Abstract
Designing fine-grained authorization reminds me of a story of a renowned bank manager who was very disturbed by a robbery attempt made on his safe deposit vault. The bank manager was so perturbed that he immediately implemented multiple layers of security and passwords for the vault. The next day, a customer request required that he open the vault. The manager, in all his excitement, forgot the combination, and the vault had to be forced open (legally, of course).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2014 Bhushan Lakhe
About this chapter
Cite this chapter
Lakhe, B. (2014). Implementing Granular Authorization. In: Practical Hadoop Security. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-6545-0_5
Download citation
DOI: https://doi.org/10.1007/978-1-4302-6545-0_5
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4302-6544-3
Online ISBN: 978-1-4302-6545-0
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)