期刊文献+
共找到773篇文章
< 1 2 39 >
每页显示 20 50 100
Channel Estimation for Full-Duplex Relay Transmission in Cloud Radio Access Networks 被引量:2
1
作者 HU Chunjing LI Jian +1 位作者 MAO Zhendong BAN Yourong 《China Communications》 SCIE CSCD 2015年第11期35-42,共8页
Relay in full-duplex(FD) mode can achieve higher spectrum efficiency than that in half-duplex mode,while it is crucial to suppress relay self-interference to ensure transmission quality which requires instantaneous ch... Relay in full-duplex(FD) mode can achieve higher spectrum efficiency than that in half-duplex mode,while it is crucial to suppress relay self-interference to ensure transmission quality which requires instantaneous channel state information(CSI). In this paper,the channel estimation issue in FD amplify-andforward relay networks is considered,where the training-based estimation technique is adopted. Firstly,the least square(LS) estimation is implemented to obtain composite channel coefficients of source-relay-destination(SRD) channel and relay loop-interference(LI) channel in order to assist destination in performing data detection. Secondly,both LS and maximum likelihood estimation methods are utilized to perform individual channel estimation aiming at supporting successive interference cancelation at destination. Finally,simulation results demonstrate the effectiveness of both composite and individual channel estimation,and the presented ML method can achieve lower MSEs than LS solution. 展开更多
关键词 CHANNEL estimation full-duplex cloud RADIO access NETWORKS
在线阅读 下载PDF
Semi-Blind Pilot-Aided Channel Estimation in Uplink Cloud Radio Access Networks 被引量:1
2
作者 Yourong Ban Qiang Hu +1 位作者 Zhendong Mao Zhongyuan Zhao 《China Communications》 SCIE CSCD 2016年第9期72-79,共8页
In this paper, a quasi-Newton method fbr semi-blind estimation is derived for channel estimation in uplink cloud radio access networks (C-RANs). Different from traditional pilot-aided estimation, semiblind estimatio... In this paper, a quasi-Newton method fbr semi-blind estimation is derived for channel estimation in uplink cloud radio access networks (C-RANs). Different from traditional pilot-aided estimation, semiblind estimation utilizes the unknown data symbols in addition to the known pilot symbols to estimate the channel. An initial channel state information (CSI) obtained by least-squared (LS) estimation is needed in semi-blind estimation. BFGS (Brayben, Fletcher, Goldfarb and Shanno) algorithm, which employs data as well as pilot symbols, estimates the CSI though solving the problem provided by maximum-likelihood (ML) principle. In addition, mean-square-error (MSE) used to evaluate the estimation performance can be further minimized with an optimal pilot design. Simulation results show that the semi-blind estimation achieves a significant improvement in terms of MSE performance over the conventional LS estimation by utilizing data symbols instead of increasing the number of pilot symbols, which demonstrates the estimation accuracy and spectral efficiency are both improved by semiblind estimation for C-RANs. 展开更多
关键词 cloud radio access networks semi-blind channel estimation
在线阅读 下载PDF
Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing 被引量:6
3
作者 Zhihua Xia Liangao Zhang Dandan Liu 《China Communications》 SCIE CSCD 2016年第7期92-99,共8页
Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies... Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies that the attribute authority can access all encrypted data,which is known as the key escrow problem.In addition,because all access privileges are defined over a single attribute universe and attributes are shared among multiple data users,the revocation of users is inefficient for the existing ABE scheme.In this paper,we propose a novel scheme that solves the key escrow problem and supports efficient user revocation.First,an access controller is introduced into the existing scheme,and then,secret keys are generated corporately by the attribute authority and access controller.Second,an efficient user revocation mechanism is achieved using a version key that supports forward and backward security.The analysis proves that our scheme is secure and efficient in user authorization and revocation. 展开更多
关键词 access control ABE efficient revocation removing escrow cloud computing
在线阅读 下载PDF
Access Control Policy Analysis and Access Denial Method for Cloud Services 被引量:1
4
作者 Chi-Lun Liu 《Journal of Electronic Science and Technology》 CAS 2013年第2期176-180,共5页
Personal cloud computing is an emerging trend in the computer industry. For a sustainable service, cloud computing services must control user access. The essential business characteristics of cloud computing are payme... Personal cloud computing is an emerging trend in the computer industry. For a sustainable service, cloud computing services must control user access. The essential business characteristics of cloud computing are payment status and service level agreement. This work proposes a novel access control method for personal cloud service business. The proposed method sets metadata, policy analysis rules, and access denying rules. Metadata define the structure of access control policies and user requirements for cloud services. The policy analysis rules are used to compare conflicts and redundancies between access control policies. The access denying rules apply policies for inhibiting inappropriate access. The ontology is a theoretical foundation of this method. In this work, ontologies for payment status, access permission, service level, and the cloud provide semantic information needed to execute rules. A scenario of personal data backup cloud service is also provided in this work. This work potentially provides cloud service providers with a convenient method of controlling user access according to changeable business and marketing strategies. 展开更多
关键词 access control cloud services ONTOLOGY PAYMENT service level agreement.
