期刊文献+

云身份安全方法的置信维度分析

原文传递
导出
摘要 本文从系统集成的角度分析云身份安全方法的置信维度,提出一种置信度评估思路,对云身份安全方法进行置信度与可靠性评估,可为云平台安全技术的实际应用提供参考。
出处 《保密科学技术》 2024年第10期14-22,共9页 Secrecy Science and Technology
  • 相关文献

参考文献2

二级参考文献70

  • 1LI J,WANG Q,WANG C,et al.Fuzzy keyword search over en-crypted data in cloud computing. INFOCOM’’10 . 2010
  • 2MORETTI C,BUI H,HOLLINGSWORTH K,et al.All-pairs:an abstraction for data-intensive computing on campus grids. IEEE Transactions on Parallel and Distributed Systems . 2010
  • 3DONG F,,LUO J,SONG A,et al.Resource load based stochasticDAGs scheduling mechanism for grid environment. HPCC’’10 . 2010
  • 4ZHOU J,LUO J,SONG A.NETOP:a non-cooperative game basedtopology optimization model towards improving search performance. Journal of Internet Technology .
  • 5Google investor relations. http://investor.google.com/financial . 2011
  • 6GREENBERG A,HAMILTON J,MALTZ D A,et al.The cost of acloud:research problems in data center networks. SIGCOMMComput Commun Rev . 2008
  • 7GUO C,LU G,LI D,et al.BCube:a high performance,server-centricnetwork architecture for modular data centers. SIGCOMM’’09 . 2009
  • 8About virtual machine templates. http://technet.micro-soft.com/en-us/library/bb740838.aspx . 2011
  • 9ANDR H,LAGAR-CAVILLA S,WHITNEY J A,et al.SnowFlock:virtual machine cloning as a first-class cloud primitive. ACM TransComput Syst . 2011
  • 10PIKE R,DORWARD S,GRIESEMER R,et al.Interpreting the Data:Parallel Analysis with Sawzall. Scientific Programming Journal . 2005

共引文献1031

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部