期刊文献+
共找到528篇文章
< 1 2 27 >
每页显示 20 50 100
TrustZone半虚拟化与容器化实现机制
1
作者 余发江 王朝州 《信息网络安全》 北大核心 2025年第10期1523-1536,共14页
TrustZone广泛应用于移动平台,随着ARM CPU在云服务中大量部署,利用TrustZone增强虚拟机计算环境和数据的安全性需求日益凸显。但基础的TrustZone提供的硬件可信执行环境通常仅支持主机上的应用程序使用。为解决这一问题,文章提出一种Tr... TrustZone广泛应用于移动平台,随着ARM CPU在云服务中大量部署,利用TrustZone增强虚拟机计算环境和数据的安全性需求日益凸显。但基础的TrustZone提供的硬件可信执行环境通常仅支持主机上的应用程序使用。为解决这一问题,文章提出一种TrustZone半虚拟化与容器化实现机制pvTEE,使虚拟机或容器中的客户能够高效、并行利用主机平台的可信执行环境运行可信应用。pvTEE通过前端驱动vTEEdriver、虚拟设备vTEE、主机代理程序vTEEproxy以及后端驱动TEEdriver,将虚拟机或容器内客户的调用请求转发至可信执行环境中的可信应用执行。主机、虚拟机和容器中的客户仅可调用自身场景的可信应用,无法访问其他应用。同时,主机、虚拟机及容器各自有独立的日志获取能力与安全存储服务。pvTEE基于ARMv8.2 CPU服务器、QEMU KVM虚拟机和Docker容器实现,实验结果表明,客户在虚拟机中调用可信应用完成一次RSA加解密操作,相比在主机场景中仅增加约6%的时间开销。 展开更多
关键词 trustZONE 可信执行环境 虚拟化 容器化 云服务
在线阅读 下载PDF
A Method for Trust Management in Cloud Computing: Data Coloring by Cloud Watermarking 被引量:8
2
作者 Yu-Chao Liu Yu-Tao Ma +2 位作者 Hai-Su Zhang De-Yi Li Gui-Sheng Chen 《International Journal of Automation and computing》 EI 2011年第3期280-285,共6页
With the development of Internet technology and human computing, the computing environment has changed dramatically over the last three decades. Cloud computing emerges as a paradigm of Internet computing in which dyn... With the development of Internet technology and human computing, the computing environment has changed dramatically over the last three decades. Cloud computing emerges as a paradigm of Internet computing in which dynamical, scalable and often virtuMized resources are provided as services. With virtualization technology, cloud computing offers diverse services (such as virtual computing, virtual storage, virtual bandwidth, etc.) for the public by means of multi-tenancy mode. Although users are enjoying the capabilities of super-computing and mass storage supplied by cloud computing, cloud security still remains as a hot spot problem, which is in essence the trust management between data owners and storage service providers. In this paper, we propose a data coloring method based on cloud watermarking to recognize and ensure mutual reputations. The experimental results show that the robustness of reverse cloud generator can guarantee users' embedded social reputation identifications. Hence, our work provides a reference solution to the critical problem of cloud security. 展开更多
关键词 cloud computing cloud security trust management cloud watermarking data coloring.
