Hi,
This sounds interesting. I cannot comment on the research / paper aspects
of your work, but from my experience, there are different considerations
for implementing something for research and the open source side of things.
If you are interested in getting your work into the project, the best w
Hi all,
Thank you for all your enthusiastic responses!
I already started to hack the HBase security source code a litte bit,
but I think a separate project using co-processors is indeed a good
idea. I can then create a separate solution for the research problem
using as much as possible of the ex
HBASE-1697, apologies for that.
On Jun 17, 2012, at 10:28 AM, Andrew Purtell wrote:
> I'd also encourage you to read HBASE-1637 and subtasks to see what has
> already gone in and how it was implemented basically as Joey had suggested.
> If you reimplement something the first question that wil
I'd also encourage you to read HBASE-1637 and subtasks to see what has already
gone in and how it was implemented basically as Joey had suggested. If you
reimplement something the first question that will be asked is what part of
HBase code can be reused I.e incremental dev is preferred where po
Hi erwinx,
Sounds interesting to me!
If your purposes are to research/a paper, I'm always a fan of spending
some time to define the problem (something constrained to 2 pages would be
good) you are trying to solve. I find it personally helpful to myself and
it would help us greatly if you ask us
Hey Erwinx,
You're research sounds very interesting, and the features you describe
are definitely useful for some use cases. The easiest way to implement
these features would to use co-processors, which let you extend HBase
without the modifying the core. My recommendation would be to build
the fe
Hi all,
I am investigating how HBase can be used to store sensitive/confidential
information.
This research is part of my master thesis for computing science at a
university.
The research involves mostly confidentiality, for example:
- Describing the location of the data within the distributed s