在线阅读 下载PDF
Service Security Architecture and Access Control Model for Cloud Computing 被引量:3
5
作者 闫丹凤 杨放春 Tet Yeap 《China Communications》 SCIE CSCD 2011年第6期44-50,共7页
Security is a key problem for the development of Cloud Computing. A common service security architecture is a basic abstract to support security research work. The authorization ability in the service security faces m... Security is a key problem for the development of Cloud Computing. A common service security architecture is a basic abstract to support security research work. The authorization ability in the service security faces more complex and variable users and environment. Based on the multidimensional views, the service security architecture is described on three dimensions of service security requirement integrating security attributes and service layers. An attribute-based dynamic access control model is presented to detail the relationships among subjects, objects, roles, attributes, context and extra factors further. The model uses dynamic control policies to support the multiple roles and flexible authority. At last, access control and policies execution mechanism were studied as the implementation suggestion. 展开更多
关键词 cloud computing service security security architecture access control AUTHORIZATION
在线阅读 下载PDF
RoBAC—A New Way of Access Control for Cloud 被引量:1
6
作者 G. Krishnamoorthy N. UmaMaheswari R. Venkatesh 《Circuits and Systems》 2016年第7期1113-1119,共7页
Access control has made a long way from 1960s. With the advent changes of technologies pertaining to location transparency in storage of data, there arises different access control scenarios. Cloud storage, the predom... Access control has made a long way from 1960s. With the advent changes of technologies pertaining to location transparency in storage of data, there arises different access control scenarios. Cloud storage, the predominant storage that is being in use currently, also paves way to various access control problems. Though there are various access control mechanisms such as RBAC, ABAC, they are designed on the user’s perspective such as the role held by the user or other attributes assigned to the user. A new access control mechanism called object relationship based access control (RoBAC) has been developed based on the relations held among the users. The policy decision of access control is based on the relationship among the classes followed in the Java programming. Results have shown that this model best suits various scenarios in the cloud environment, and it also shows that the time for making decision either to allow or to deny is reduced compared to the existing system. 展开更多
关键词 cloud access Control Class Relations ROLES
在线阅读 下载PDF
Ensuring Security, Confidentiality and Fine-Grained Data Access Control of Cloud Data Storage Implementation Environment 被引量:1
7
作者 Amir Mohamed Talib 《Journal of Information Security》 2015年第2期118-130,共13页
With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality a... With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality and fine-grained data access control of Cloud Data Storage (CDS) environment, we proposed Multi-Agent System (MAS) architecture. This architecture consists of two agents: Cloud Service Provider Agent (CSPA) and Cloud Data Confidentiality Agent (CDConA). CSPA provides a graphical interface to the cloud user that facilitates the access to the services offered by the system. CDConA provides each cloud user by definition and enforcement expressive and flexible access structure as a logic formula over cloud data file attributes. This new access control is named as Formula-Based Cloud Data Access Control (FCDAC). Our proposed FCDAC based on MAS architecture consists of four layers: interface layer, existing access