Security approaches in BigTable-like storage systems
GOOGLE BIGTABLE
Tomcy Thankachan Introduction Data model Building Blocks Implementation Refinements Performance Evaluation Real applications Conclusion.