35.1 Introduction

While the chapters in Sections II through IV have described the experimental systems and prototypes we have developed in big data management and analytics (BDMA) and big data security and privacy (BDSP) and the previous chapters in Section V have discussed some of our exploratory work on research in BDMA and BDSP as well as our approach to developing experimental infrastructures and course in these fields, this chapter describes the direction for BDSP and BDMA. In particular, we provide a summary of the discussions of the National Science Foundation (NSF) sponsored workshop on BDSP (including applications of BDMA for BDSP) held in Dallas, Texas on September 16–17, 2014. Our goal is to build ...

Get Big Data Analytics with Applications in Insider Threat Detection now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.