control layer, proposed FCDAC layer and CDS layer as well as four types of entities of Cloud Service Provider (CSP), cloud users, knowledge base and confidentiality policy roles. FCDAC, it’s an access policy determined by our MAS architecture, not by the CSPs. A prototype of our proposed FCDAC scheme is implemented using the Java Agent Development Framework Security (JADE-S). Our results in the practical scenario defined formally in this paper, show the Round Trip Time (RTT) for an agent to travel in our system and measured by the times required for an agent to travel around different number of cloud users before and after implementing FCDAC. 展开更多
关键词 cloud Computing cloud DATA STORAGE cloud Service PROVIDER Formula-Based cloud DATA access Control Multi-Agent System and Secure Java Agent Development Framework
在线阅读 下载PDF
Privacy Protection Based Access Control Scheme in Cloud-Based Services 被引量:3
8
作者 Kai Fan Qiong Tian +2 位作者 Junxiong Wang Hui Li Yintang Yang 《China Communications》 SCIE CSCD 2017年第1期61-71,共11页
With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issu... With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issue. In this paper, we present an access control system with privilege separation based on privacy protection(PS-ACS). In the PS-ACS scheme, we divide users into private domain(PRD) and public domain(PUD) logically. In PRD, to achieve read access permission and write access permission, we adopt the Key-Aggregate Encryption(KAE) and the Improved Attribute-based Signature(IABS) respectively. In PUD, we construct a new multi-authority ciphertext policy attribute-based encryption(CP-ABE) scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it. The analysis and simulation result show that our scheme is feasible and superior to protect users' privacy in cloud-based services. 展开更多
关键词 access control data sharing privacy protection cloud-based services
在线阅读 下载PDF
Performance Analysis in Cloud Radio Access Networks:User-Centralized Coordination Approach
9
作者 Munzali Ahmed Abana SUN Yaohua +2 位作者 Manzoor Ahmed Lukman A.Olawoyin LI Yong 《China Communications》 SCIE CSCD 2015年第11期12-23,共12页
The cloud radio access network(C-RAN) has recently been proposed as an important component of the next generation wireless networks providing opportunities for improving both spectral and energy effi ciencies. The per... The cloud radio access network(C-RAN) has recently been proposed as an important component of the next generation wireless networks providing opportunities for improving both spectral and energy effi ciencies. The performance of this network structure is however constrained by severe inter-cell interference due to the limited capacity of fronthaul between the radio remote heads(RRH) and the base band unit(BBU) pool. To achieve performance improvement taking full advantage of centralized processing capabilities of C-RANs,a set of RRHs can jointly transmit data to the same UE for improved spectral effi ciency. In this paper,a user centralized joint coordinated transmission(UC-JCT) scheme is put forth to investigate the downlink performance of C-RANs. The most important benefit the proposed strategy is the ability to translate what would have been the most dominant interfering sources to usable signal leading to a signifi cantly improved performance. Stochastic geometry is utilized to model the randomness of RRH location and provides a reliable performance analysis. We derive an analytical expression for the closed integral form of the coverage probability of a typical UE. Simulation results confirm the accuracy of our analysis and demonstrate that significant performance gain can be achieved from the proposed coordination schemes. 展开更多
关键词 cloud radio access network POISSON point process COVERAGE probability joint COORDINATED transmission BASEBAND unit