在线阅读 下载PDF
An Evaluation Approach of Subjective Trust Based on Cloud Model 被引量:5
3
作者 Shouxin Wang Li Zhang +1 位作者 Na Ma Shuai Wang 《Journal of Software Engineering and Applications》 2008年第1期44-52,共9页
As online trade and interactions on the internet are on the rise, a key issue is how to use simple and effective evaluation methods to accomplish trust decision-making for customers. It is well known that subjective t... As online trade and interactions on the internet are on the rise, a key issue is how to use simple and effective evaluation methods to accomplish trust decision-making for customers. It is well known that subjective trust holds uncertainty like randomness and fuzziness. However, existing approaches which are commonly based on probability or fuzzy set theory can not attach enough importance to uncertainty. To remedy this problem, a new quantifiable subjective trust evaluation approach is proposed based on the cloud model. Subjective trust is modeled with cloud model in the evaluation approach, and expected value and hyper-entropy of the subjective cloud is used to evaluate the reputation of trust objects. Our experimental data shows that the method can effectively support subjective trust decisions and provide a helpful exploitation for subjective trust evaluation. 展开更多
关键词 SUBJECTIVE trust cloud MODEL trust DECISION-MAKING
在线阅读 下载PDF
Trusted Data Acquisition Mechanism for Cloud Resource Scheduling Based on Distributed Agents 被引量:4
4
作者 李小勇 杨月华 《China Communications》 SCIE CSCD 2011年第6期108-116,共9页
Goud computing is a new paradigm in which dynamic and virtualized computing resources are provided as services over the Internet. However, because cloud resource is open and dynamically configured, resource allocation... Goud computing is a new paradigm in which dynamic and virtualized computing resources are provided as services over the Internet. However, because cloud resource is open and dynamically configured, resource allocation and scheduling are extremely important challenges in cloud infrastructure. Based on distributed agents, this paper presents trusted data acquisition mechanism for efficient scheduling cloud resources to satisfy various user requests. Our mechanism defines, collects and analyzes multiple key trust targets of cloud service resources based on historical information of servers in a cloud data center. As a result, using our trust computing mechanism, cloud providers can utilize their resources efficiently and also provide highly trusted resources and services to many users. 展开更多
关键词 cloud computing trusted computing distributed agent resource scheduling
在线阅读 下载PDF
Trust Assessment Model Based on a Zero Trust Strategy in a Community Cloud Environment 被引量:2
5
作者 Rodrigue N’goran Jean-Louis Tetchueng +2 位作者 Ghislain Pandry Yvon Kermarrec Olivier Asseu 《Engineering(科研)》 CAS 2022年第11期479-496,共18页
The adoption of Cloud Computing services in everyday business life has grown rapidly in recent years due to the many benefits of this paradigm. The various collaboration tools offered by Cloud Computing have eliminate... The adoption of Cloud Computing services in everyday business life has grown rapidly in recent years due to the many benefits of this paradigm. The various collaboration tools offered by Cloud Computing have eliminated or reduced the notion of distance between entities of the same company or between different organizations. This has led to an increase in the need to share resources (data and services). Community Cloud environments have thus emerged to facilitate interactions between organizations with identical needs and with specific and high security requirements. However, establishing trust and secure resource sharing relationships is a major challenge in this type of complex and heterogeneous environment. This paper proposes a trust assessment model (SeComTrust) based on the Zero Trust cybersecurity strategy. First, the paper introduces a community cloud architecture subdivided into different security domains. Second, it presents a process for selecting a trusted organization for an exchange based on direct or recommended trust value and reputation. Finally, a system for promoting or relegating organizations in the different security domains is applied. Experimental results show that our model guarantees the scalability of a community cloud with a high success rate of secure and quality resource sharing. 展开更多
关键词 trust Management Resources Sharing Community cloud Zero trust
在线阅读 下载PDF
Multiway Dynamic Trust Chain Model on Virtual Machine for Cloud Computing 被引量:1
6
作者 Jie Zhu Guoyuan Lin +2 位作者 Fucheng You Huaqun Liu Chunru Zhou 《China Communications》 SCIE CSCD 2016年第7期83-91,共9页
This paper sums up four security factors after analyzing co-residency threats caused by the special multitenant environment in the cloud.To secure the factors,a multiway dynamic trust chain transfer model was proposed... This paper sums up four security factors after analyzing co-residency threats caused by the special multitenant environment in the cloud.To secure the factors,a multiway dynamic trust chain transfer model was proposed on the basis of a measurement interactive virtual machine and current behavior to protect the integrity of the system.A trust chain construction module is designed in a virtual machine monitor.Through dynamic monitoring,it achieves the purpose of transferring integrity between virtual machine.A cloud system with a trust authentication function is implemented on the basis of the model,and its practicability is shown. 展开更多
关键词 cloud computing virtual machine trustworthiness measurement dynamic trust transfer
在线阅读 下载PDF
Trusted Heartbeat Framework for Cloud Computing 被引量:1
7
作者 Dipen Contractor Dhiren Patel Shreya Patel 《Journal of Information Security》 2016年第3期103-111,共9页
