| [1] | 维克托•迈尔-舍恩伯格, 肯尼思•库克耶. 大数据时代: 生活, 工作与思维的大变革[M]. 杭州: 浙江人民出版社, 2013. | 
                     
                                
                                    
                                        | [2] | Nazari, E., Shahriari, M.H. and Tabesh, H. (2019) BigData Analysis in Healthcare: Apache Hadoop, Apache Spark and Apache Flink. Frontiers in Health Informatics, 8, e14. https://doi.org/10.30699/fhi.v8i1.180
 | 
                     
                                
                                    
                                        | [3] | Xue, T., Wen, Y., Luo, B., Zhang, B.Y., Zheng, Y., Hu, Y.F., Li, Y.J. and Li, G. (2020) GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark. ACSAC’20: Annual Computer Security Applications Conference, Austin, 7-11 December 2020, 582-596. https://doi.org/10.1145/3427228.3427640
 | 
                     
                                
                                    
                                        | [4] | Colombo, P. and Ferrari, E. (2019) Access Control Technologies for Big Data Management Systems: Literature Review and Future Trends. Cybersecurity, 2, Article No. 3. https://doi.org/10.1186/s42400-018-0020-9
 | 
                     
                                
                                    
                                        | [5] | Kleppmann, M. (2017) Designing Data-Intensive Applications: The Big Ideas behind Reliable, Scalable, and Maintainable Systems. O’Reilly Media, Inc., Sebastopol. | 
                     
                                
                                    
                                        | [6] | Chambers, B. and Zaharia, M. (2017) Spark: The Definitive Guide: Big Data Processing Made Simple. O’Reilly Media, Inc., Se-bastopol. | 
                     
                                
                                    
                                        | [7] | Goel, K. and Hofstede, A.H.M.T. (2021) Privacy-Breaching Patterns in NoSQL Databases. IEEE Access, 9, 35229-35239. https://doi.org/10.1109/ACCESS.2021.3062034
 | 
                     
                                
                                    
                                        | [8] | Gupta, E., et al. (2021) Attribute-Based Access Control for NoSQL Databases. Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy, Virtual Event, 26-28 April 2021, 317-319. https://doi.org/10.1145/3422337.3450323
 | 
                     
                                
                                    
                                        | [9] | Alotaibi, A.A., Alotaibi, R.M. and Hamza, N. (2019) Access Control Models in NoSQL Databases: An Overview. Journal of King Abdulaziz University: Computing and Information Technology Sciences, 8, 1-9. https://doi.org/10.4197/Comp.8-1.1
 | 
                     
                                
                                    
                                        | [10] | Sun, Z.H. and Huo, Y.X. (2021) The Spectrum of Big Data Analytics. Journal of Computer Information Systems, 61, 154-162. https://doi.org/10.1080/08874417.2019.1571456
 | 
                     
                                
                                    
                                        | [11] | 王珊, 萨师煊. 数据库系统概论(第4版) [M]. 北京: 高等教育出版社, 2006. | 
                     
                                
                                    
                                        | [12] | Elmasri, R. and Navathe, S.B. (2021) Fundamentals of Database System. Global Edition, Pearson, London. | 
                     
                                
                                    
                                        | [13] | Balusamy, B., Abirami, R.N., Kadry, S. and Gandomi, A.H. (2021) NoSQL Database. In: Big Data: Concepts, Technology, and Architecture, John Wiley & Sons, Hoboken, 53-81. https://doi.org/10.1002/9781119701859.ch3
 | 
                     
                                
                                    
                                        | [14] | Kulkarni, D. (2013) A Fine-Grained Access Control Model for Key-Value Systems. Proceedings of the Third ACM Conference on Data and Application Security and Privacy, San Antonio, 18-20 February 2013, 161-164. https://doi.org/10.1145/2435349.2435370
 | 
                     
                                
                                    
                                        | [15] | Shalabi, Y. and Gudes, E. (2017) Cryptographically Enforced Role-Based Access Control for NoSQL Distributed Databases. In: Livraga, G. and Zhu, S., Eds., Data and Applications Security and Privacy XXXI, Springer, Cham, 3-19. https://doi.org/10.1007/978-3-319-61176-1_1
 | 
                     
