期刊文献+

云计算环境下的信息安全探讨 被引量:17

Discussion on Information Security under the Cloud Computing Environment
原文传递
导出
摘要 本文通过对云计算的介绍以及对云安全所面临的一些问题的分析探讨,提出了云计算环境下的信息安全策略。 Through introducing cloud computing and cloud security,this paper analyses problems of cloud security,and then proposes information security strategy under the cloud computing environment.
出处 《网络安全技术与应用》 2010年第10期76-77,共2页 Network Security Technology & Application
关键词 云计算 云安全 信息安全 Cloud computing Cloud Security Information Security
  • 相关文献

参考文献3

二级参考文献25

  • 1Mark van Harmelen. Personal Learning Environments [A]. Proceedings of the Sixth International Conference on Advanced Learning Technologies (ICALT'06) IEEE Computer Society[C]. 2006:815-816.
  • 2Stephen Downes. Learning networks in practice [J].Emerging Technologies for Learning. 2007,(2): 19-27.
  • 3Rajkumar Buyya, Chee Shin Yeo, Srikumar Venugopal. Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities[C]. Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008: 5-13.
  • 4戴尔在美申请“云计算”商标[EB/OL].<http://tech.sina.com.cn/h/2008-08-03/1013755324.shtml.2008.08-03/2008-08-15.>.
  • 5李开复.云中漫步迎接云计算时代的到来[EB/OL].<http://info.codepub.com/2008/05/info-19352.html,2008-05-10/2008-08-15.>.
  • 6Dan Farber.The new geek chic: Data centers [EB/OL]. <http://news.cnet.com/8301-13953_3-9977049-80.html,2008-06-25/2008-08-15.>
  • 7STEELC,NAGAPPANR,LAIR.安全模式[M].陈秋萍,罗邓,袁国忠,译.北京:机械工业出版社,2006.
  • 8Foster I,Zhao Yong. Cloud Computing and Grid Computing 360 - Degree Compared[M]//2008 Grid Computing Environments Workshop, IEEE. Austin, Texas: [s. n. ] ,2008.
  • 9Aymerich F M, Fenu G, Sureis S. An Approach to a Cloud Computing Network[ C]//2008 First International Conference on Applications of Digital Information and Web Technologies, IEEE. Czech Republic: Technical University of Ostrava, 2008: 113-118.
  • 10Youseff L,Butrico M,Silva D D. Toward a Unified Ontology of Cloud Computing [ M ]//2008 Grid Computing Environments Workshop, IEEK. Austin, Texas: [ s. n. ] ,2008.

共引文献267

同被引文献88

  • 1吴珍.漫步云端——探秘云安全[J].信息安全与通信保密,2008(11):16-18. 被引量:11
  • 2葛慧.云计算的信息安全[J].硅谷,2009,2(2):42-43. 被引量:14
  • 3郝文江.云计算与信息安全[J].城市与减灾,2010(4):12-15. 被引量:6
  • 4冀勇庆.IBM的云计算[J].IT经理世界,2008(15):36-37. 被引量:5
  • 5彭学龙.版权法的现实困境与未来展望[J].武汉理工大学学报(社会科学版),2006,19(2):234-238. 被引量:6
  • 6CSA, "Top Threats to Cloud Computing," http://www. cloudsecurityalliance. org/ topthreats/csathreats, v1. 0. pdf (2010/03/20).
  • 7赵力威,方国伟.微软云计算实践指南[M].北京:电子工业出版社,2010.
  • 8REESE G. Cloud Application Architectures:Building Applications and Infrastructure in the Cloud [M]. Sebastopol, CA,USA: O'Reilly Media, 2009.
  • 9孙威民.全球大型互联网和云计算服务提供商安全漏洞[EB/OL].http://it.shin.com.cn/network/185879/781081174777.shtml.2011-04-01.
  • 102010技术回顾:云安全将成为复合型技术[EB/OL].http://www.chinacloud.cn/show.aspx?id=5406&cid=14,2010-12-26.

引证文献17

二级引证文献121

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部