Acknowledgement
Grant : Smart Networking Core Technology Development, Collaborative Analytics Platform
Supported by : MSIP/IITP, MOTIE/KIAT, National Research Foundation of Korea (NRF)
References
- S. Bobrowski, The Force.com Multitenant Architecture, Force.com Architects White Paper Series, 2008.
- M. Adrian and N. Heudecker, Hadoop 2015: The Road Ahead, Gartner Webinars, Nov. 2014.
- C. D. Weissman and S. Bobrowski, "The design of the force.com multitenant Internet application development platform," in Proc. ACM SIGMOD, Providence, Rhode Island, June 2009, pp. 889-896.
- C. J. Guo, W. Sun , Y. Huang, Z. H. Wang, and B. Gao, "A framework for native multi-tenancy application development and management," in Proc. IEEE CEC and EEE, Tokyo, Japan, July 2007, pp. 551-558.
- T. Kwok, T. Nguyen, and L. Lam, "A software as a service with multitenancy support for an electronic contract management application," in Proc. IEEE SCC, Honolulu, Hawaii, July 2008, pp. 179-186.
- R. Mietzner, T. Unger, R. Titze, and F. Leymann, "Combining different multi-tenancy patterns in service-oriented applications," in Proc. IEEE EDOC, Auckland, New Zealand, Sept. 2009, pp. 131-140.
- J. M. A. Calero, N. Edwards, J. Kirschnick, L. Wilcock, and M. Wray, "Toward a multi-tenancy authorization system for cloud services," IEEE Security Privacy, Vol. 8, No. 6, pp. 48-55, Dec. 2010.
- J. Huang, D. M. Nicol, and R.H. Campbell, "Denial-of-service threat to Hadoop/YARN clusters with multi-tenancy," in Proc. IEEE Int'l Congress on Big Data, Anchorage, Alaska, June 2014, pp. 48-55.
- A. Jasti, P. Shah, R. Nagaraj, and R. Pendse, "Security in multi-tenancy cloud," in Proc. IEEE ICCST, Medellin, Colombia, Oct. 2010, pp. 35-41.
- C.-P. Bezemer, A. Zaidman, B. Platzbeecker, T. Hurkmans, and A. 't Hart , "Enabling multi-tenancy: An industrial experience report," in Proc. IEEE ICSM, Timisoara, Romania, Sept. 2010.
- Z. Shen, S. Subbiah, X. Gu, and J. Wilkes, "CloudScale: Elastic resource scaling for multi-tenant cloud systems," in Proc. ACMSoCC, Cascais, Portugal, Article No. 5, Oct. 2011.
- S. Narayanan, Securing Hadoop, Packt Publishing Ltd., Nov. 2013.
- V. K. Vavilapalli et al., "Apache Hadoop YARN: Yet another resource negotiator," in Proc. ACM SOCC, Santa Clara, California, Article No. 5, Oct. 2013.
- Hortonworks: Open Enterprise Hadoop, [Online]. Available: http://hortonworks.com/
- Cloudera, [Online]. Available: http://www.cloudera.com/
- Y. V. Natis, Gartner Reference Model for Elasticity and Multitenancy, Gartner, Inc., June 2012.
- T. White, Hadoop: The Definitive Guide, 3rd Edition, O'Reilly Media, 2012.
- Apache Hadoop YARN-Concepts and Applications, [Online]. Available: http://hortonworks.com/blog/
- B. C. Neuman and T. Ts'o, "Kerberos: An authentication service for computer network," IEEE Commun. Mag., vol. 32, no. 19, pp. 33-38, Sept. 1994. https://doi.org/10.1109/35.312841