期刊文献+

以用户为中心的云计算服务存在的问题 被引量:3

在线阅读 下载PDF
导出
摘要 云计算是目前信息技术发展的一个热点,本文从用户的角度分析了云计算的概念和特点,以及云计算服务存在的一些问题,并给出了相关建议。
作者 赵雅琴
出处 《信息系统工程》 2012年第3期152-153,共2页
关键词 云计算 用户 问题
  • 相关文献

参考文献9

  • 1中国软件资讯网.杨天行:云计算是中国企业的新方向和市场机会[EB/OL].[2011-12-7].http://www.cnsoftnews.com/shownews.asp?newsid=72940.
  • 2中国软件资讯网.华为成立IT产品线部门明年云计算研发团将过万[EB/OL].[2011-12-7].http://www.cnsoftnews.com/shownews.asp?newsid=73941.
  • 3Armbrust M,Fox A,Grith R,et a1.Above the clouds:A BerkeleyView of Cloud Computing[R].UCB/EECS-2009—28.Berkeley,USA:Electrical Engineering and Computer Sciences,University ofCalifornia at Berkeley,2009.
  • 4Vaquero L,Rodero-Marino L,Caceres J,et a1.A break inthe clouds:towards a cloud definition[J].SIGCOMM ComputerCommunication Review,2009,39(1):50-55.
  • 5中国云计算.到底什么是云计算——云计算概念[EB/OL].[2012-2-25].http://www.chinacloud.cn/show.aspx?id=8877&cid=22.
  • 6英特尔开源软件技术中心,复旦大学并行处理研究所.系统虚拟化:原理与实现[M].北京:清华大学出版社,2009.
  • 7Robert L G,Gu Y H.Data mining using high performance dataclouds:Experimental studies using sector and sphere[A].In:Proc of the14th ACM SIGKDD International Conference on Knowledge Discoveryand Data Mining[C],2008.
  • 8冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1086
  • 9Law S S, Chan T H T, Zeng Q H. Moving Force Identification - Time Domain Method[J]. Journal of Sound and Vibration, 1997, 201(1): 1-22.

二级参考文献24

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1090

同被引文献37

  • 1彭英,万剑华,吴楠.一种基于云计算的分布式油田物探数据存储与服务平台[J].计算机研究与发展,2011,48(S1):224-228. 被引量:8
  • 2Kwok T, Mohindra A. Resource calculations with constraints, and placement of tenants and instances for multi- tenant SaaS applica- tions I-A3. Sixth International Conference on Service- Oriented Computing [-C3. 2008, Springer: Sydney, Australia. 633-648.
  • 3Zhu X, Santos C, Beyer D, et al. Automated application component placement in data centers using mathematical programming [J. In- ternational Journal of Network Management, 2008. 18 (6): 467 - 483.
  • 4Tang C, Steinder M, Spreitzer M, et al. A scalable application placement controller for enterprise data centers EA. In Proceed- ings of the 16th International World Wide Web Conference 2007 [-C. Canada: ACM. 331-340.
  • 5Gartnet.Gartner says worldwide cloud services market to surpass $109 billion in 2012[J]R].STAMFORD,Conn.:Gartner Newsroom,2012.
  • 6Marston S,Li Z,Bandyopadhyay S,Zhang J H,Ghalsasi A.Cloud computing_The business perspective [J].Decision Support Systems,2011,51(1):176-189.
  • 7Katzan H.Cloud computing,I-service,and IT service provisioning[J].Journal of Service Science,2008,1(2):57-64.
  • 8Almorsy M,Grundy J,Ibrahim A S.Collaboration-based cloud computing security management framework[C].IEEE Interna- tional Conference on Cloud Computing,2011:364-371.
  • 9McCarthy J.The 10 biggest cloud outages of 2012[R].CRN,2012.
  • 10Li J J,Machiraju V,Sahai A.Analysis on service level agreement of web services[R].HP Laboratories,2002.

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部