期刊文献+

基于云计算的高校知识信息系统研究

Study on Knowledge of Intelligent Information System Based on Cloud Computing
在线阅读 下载PDF
导出
摘要 通过对高等教育信息化改革的趋势分析,结合云计算技术特点,提出了高校使用云计算作为服务媒介,建设知识信息管理的系统架构.基于对云计算常见形式的总结情况,阐述了高校知识信息系统模块的智能化设计方法,并全面分析了知识信息管理系统的安全技术.该技术可帮助专业教师及管理人员解决实际操作中遇到的问题,为学生提供更加现代化的教育服务平台. Based on the trend analysis of the reform of higher education information technology, and combines with cloud computing characteristics. Proposed university should use cloud computing as a service, constructing the system architecture of knowledge and information management. To summarize the common form of cloud computing based on intelligent design method, elaborated the knowledge module of information system, comprehensive analysis of the know ledge management information system security technology, and to help teachers and management personnel to solve some practical problems in order to provide students with a more modern education services platform.
作者 魏婷 水静
出处 《西北民族大学学报(自然科学版)》 2013年第3期38-42,60,共6页 Journal of Northwest Minzu University(Natural Science)
基金 甘肃省科技厅"Web2.0环境下高校知识管理模式与绩效评估"(1105 ZCRA230)
关键词 云计算平台 系统架构 知识信息管理 Cloud computing Information System architecture Educational plat-form
  • 相关文献

参考文献5

二级参考文献37

  • 1朱良根,雷振甲,张玉清.数据库安全技术研究[J].计算机应用研究,2004,21(9):127-129. 被引量:66
  • 2吴溥峰,张玉清.数据库安全综述[J].计算机工程,2006,32(12):85-88. 被引量:96
  • 3ARMBRUsT M,FOX A,GRIFFITH R,et al.Above the Clouds:A Berkeley View of Cloud Computing[R].Berkeley,CA,USA:University of California,2009.
  • 4Google docs-Online Documents.Spreadsheets,Present[EB/OL].[2009-07-29] http://docs.google.com.
  • 5Windows Azure Platform[EB/OL].[2009-07-12].http://www.microsoft.com/windowsazure/.
  • 6Amazon Elastic Compute Cloud[EB/OL].[2009-06-24].http://aws.amazon com/ec2.
  • 7SONG D,WAGNER D.PERRIG A.Practical Techniques for Searches on Encrypted Data[C] //Proceedings of the IEEE Symposium on Security and Privacy(S&P'00),May 14-17.2000.Berkeley,CA,USA.Piscataway,NJ,USA:IEEE.2000:44-55.
  • 8BONEH D,CRESCENZO G,OSTROVSKY R.et al.Public Key Encryptlon With Keyword Search[C] //Advances in Cryptology.Proceedings of the 23rd Annual International Conference on the Theory and Applications of Cryptographic Techniques(EUROCRYPT'04),May 2-6,2004,Interlaken.Switzeriand.LNCS 3027.Berlin,Germany:Springer-Verlag,2004:506-522.
  • 9PARK D,KIM K,LEE P.Public Key Encryption With Conjunctive Field Keyword Search[C] //Proceedings of the 2004 Workshop on Information Security Applications(WISA'04).Oct 29-31,2004,Wuhan,China.LNCS 3325.Berlin.Germany:Springer-Verlag,2004:73-86.
  • 10SWAMINATHAN A,MAO Y,SU G M,et al.Confidentiality-Preserving Rank-Ordered Search[C] //Proceedings of the 2007 ACM Workshop on Storage Security and Survivability(StorageSS'07),Oct 29,2007,Alexandria.VA.USA.New York.NY,USA:ACM.2007:7-12.

共引文献84

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部