In cloud computing environment, as the infrastructure not owned by users, it is desirable that its security and integrity must be protected and verified time to time. In Hadoop based scalable computing setup, malfunct... In cloud computing environment, as the infrastructure not owned by users, it is desirable that its security and integrity must be protected and verified time to time. In Hadoop based scalable computing setup, malfunctioning nodes generate wrong output during the run time. To detect such nodes, we create collaborative network between worker node (i.e. data node of Hadoop) and Master node (i.e. name node of Hadoop) with the help of trusted heartbeat framework (THF). We propose procedures to register node and to alter status of node based on reputation provided by other co-worker nodes. 展开更多
关键词 trusted Heartbeat cloud Computing Hadoop Framework REPUTATION Attestation
在线阅读 下载PDF
Research on Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing 被引量:5
8
作者 Weijin Jiang Yang Wang +3 位作者 Yirong Jiang Jiahui Chen Yuhui Xu Lina Tan 《China Communications》 SCIE CSCD 2019年第7期174-194,共21页
This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the per... This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the perspective of blocking attacks. On this basis, the host protection mobile agent protection technology is selected, and a method to enhance the security protection of mobile agents (referred to as IEOP method) is proposed. The method first encrypts the mobile agent code using the encryption function, and then encapsulates the encrypted mobile agent with the improved EOP protocol IEOP, and then traces the suspicious execution result. Experiments show that using this method can block most malicious attacks on mobile agents, and can protect the integrity and confidentiality of mobile agents, but the increment of mobile agent tour time is not large. 展开更多
关键词 MOBILE internet cloud COMPUTING MOBILE agent system SUBJECTIVE trust dynamic trust management
在线阅读 下载PDF
A Multi-dimensional Trust-aware Cloud Service Selection Mechanism Based on Evidential Reasoning Approach 被引量:4
9
作者 Wen-Juan Fan Shan-Lin Yang +1 位作者 Harry Perros Jun Pei 《International Journal of Automation and computing》 EI CSCD 2015年第2期208-219,共12页
In the last few years, cloud computing as a new computing paradigm has gone through significant development, but it is also facing many problems. One of them is the cloud service selection problem. As increasingly boo... In the last few years, cloud computing as a new computing paradigm has gone through significant development, but it is also facing many problems. One of them is the cloud service selection problem. As increasingly boosting cloud services are offered through the internet and some of them may be not reliable or even malicious, how to select trustworthy cloud services for cloud users is a big challenge. In this paper, we propose a multi-dimensional trust-aware cloud service selection mechanism based on evidential reasoning(ER) approach that integrates both perception-based trust value and reputation based trust value, which are derived from direct and indirect trust evidence respectively, to identify trustworthy services. Here, multi-dimensional trust evidence, which reflects the trustworthiness of cloud services from different aspects, is elicited in the form of historical users feedback ratings. Then, the ER approach is applied to aggregate the multi-dimensional trust ratings to obtain the real-time trust value and select the most trustworthy cloud service of certain type for the active users. Finally, the fresh feedback from the active users will update the trust evidence for other service users in the future. 展开更多
关键词 cloud service selection multi-dimensional trust evidence trust and reputation evaluation evidential reasoning(ER) clond service
原文传递
Trustworthy Assurance of Service Interoperation in Cloud Environment 被引量:6
10
作者 Bing Li Bu-Qing Cao +1 位作者 Kun-Mei Wen Rui-Xuan Li 《International Journal of Automation and computing》 EI 2011年第3期297-308,共12页
Cloud computing can be realized by service interoperation and its essence is to provide cloud services through network. The development of effective methods to assure the trustworthiness of service interoperation in c... Cloud computing can be realized by service interoperation and its essence is to provide cloud services through network. The development of effective methods to assure the trustworthiness of service interoperation in cloud environment is a very important problem. The essence of cloud security is trust and trust management. Combining quality of service (QoS) with trust model, this paper constructs a QoS-aware and quantitative trust-model that consists of initial trust value, direct trust value, and recommendatory trust value of service, making the provision, discovery, and aggregation of cloud services trustworthy. Hence, it can assure trustworthiness of service interoperation between users and services or among services in cloud environment. At the same time, based on this model, service discovery method based on QoS-aware and quantitative trust-model (TQoS-WSD) is proposed, which makes a solid trust relationship among service requestor, service provider and service recommender, and users can find trustworthy service whose total evaluation value is higher. Corapared to QoS-based service discovery (QoS-WSD) method, it is proved by the experiment for TQoS-WSD method that more accurate result of service discovery will be achieved by service requestor, while reasonable time cost is increased. Meanwhile, TQoS-WSD method strongly resists the effect of service discovery by untrustworthy QoS values and improves service invocation success-rate and thus assures trustworthiness of services interoperation. 展开更多
关键词 Quality of service (QoS) trust service discovery service interoperation service invocation success-rate cloud computing.