在线阅读 下载PDF
Server-aided access control for cloud computing 被引量:1
10
作者 WENG Jian WENG Jia-si +1 位作者 LIU Jia-nan HOU Lin 《网络与信息安全学报》 2016年第10期58-76,共19页
With the massive diffusion of cloud computing, more and more sensitive data is being centralized into the cloud for sharing, which brings forth new challenges for the security and privacy of outsourced data. To addres... With the massive diffusion of cloud computing, more and more sensitive data is being centralized into the cloud for sharing, which brings forth new challenges for the security and privacy of outsourced data. To address these challenges, the server-aided access control(SAAC) system was proposed. The SAAC system builds upon a variant of conditional proxy re-encryption(CPRE) named threshold conditional proxy re-encryption(TCPRE). In TCPRE, t out of n proxies can re-encrypt ciphertexts(satisfying some specified conditions) for the delegator(while up to t-1 proxies cannot), and the correctness of the re-encrypted ciphertexts can be publicly verified. Both features guarantee the trust and reliability on the proxies deployed in the SAAC system. The security models for TCPRE were formalized, several TCPRE constructions were proposed and that our final scheme was secure against chosen-ciphertext attacks was proved. 展开更多
关键词 计算机网络 网络管理 应用程序 信息安全
在线阅读 下载PDF
Cloud-Based Access Control to Preserve Privacy in Academic Web Application
11
作者 Aljwhrh Almtrf Mohamed Zohdy 《Journal of Computer and Communications》 2019年第12期37-49,共13页
Emerging cloud computing has introduced new platforms for developing enterprise academic web applications, where software, platforms and infrastructures are published to the globe as services. Software developers can ... Emerging cloud computing has introduced new platforms for developing enterprise academic web applications, where software, platforms and infrastructures are published to the globe as services. Software developers can build their systems by multiple invocations of these services. This research is devoted to investigating the management and data flow control over enterprise academic web applications where web services and developed academic web application are constructing infrastructure-networking scheme at the application level. Academic web services are invoked over http port and using REST based protocol;thus traditional access control method is not enough to control the follow of data using host and port information. The new cloud based access control rules proposed here are to be designed and implemented to work at this level. The new proposed access control architecture will be a web service gateway, and it published itself as a service (SaaS). We used three case studies to test our moodle and then we apply JSON parsers to perceive web service description file (WSDL file) and supply policies according to data are to be allowed or denied based on user roll through our parsing. 展开更多
关键词 cloud COMPUTING Web Application access Control Data PRIVACY PRIVACY Framework
在线阅读 下载PDF
A Constraint-Based Model for Virtual Machine Data Access Control in Cloud Platform
12
作者 Zhixin Li Lei Liu Kin Wang 《国际计算机前沿大会会议论文集》 2018年第1期33-33,共1页
在线阅读 下载PDF
基于Cloud Foundry云平台的网络考试系统实现
13
作者 丁振凡 《吉首大学学报(自然科学版)》 CAS 2013年第5期31-36,共6页
介绍了基于Cloud Foundry云平台的网络考试系统设计.在STS环境下通过添加"Cloud Foundry Integration"的扩展插件,开发者可通过虚拟机实现对Cloud Foundry云平台应用的可视化部署与管理.应用借助云服务可访问云上MySQL数据库... 介绍了基于Cloud Foundry云平台的网络考试系统设计.在STS环境下通过添加"Cloud Foundry Integration"的扩展插件,开发者可通过虚拟机实现对Cloud Foundry云平台应用的可视化部署与管理.应用借助云服务可访问云上MySQL数据库.重点围绕考试系统的组卷、试卷显示、交卷评分处理等环节,介绍了用Spring MVC框架设计相应的控制器、模型及视图显示的编程处理方法.系统采用Json串实现试卷信息在页面之间传递处理. 展开更多
关键词 cloud FOUNDRY 云数据库访问 考试系统 MVC开发模式
在线阅读 下载PDF
电气教学虚拟实验室云端权限访问控制方法
14
作者 林羽 《计算机应用文摘》 2026年第3期206-208,211,共4页
