M.
/ 1992
/ A Review of MIS Research and Disciplinary Development
/ Journal of Management Information Systems
8(4)
: 45~62
[journal]
Aradau, C.
/ 2015
/ The (Big) Datasecurity Assemblage: Knowledge and Critique
/ Big Data & Society
2(2)
: 1~12
[journal]
Bardi, A.
/ 2014
/ Coping with Interoperability and Sustainability in Cultural Heritage Aggregative Data Infrastructures
/ International Journal of Metadata, Semantics and Ontologies
9(2)
: 138~154
[confproc]
Bertino, E.
/ 2015
/ Big Data-Security and Privacy
/ 2015 IEEE International Congress on Big Data
: 757~761
[journal]
Blobel, B.
/ 2016
/ Patient Privacy and Security Concerns on Big Data for Personalized Medicine
/ Health and Technology
: 1~7
[other]
Bowers, K. D.
/ 2013
/ Securing the Data in Big Data Security Analytics
/ IACR Cryptology ePrint Archive
: 1~14
[thesis]
Chen, Y.
/ 2015
/ When the Cloud Meets Big Data: Security Challenges and Solutions
/ Doctor
/ Indiana University
[confproc]
Choi, S. H.
/ 2015
/ A Study of Basic Architecture for Big-Data Security Analysis in SDN Environment
/ Proceedings of the International Conference on Security and Management
: 137~139
[confproc]
Cuzzocrea, A.
/ 2014
/ Privacy and Security of Big Data: Current Challenges and Future Research Perspectives
/ Proceedings of the First International Workshop on Privacy and Security of Big Data
: 45~47
[confproc]
Cuzzocrea, A.
/ 2014
/ PSBD 2014: Overview of the 1st International Workshop on Privacy and Security of Big Data
/ Proceedings of the 23rd ACM International Conference on Information and Knowledge Management
: 2100~2101
[confproc]
Feng, X.
/ 2015
/ Investigating Big Data Healthcare Security Issues with Raspberry Pi
/ 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing
: 2329~2334
[journal]
Gangawane, A.A.
/ 2015
/ Big Data Security Issues and Challenges in Cloud Computing
/ Asian Journal of Convergence in Technology
1(6)
: 1~5
[confproc]
Grant, E. S.
/ 2014
/ Use of SOA 3.0 in Private Cloud Security Gateway Service Design: In the Era of Big Data
/ International Conference on Computer Games, Multimedia & Allied Technology
: 94~97
[confproc]
Gupta, A.
/ 2014
/ Big Data: A Security Compliance Model
/ 2014 Conference on IT in Business, Industry and Government
: 1~5
[journal]
Hsu, C.
/ 2014
/ A Novel Group Key Transfer for Big Data Security
/ Applied Mathematics and Computation
249
: 436~443
[journal]
Inukollu, V. N.
/ 2014
/ Security Issues Associated with Big Data in Cloud Computing
/ International Journal of Network Security & Its Applications
6(3)
: 45~56
[confproc]
Islam, M. R.
/ 2014
/ An Approach to Provide Security to Unstructured Big Data
/ 2014 8th International Conference on Software, Knowledge, Information Management and Applications
: 1~5
[confproc]
Kalibjian, J.
/ 2013
/ Big Data Management and Security Application to Telemetry Data Products
/ Proceedings of International Telemetering Conference
: 1~8
[journal]
Kaushik, M.
/ 2014
/ Challenges to Big Data Security and Privacy
/ International Journal of Computer Science and Information Technologies
5(3)
: 3042~3043
[confproc]
Kim, S. H.
/ 2013
/ Big Data Security Hardening Methodology Using Attributes Relationship
/ 2013 International Conference on Information Science and Applications (ICISA)
: 1~2
[confproc]
Kim, S. H.
/ 2013
/ Attribute Relationship Evaluation Methodology for Big Data Security
/ 2013 International Conference on IT Convergence and Security
: 1~4
[journal]
Koushikaa, M.
/ 2014
/ A Public Key Cryptography Security System For Big Data
/ International Journal for Innovative Research in Science and Technology
1(6)
: 311~313
[confproc]
Kupwade Patil, H.
/ 2014
/ Big Data Security and Privacy Issues in Healthcare
/ 2014 IEEE International Congress on Big Data
: 762~765
[journal]
Kshetri, N.
/ 2014
/ Big Data’s Impact on Privacy, Security and Consumer Welfare
/ Telecommunications Policy
38(11)
: 1134~1145
[journal]
Lafuente, G.
