Architectural Approach for Implementing Access Control for Enterprise and Application Data Assets
|© 2020 by IJCTT Journal|
|Year of Publication : 2020|
|Authors : Imran Quadri Syed|
|DOI : 10.14445/22312803/IJCTT-V68I6P107|
How to Cite?
Imran Quadri Syed, "Architectural Approach for Implementing Access Control for Enterprise and Application Data Assets," International Journal of Computer Trends and Technology, vol. 68, no. 6, pp. 41-45, 2020. Crossref, https://doi.org/10.14445/22312803/IJCTT-V68I6P107
The purpose of this document is to explain in detail, architectural steps involved to implement access control for Enterprise and Application Assets on edge/gateway node for Hadoop (Big Data) cluster or on any ETL Server (DataStage/SSIS).
Enterprise Assets, Application Assets, Access Control, Security, Architecture, big data, Hadoop, ETL.
 Imran Quadri Syed “Architectural Pattern for Implementing Data Quality Monitoring and Reporting Framework” International Journal of Engineering Trends and Technology 68.2(2020):46-53
 Imran Quadri Syed “Big Data Architectural Pattern to Ingest Multiple Sources and Standardization to Immune Downstream Applications” International Journal of Engineering Trends and Technology 68.1(2019):5-10
 Fatimetou Zahra Mohamed Mahmoud, Noor Aziza Mohamadali"The Business Intelligence Use In Healthcare And Its Enhancement By Predictive Analytics" International Journal of Engineering Trends and Technology 67.7 (2019): 26-39
 Shrawan Kumar Sharma, Vijay Kumar Chhipa "Security Issues, Challenging and Integration of IoT and Cloud Computing Technology" International Journal of Computer Trends and Technology 68.4 (2020):48-53.
 Atif Mohammad, Hamid Mcheick, Emanuel Grant “Big Data Architecture Evolution: 2014 and Beyond” published in Association for Computing Machinery in September 2014
 Alrawda Abdullatif Abdulhaleem Hamid “A Functional View of Big Data Ecosystem” International Journal of Computer Trends and Technology 68.4 (2020):233-237