为适应电气教学虚拟实验室云端资源的安全高效管理需求,针对传统访问控制方法难以应对动态用户行为与复杂教学场景的不足,提出一种面向电气教学虚拟实验室的云端权限访问控制方法。首先在访问结构设计中依据时间维度将用户信任证据区分... 为适应电气教学虚拟实验室云端资源的安全高效管理需求,针对传统访问控制方法难以应对动态用户行为与复杂教学场景的不足,提出一种面向电气教学虚拟实验室的云端权限访问控制方法。首先在访问结构设计中依据时间维度将用户信任证据区分为近期行为与历史行为,实现动态更新,整体架构涵盖实验室配置、权限分配、资源访问及行为评估4个模块;在计算访问权限综合信任值时,对各类行为属性进行细粒度量化,通过逐层计算得到最终的综合信任评估结果;在权限控制环节,结合节点信任相似度计算、身份验证等多维因素,应用角色激活与权限分配机制实现动态、精准的权限调控。 展开更多
关键词 电气教学 虚拟实验室 云端访问结构 权限控制 用户信任值
在线阅读 下载PDF
面向大规模异构设备的5G切片资源分配优化模型研究
15
作者 曾铮 周智睿 +2 位作者 徐杰 赵婷 陈家璘 《制造业自动化》 2026年第1期74-83,共10页
针对第五代移动通信系统云化无线接入网(Cloud Radio Access Network,C-RAN)中多业务共存时动态资源调度效率不足、差异化服务质量保障困难等问题,提出一种基于改进型双重Q学习(Enhanced Double Q-Learning,EDQL)的动态资源调度方法。首... 针对第五代移动通信系统云化无线接入网(Cloud Radio Access Network,C-RAN)中多业务共存时动态资源调度效率不足、差异化服务质量保障困难等问题,提出一种基于改进型双重Q学习(Enhanced Double Q-Learning,EDQL)的动态资源调度方法。首先,建立面向超可靠低时延通信(ultra-Reliable Low Latency communication,uRLLC)、增强型移动宽带(enhanced Mobile BroadBand,eMBB)与大规模机器类通信(massive Machine-Type Communication,mMTC)的虚拟化切片架构,通过多优先级抢占机制与队列动态调节因子实现资源权重自适应修正。在此基础上,设计融合竞争网络架构与动态奖励缩放的EDQL算法,结合马尔可夫决策过程对网络负载、信道状态及队列时延进行联合建模。实验结果表明,所提方法较传统轮询调度、静态优先级及启发式规则算法,uRLLC业务强制终止概率降低82.3%,eMBB服务完成率提升41.2%,系统资源利用率提升28.5%,mMTC平均排队时延减少76.9%。该研究通过虚拟化切片与强化学习的深度融合,为5G多业务资源调度提供了新范式。 展开更多
关键词 第五代移动通信 云化无线接入网 强化学习 虚拟化网络切片 调度 资源分配
在线阅读 下载PDF
STS实现Cloud Foundry云平台应用部署
16
作者 丁振凡 《井冈山大学学报(自然科学版)》 2013年第5期45-49,共5页
STS(Springsource Tool Suite)是Spring应用开发的一个强大工具,Cloud Foundry是Spring Source提供的一个开源云平台。在STS中通过添加Cloud Foundry扩展可支持云应用部署,对云平台上个人虚拟机的服务器及应用进行管理。分析了Cloud Fou... STS(Springsource Tool Suite)是Spring应用开发的一个强大工具,Cloud Foundry是Spring Source提供的一个开源云平台。在STS中通过添加Cloud Foundry扩展可支持云应用部署,对云平台上个人虚拟机的服务器及应用进行管理。分析了Cloud Foundry的架构组成,讨论了将Web应用部署到云环境的具体操作过程,重点针对云数据库访问、文档管理应用以及面向消息应用,分析了在云环境下编程要注意的问题。最后,给出了一个网络教学系统样例以及云应用部署的优劣分析。 展开更多
关键词 cloud FOUNDRY STS 云应用部署 云数据库访问
在线阅读 下载PDF
Cloud Radiative Effects and Changes Simulated by the Coupled Model Intercomparison Project Phase 5 Models
17
作者 Sun-Hee SHIN Ok-Yeon KIM +1 位作者 Dongmin KIM Myong-In LEE 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2017年第7期859-876,共18页
Using 32 CMIP5(Coupled Model Intercomparison Project Phase 5) models, this study examines the veracity in the simulation of cloud amount and their radiative effects(CREs) in the historical run driven by observed e... Using 32 CMIP5(Coupled Model Intercomparison Project Phase 5) models, this study examines the veracity in the simulation of cloud amount and their radiative effects(CREs) in the historical run driven by observed external radiative forcing for 1850-2005, and their future changes in the RCP(Representative Concentration Pathway) 4.5 scenario runs for2006-2100. Validation metrics for the historical run are designed to examine the accuracy in the representation of spatial patterns for climatological mean, and annual and interannual variations of clouds and CREs. The models show large spread in the simulation of cloud amounts, specifically in the low cloud amount. The observed relationship between cloud amount and the controlling large-scale environment are also reproduced diversely by various models. Based on the validation metrics,four models-ACCESS1.0, ACCESS1.3, Had GEM2-CC, and Had GEM2-ES-are selected as best models, and the average of the four models performs more skillfully than the multimodel ensemble average.All models project global-mean SST warming at the increase of the greenhouse gases, but the magnitude varies across the simulations between 1 and 2 K, which is largely attributable to the difference in the change of cloud amount and distribution. The models that simulate more SST warming show a greater increase in the net CRE due to reduced low cloud and increased incoming shortwave radiation, particularly over the regions of marine boundary layer in the subtropics. Selected best-performing models project a significant reduction in global-mean cloud amount of about-0.99% K^-1and net radiative warming of 0.46 W m^-2K^-1, suggesting a role of positive feedback to global warming. 展开更多