                                
                                    
                                        | [16] | Huang, L., Zhu, Y., Wang, X., et al. (2019) An Attrib-ute-Based Fine-Grained Access Control Mechanism for HBase. In: Hartmann, S., et al., Eds., Database and Expert Systems Applications, Springer, Cham, 44-59. https://doi.org/10.1007/978-3-030-27615-7_4
 | 
                     
                                
                                    
                                        | [17] | Colombo, P. and Ferrari, E. (2015) Enhancing MongoDB with Purpose-Based Access Control. IEEE Transactions on Dependable & Secure Computing, 14, 591-604. | 
                     
                                
                                    
                                        | [18] | Colombo, P. and Ferrari, E. (2016) Towards Virtual Private NoSQL Datastores. 2016 IEEE 32nd International Conference on Data Engineering (ICDE), Helsinki, 16-20 May 2016, 193-204. https://doi.org/10.1109/ICDE.2016.7498240
 | 
                     
                                
                                    
                                        | [19] | Colombo, P. and Ferrari, E. (2017) Towards a Unifying At-tribute Based Access Control Approach for NoSQL Datastores. IEEE International Conference on Data Engineering, San Diego, 19-22 April 2017, 709-720. https://doi.org/10.1109/ICDE.2017.123
 | 
                     
                                
                                    
                                        | [20] | Begum, G., Huq, S.Z.U. and Siva Kumar, A.P. (2021) Security Features in Hadoop—A Survey. In: Saini, H.S., Sayal, R., Govardhan, A. and Buyya, R., Eds., Innovations in Computer Science and Engineering, Springer, Singapore, 269-276. https://doi.org/10.1007/978-981-33-4543-0_29
 | 
                     
                                
                                    
                                        | [21] | Gopalakrishnan, A.A., et al. (2021) HACS: Access Control for Streaming Data across Heterogeneous Communication Models. 2021 IEEE World AI IoT Congress (AIIoT), Seattle, 10-13 May 2021, 109-114. https://doi.org/10.1109/AIIoT52608.2021.9454185
 | 
                     
                                
                                    
                                        | [22] | Awaysheh, F.M., et al. (2020) Next-Generation Big Data Federation Access Control: A Reference Model. Future Generation Computer Systems, 108, 726-741. https://doi.org/10.1016/j.future.2020.02.052
 | 
                     
                                
                                    
                                        | [23] | Odugu, N.K. (2021) A Fine-Grained Access Control Survey for the Secure Big Data Access. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12, 4180-4186. | 
                     
                                
                                    
                                        | [24] | Ulusoy, H., Colombo, P., Ferrari, E., Kantarcioglu, M. and Pattuk, E. (2015) GuardMR: Fine-Grained Security Policy Enforcement for MapReduce Systems. Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, Singapore, 14 April-17 March 2015, 285-296. https://doi.org/10.1145/2714576.2714624
 | 
                     
                                
                                    
                                        | [25] | Preuveneers, D. and Joosen, W. (2015) SparkXS: Efficient Access Control for Intelligent and Large-Scale Streaming Data Applications. 2015 International Conference on Intelligent Environments, Prague, 15-17 July 2015, 96-103. https://doi.org/10.1109/IE.2015.21
 | 
                     
                                
                                    
                                        | [26] | Introducing Row/Column Level Access Control for Apache Spark. https://blog.cloudera.com/row-column-level-control-apache-spark/
 | 
                     
                                
                                    
                                        | [27] | Databricks (2021) Data Governance Model. https://docs.databricks.com/security/access-control/table-acls/object-privileges.html
 | 
                     
                                
                                    
                                        | [28] | Ashwin Kumar, T.K., et al. (2017) Content Sensitivity Based Access Control Framework for Hadoop. Digital Communications and Networks, 3, 213-225. https://doi.org/10.1016/j.dcan.2017.07.007
 | 
                     
                                
                                    
                                        | [29] | Idar, H.A., et al. (2018) Dynamic Data Sensitivity Access Control in Hadoop Platform. 2018 IEEE 5th International Congress on Information Science and Technology, Marrakech, 21-27 October 2018, 105-109. https://doi.org/10.1109/CIST.2018.8596381
 | 
                     
