期刊文献+

云模式下的信息安全探讨 被引量:5

Study on Information Security based Cloud Computing Model
在线阅读 下载PDF
导出
摘要 云计算的安全问题是影响云计算发展的重要因素,文章重点对云计算模式下的信息安全问题进行了深入的探讨,指出必须从技术、管理和法规制度建设等多个方面来解决云模式下的信息安全问题。 Cloud computing security is a important factor that influences on the development of cloud computing.This paper mainly studies on information security based cloud computing model,and points out solving the problem involves many factors that includes technology,management and law and so on.
作者 郑昌兴
机构地区 南京政治学院
出处 《信息网络安全》 2011年第10期13-14,共2页 Netinfo Security
关键词 云计算 信任关系 安全边界 cloud computing trust relation security boundary
  • 相关文献

参考文献5

二级参考文献38

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:368
  • 2STEELC,NAGAPPANR,LAIR.安全模式[M].陈秋萍,罗邓,袁国忠,译.北京:机械工业出版社,2006.
  • 3Foster I,Zhao Yong. Cloud Computing and Grid Computing 360 - Degree Compared[M]//2008 Grid Computing Environments Workshop, IEEE. Austin, Texas: [s. n. ] ,2008.
  • 4Aymerich F M, Fenu G, Sureis S. An Approach to a Cloud Computing Network[ C]//2008 First International Conference on Applications of Digital Information and Web Technologies, IEEE. Czech Republic: Technical University of Ostrava, 2008: 113-118.
  • 5Youseff L,Butrico M,Silva D D. Toward a Unified Ontology of Cloud Computing [ M ]//2008 Grid Computing Environments Workshop, IEEK. Austin, Texas: [ s. n. ] ,2008.
  • 6Johnston W, Metzger J,O'Connor M,et al. Network Communication as a Service- Oriented Capability[ M]//High Performance Computing and Grids in Action. [ s. l. ] : IOS Press, 2008:1 - 35.
  • 7Hanemann A,Boote J W,Boyd E L,et al. Perfsonar: A service - oriented architecture for multi - domain network monitoring [M]//ICSOC, ser. Lecture Notes in Computer Science, B. B. et al. [s. l. ]:Springer, 2005:241-254.
  • 8Hofstader J. Communications as a Service[ EB/OL]. 2007 - 11. http://msdn. microsoft. com/en - us/library/bb896003. aspx.
  • 9Koh Y,Knauerhase R C,Brett P,et al. An analysis of performance interference effects in virtual environments [ C]//ISPASS. [s.l. ] : IEEE Computer Society, 2007:200 - 209.
  • 10Buyya R, Yeo C S, Venugopal S. Market - Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities[C]//Proc. of 10th IEEE Conference on HIKe' 08, IEEE. Dalian, China: [s. n. ] ,2008:5 - 13.

共引文献1228

同被引文献18

  • 1葛慧.云计算的信息安全[J].硅谷,2009,2(2):42-43. 被引量:14
  • 2BRAIMI L,PETKOVIC M,NIKOVA S,et al.Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes[R].Technical Report,Centre for Telematics and Information Technolo-gy,University of Twente,2009:309-323.
  • 3GOLDMAN K,SAILER R,SRINIVASAN D.Scalable Integrity monitoring in virtualized environments[C].Proc of the 15th ACM Workshop on Scalable Trusted Computing.Chicago,USA:ACM Press,2010.
  • 4BARI M,BOUTABA R.Data center network vitualization:a survey[J].IEEE Communication Surveys & Tutorials,2012,15(2):909-928.
  • 5JIANXIN L,BO L,TIANYU W,et al.Cyber guarder:a virtualization security assurance architecture for green cloud computing[J].Future Generation Computer Systems,2012,28:379-390.
  • 6SANTOS N,GUMMADI K P,RODRIGUES R.Towards trusted cloud computing[C].Proc of Conference on Hot Topics in Cloud Computing,[s.l.].ACM Press,2009.
  • 7CRAMPTON J,MARTIN K,WlLD P.On key assignment for hierarchical access control[C]//GUTTAN J.Proc of the 19th IEEE Comp LLter Security Foundations Workshop CSFW 2006.
  • 8Venice:IEEE Computer Society Press,2006:5-7.ROY S,CHUAH M.Secure data retrieval based on ciphertext policy attribute-based encryption(CP ABE)system for the DTNs[R].Technical Report,2009.
  • 9Tim Mather;Subra Kumaraswamy;Shahed Latif;刘戈舟.Cloud Security and Privacy[M]北京:机械工业出版社,2011.
  • 10刘鹏.云计算[M]北京:电子工业出版社,2011.

引证文献5

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部