期刊文献+

云计算背景下计算机安全问题及对策 被引量:8

Try to Talk about Cloud Computing Problems and Countermeasures under the Background of Computer Security
在线阅读 下载PDF
导出
摘要 随着计算机行业的不断的发展,计算机行业已经走过了许多个阶段,云计算作为一种基于互联网的计算的模式,是计算机发展的一个新阶段。云计算为大型计算环境的构架提出了一个全新的视角以及实现方式,为计算机的发展开辟了一个新领域。云计算为实现软件的按需求服务和软件的基础资源化提供了一定的可能性,同时也为计算机信息安全提供了新的挑战。 With the constant development of computer industry, the computer industry has gone through a number of stages, cloud computing as a kind of internet-based computing mode, computer is a new stage of development. Cloud computing for large-scale computing environment of architecture offers a new perspective and methods of implementation, for the development of the computer has opened up a new field. Cloud computing on-demand services and software to realize software resource provides the basis of a certain possibility, at the same time, it offers a new challenge for the computer information security.
作者 杨曦
出处 《信息安全与技术》 2013年第8期68-69,74,共3页
基金 国家自然科学基金资助项目(60963007) 福建省教育厅科技项目(JB11251)
关键词 云计算 计算机安全 安全问题及对策 cloud computing computer security safety issues and countermeasures
  • 相关文献

参考文献7

  • 1梁宏.云计算与计算机安全[A]第23届全国计算机安全学术交流会,200819-24.
  • 2石红.基于云计算概念的企业信息化模式研究[A],201017-23.
  • 3潘松柏;张云勇;陈清金;魏进武.云计算安全需求和策略[A],201046-54.
  • 4张勇.云计算环境下软件工程模式初探[A]第三届全国软件测试会议与移动计算、栅格、智能化高级论坛,200991-97.
  • 5涂艳丽.云计算及在IT支撑系统中的应用[A],200941-48.
  • 6黄华军,钱亮,王耀钧.基于异常特征的钓鱼网站URL检测技术[J].信息网络安全,2012(1):23-25. 被引量:45
  • 7黄世中.GF(2~m)域SM2算法的实现与优化[J].信息网络安全,2012(1):36-39. 被引量:10

二级参考文献23

  • 1Anti-Phishing Working Group [EB/OL]. http://www.antiphishing. org, 2008-01/2011-12-15.
  • 2PhishTank [EB/OL]. http://www.phishtank.com, 2011-04/2011-12-15.
  • 3Engin Kirda, Christopher Kruegel. Protecting Users against Phishing Attacks[J]. The Computer Journal, 2006, 49(05):554-561.
  • 4Ian Fette, Norman Sadeh, Anthony Tomasic. Learning to Detect Phishing Emails[C]. In Proc. of the WWW 2007, Alberta, Canada, May 8-12, 2007: 649-656.
  • 5Chenfeng Vincent Zhou, Christopher Leckie, Shanika Karunasekera. Collaborative Detection of Fast Flux Phishing Domains[J]. Journal of Networks, 2009, 4(01):75-84.
  • 6D. Kevin McGrath, Minaxi Gupta. Behind Phishing: An Examination of Phisher Modi Operandi[C]. In Proc. of the 1st Usenix Workshop on Large- Scale Exploits and Emergent Threats, California USA, April 15 2008:1-8.
  • 7Tyler Moore, Richard Clayton. The Impact of Incentives on Notice and Take-down[C]. In Proc. of the 7th Workshop on the Economics of Information Security, New Hampshire USA, June 25-28 2007: 1-24.
  • 8Christian Ludl, Sean McAUister, Engin Kirda,et al.. On the Effectiveness of Techniques to Detect Phishing Sites[C]. In Proc. of the 4th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Lucerne Switzerland, July 12-13 2007:20-39.
  • 9Steve Sheng, Brad Wardman, Gary Warner, et al.. An Empirical Analysis of Phishing Blacklists[C]. In Proc. of the sixth Conference on Email and Anti-Spare, California USA, July 16-17 2009.
  • 10Pawan Prakash, Manish Kumar, Ramana Rao Kompella, et al.. PhishNet: Predictive Blacklisting to Detect Phishing Attacks[C]. In Proc. of the IEEE INFOCOM, San Diego Canada, March 14-19 201011-5.

共引文献52

同被引文献18

引证文献8

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部