                                
                                    
                                        | [30] | Ait Idar, H., Belhadaoui, H. and Filali, R. (2021) A Conceptual Model for Dynamic Access Control in Hadoop Ecosystem. In: Saeed F., et al., Eds., Advances on Smart and Soft Computing, Springer, Singapore, 421-430. https://doi.org/10.1007/978-981-15-6048-4_37
 | 
                     
                                
                                    
                                        | [31] | Yang, M. (2020) TDACS: An ABAC and Trust-Based Dy-namic Access Control Scheme in Hadoop. https://arxiv.org/abs/2011.07895
 | 
                     
                                
                                    
                                        | [32] | Gupta, M., Patwa, F. and Sandhu, R. (2017) POSTER: Access Control Model for the Hadoop Ecosystem. Proceedings of the 22nd ACM on Symposium on Access Control Models and Tech-nologies, Indianapolis, 21-23 June 2017, 125-127. https://doi.org/10.1145/3078861.3084164
 | 
                     
                                
                                    
                                        | [33] | Gupta, M., Patwa, F. and Sandhu, R. (2017) Object-Tagged RBAC Model for the Hadoop Ecosystem. In: Livraga, G. and Zhu, S., Eds., Data and Applications Security and Privacy XXXI, Springer, Cham, 63-81. https://doi.org/10.1007/978-3-319-61176-1_4
 | 
                     
                                
                                    
                                        | [34] | Gupta, M., Patwa, F. and Sandhu, R. (2018) An Attrib-ute-Based Access Control Model for Secure Big Data Processing in Hadoop Ecosystem. Proceedings of the Third ACM Workshop on Attribute-Based Access Control, Tempe, 21 March 2018, 13-24. https://doi.org/10.1145/3180457.3180463
 | 
                     
                                
                                    
                                        | [35] | Chen, C.W., Elsayed, M.A. and Zulkernine, M. (2020) HBD-Authority: Streaming Access Control Model for Hadoop. 2020 IEEE 6th International Conference on Dependa-bility in Sensor, Cloud and Big Data Systems and Application, Nadi, 14-16 December 2020, 16-25. https://doi.org/10.1109/DependSys51298.2020.00012
 | 
                     
                                
                                    
                                        | [36] | Anisetti, M., et al. (2021) Dynamic and Scalable En-forcement of Access Control Policies for Big Data. Proceedings of the 13th International Conference on Management of Digital Ecosystems, Virtual Event, 1-3 November 2021, 71-78. https://doi.org/10.1145/3444757.3485107
 | 
                     
                                
                                    
                                        | [37] | Alsulbi, K., Khemakhem, M., Basuhail, A., et al. (2021) Big Data Security and Privacy: A Taxonomy with Some HPC and Blockchain Perspectives. International Journal of Computer Science and Network Security, 21, 43-55. | 
                     
                                
                                    
                                        | [38] | Deepa, N., et al. (2020) A Survey on Blockchain for Big Data: Ap-proaches, Opportunities, and Future Directions. https://arxiv.org/abs/2009.00858
 | 
                     
                                
                                    
                                        | [39] | Alsulbi, K.A., et al. (2021) A Proposed Framework for Secure Data Storage in a Big Data Environment Based on Blockchain and Mobile Agent. Symmetry, 13, Article No. 1990. https://doi.org/10.3390/sym13111990
 | 
                     
                                
                                    
                                        | [40] | Ding, Y., et al. (2020) Blockchain-Based Access Control Mechanism of Federated Data Sharing System. IEEE International Conference on Parallel & Distributed Processing with Applica-tions, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking, Exeter, 17-19 December 2020, 277-284. https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom51426.2020.00060
 | 
                     
                                
                                    
                                        | [41] | Kumar, R., Palanisamy, B. and Sural, S. (2021) BEAAS: Blockchain Enabled Attribute-Based Access Control as a Service. 2021 IEEE Inter-national Conference on Blockchain and Cryptocurrency, Sydney, 3-6 May 2021, 1-3. https://doi.org/10.1109/ICBC51069.2021.9461151
 |