/ 2015
/ The Big Data Security Challenge
/ Network Security
2015(1)
: 12~14
[confproc]
Lan, L.
/ 2013
/ Some Special Issues of Network Security Monitoring on Big Data Environments
/ 2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing
: 10~15
[confproc]
Li, S.
/ 2015
/ A Sticky Policy Framework for Big Data Security
/ 2015 IEEE First International Conference on Big Data Computing Service and Applications
: 130~137
[journal]
Liang, Q.
/ 2015
/ Security in Big Data
/ Security and Communication Networks
8(14)
: 2383~2385
[confproc]
Lu, T.
/ 2013
/ Next Big Thing in Big Data: The Security of the ICT Supply Chain
/ 2013 International Conference on Social Computing
: 1066~1073
[confproc]
Marchal, S.
/ 2014
/ A Big Data Architecture for Large Scale Security Monitoring
/ 2014 IEEE International Congress on Big Data
: 56~63
[journal]
Matturdi, B.
/ 2014
/ Big Data Security and Privacy: a Review
/ China Communications
11(14)
: 135~145
[confproc]
Mell, P.
/ 2012
/ Big Data Technology and Implications for Security Research
/ Proceedings of the 2012 ACM Workshop on Building Analysis Datasets and Gathering Experience Returns for Security
: 15~16
[journal]
Mittal, S.
/ 2015
/ Big Data: Information Security and Privacy
/ International Journal of Software and Web Sciences
1(1)
: 29~32
[confproc]
Murthy, P. K.
/ 2014
/ Top Ten Challenges in Big Data Security and Privacy
/ 2014 IEEE International Test Conference
1
[confproc]
Paryasto, M.
/ 2014
/ Big-data Security Management Issues
/ 2014 2nd International Conference on Information and Communication Technology
: 59~63
[journal]
Sharma, P. P.
/ 2014
/ Securing Big Data Hadoop: a Review of Security Issues, Threats and Solution
/ International Journal of Computer Science and Information Technologies
5(2)
: 2126~2131
[confproc]
Shen, Y.
/ 2014
/ Mr-TRIAGE: Scalable Multi-criteria Clustering for Big Data Security Intelligence Applications
/ 2014 IEEE International Conference on Big Data
: 627~635
[confproc]
Singh, J.
/ 2014
/ Real Time Big Data Analytic: Security Concern and Challenges with Machine Learning Algorithm
/ 2014 Conference on IT in Business, Industry and Government
: 1~4
[journal]
Tan, Z.
/ 2014
/ Enhancing Big Data Security with Collaborative Intrusion Detection
/ IEEE Cloud Computing
1(3)
: 27~33
[journal]
Tankard, C.
/ 2012
/ Big Data Security
/ Network Security
2012(7)
: 5~8
[journal]
Telang, R.
/ 2014
/ Privacy and Security Policy Infrastructure for Big Data
/ A Journal of Law and Policy for the Information Society
10(3)
: 783~798
[journal]
Thayananthan, V.
/ 2015
/ Big Data Security Issues Based on Quantum Cryptography and Privacy with Authentication for Mobile Data Center
/ Procedia Computer Science
50
: 149~156
[confproc]
Thuraisingham, B.
/ 2015
/ Big Data Security and Privacy
/ Proceedings of the 5th ACM Conference on Data and Application Security and Privacy
: 279~280
[journal]
Toshniwal, R.
/ 2015
/ Big Data Security Issues and Challenges
/ International Journal of Innovative Research in Advanced Engineering
2(2)
: 15~20
[journal]
Van Ginkel, W.
/ 2013
/ Holistic Approach Needed for Big Data Security
/ Internal Auditor
70(1)
: 17~
[journal]
Vessey, Iris
/ 2002
/ Research in Information Systems: An Empirical Study of Diversity in the Discipline and Its Journals
/ Journal of Management Information Systems
19(2)
: 129~174
[journal]
Vidyavathi, B. M.
/ 2015
/ Security Challenges in Big Data: Review
/ International Journal of Advanced Research in Computer Science
6(6)
: 199~201
[journal]
Vivekanand, M.
/ 2015
/ Security Challenges in Big Data: Review
/ International Journal of Advanced Research in Computer Science
6(6)
: 199~202
[journal]
Wang, H.
/ 2015
/ Special Issue on Security, Privacy and Trust in Network-based Big Data
/ Information Sciences
318
: 48~50
[journal]
Yadav, G.
/ 2015
/ Improvisation of Network Security using Encryption Technique for Big Data Technology
/ International Journal of Computer Applications
124(11)
: 27~30