关键词 warming cloud radiative historical CMIP interannual greenhouse access oceans seasonal
在线阅读 下载PDF
SSEM: Secure, Scalable and Efficient Multi-Owner Data Sharing in Clouds
18
作者 Shungan Zhou Ruiying Du +3 位作者 Jing Chen Hua Deng Jian Shen Huanguo Zhang 《China Communications》 SCIE CSCD 2016年第8期231-243,共13页
Data sharing is a main application of cloud computing. Some existing solutions are proposed to provide flexible access control for outsourced data in the cloud. However, few attentions have been paid to group-oriented... Data sharing is a main application of cloud computing. Some existing solutions are proposed to provide flexible access control for outsourced data in the cloud. However, few attentions have been paid to group-oriented data sharing when multiple data owners want to share their private data for cooperative purposes. In this paper, we put forward a new paradigm, referred to as secure, scalable and efficient multi-owner(SSEM) data sharing in clouds. The SSEM integrates identity-based encryption and asymmetric group key agreement to enable group-oriented access control for data owners in a many-to-many sharing pattern. Moreover, with SSEM, users can join in or leave from the group conveniently with the privacy of both group data and user data.We proposed the key-ciphertext homomorphism technique to construct an SSEM scheme with short ciphertexts. The security analysis shows that our SSEM scheme achieves data security against unauthorized accesses and collusion attacks. Both theoretical and experimental results confirm that our proposed scheme takes users little costs to share and access outsourced data in a group manner. 展开更多
关键词 data sharing cloud computing asymmetric key agreement access control
在线阅读 下载PDF
Saviynt Meets GCP: A Deep Dive into Integrated IAM for Modern Cloud Security
19
作者 Sampath Talluri 《Journal of Information Security》 2024年第1期1-14,共14页
The Google Cloud Platform (GCP) is a popular choice for companies seeking a comprehensive cloud computing solution because it provides everything from essential computing resources to powerful data analytics and machi... The Google Cloud Platform (GCP) is a popular choice for companies seeking a comprehensive cloud computing solution because it provides everything from essential computing resources to powerful data analytics and machine learning capabilities. Saviynt is a cloud-based Identity and Access Management (IAM) system that integrates with Google Cloud Platform (GCP) and other services for additional functionality. However, other problems are associated with the transition, such as the requirement to correctly integrate IAM Saviynt into current IT infrastructures and provide comprehensive training to users on the new system. The paper will give a detailed review of the advantages, disadvantages, and best practices related to this transition. 展开更多
关键词 Google cloud Platform (GCP) Identity and access Management (IAM) Saviynt User Identities access Privileges Authentication Processes
在线阅读 下载PDF
基于5G云网融合的SASE研究与实践 被引量:3
20
作者 李国良 李俊 +2 位作者 亚森·艾则孜 李秋阳 尹娜 《信息安全研究》 北大核心 2025年第3期287-294,共8页
企业在数字化转型中逐渐发展成集团多分支、服务上云、去中心化的模式,网络安全防护面临新的挑战.在研究5G与SASE技术基础上,提出一种基于5G云网融合的安全访问服务边缘(SASE)实践方案.将5G作为SD-WAN承载网络,连接数据中心、混合云及... 企业在数字化转型中逐渐发展成集团多分支、服务上云、去中心化的模式,网络安全防护面临新的挑战.在研究5G与SASE技术基础上,提出一种基于5G云网融合的安全访问服务边缘(SASE)实践方案.将5G作为SD-WAN承载网络,连接数据中心、混合云及客户端,全国边缘部署安全接入POP节点,配置云访问安全代理(CASB)、安全Web网关(SWG)、零信任网关、防火墙即服务(FWaaS)等核心模块,按需在各模块中调用多种传统安全组件能力,实现从用户出发的安全监控、访问、拦截和审计的能力.实践表明,该方案在各类企业安全防护落地实践中具备可行性和有效性. 展开更多
关键词 5G 云网融合 安全访问服务边缘 云安全 边缘安全云
在线阅读 下载PDF
上一页 1 2 39 下一页 到第
使用帮助 返回顶部