在线阅读 下载PDF
Shared Resource Quality Monitoring and Dynamic Trust Management in a Community Cloud
11
作者 Rodrigue N’goran Linda N. Vallee +3 位作者 Grâce Y. E. Johnson Jean-Louis Tetchueng Yvon Kermarrec Olivier Asseu 《Open Journal of Applied Sciences》 CAS 2022年第11期1898-1914,共17页
The collaboration tools offered by Cloud Computing have increased the need to share data and services within companies or between autonomous organizations. This has led to the deployment of community cloud infrastruct... The collaboration tools offered by Cloud Computing have increased the need to share data and services within companies or between autonomous organizations. This has led to the deployment of community cloud infrastructures. However, several challenges will arise from this grouping of heterogeneous organizations. One of the main challenges is the management of trust between the actors of the community. Trust issues arise from the uncertainty about the quality of the resources and entities involved. The quality of a resource can be examined from a security or functional perspective. Therefore, ensuring security and monitoring the quality of resources is to ensure a high level of trust. Therefore, we propose in this paper a technique for dynamic trust management and quality monitoring of resources shared between organizations. Our approach consists, on the one hand, in evaluating the quality of resources based on quality of service measurement attributes and, on the other hand, in updating the trust values according to the information deduced from these measurements. The proposed framework is evaluated in terms of resource sharing success rate and execution time. Experimental results and comparison with TNA-SL and InterTrust models show that the framework can identify and track the behavior of malicious organizations with relatively low execution time. 展开更多
关键词 SMI (Service Measure Index) trust Management SLA QOS Community cloud
在线阅读 下载PDF
Trust Based Meta-Heuristics Workflow Scheduling in Cloud Service Environment
12
作者 G. Jeeva Rathanam A. Rajaram 《Circuits and Systems》 2016年第4期520-531,共12页
Cloud computing has emerged as a new style of computing in distributed environment. An efficient and dependable Workflow Scheduling is crucial for achieving high performance and incorporating with enterprise systems. ... Cloud computing has emerged as a new style of computing in distributed environment. An efficient and dependable Workflow Scheduling is crucial for achieving high performance and incorporating with enterprise systems. As an effective security services aggregation methodology, Trust Work-flow Technology (TWT) has been used to construct composite services. However, in cloud environment, the existing closed network services are maintained and functioned by third-party organizations or enterprises. Therefore service-oriented trust strategies must be considered in workflow scheduling. TWFS related algorithms consist of trust policies and strategies to overcome the threats of the application with heuristic workflow scheduling. As a significance of this work, trust based Meta heuristic workflow scheduling (TMWS) is proposed. The TMWS algorithm will improve the efficiency and reliability of the operation in the cloud system and the results show that the TMWS approach is effective and feasible. 展开更多
关键词 Workflow Scheduling cloud Computing trust Metrics META-HEURISTICS trust Strategies
在线阅读 下载PDF
基于深度学习和信任度量的云平台自适应恶意攻击检测与响应算法
13
作者 王东岳 刘浩 《计算技术与自动化》 2025年第2期44-48,共5页
由于提取的云平台数据特征与异常行为相关性不高,云平台自适应恶意攻击检测效果不佳。因此,设计了基于深度学习和信任度量的云平台自适应恶意攻击检测与响应算法。利用传感器采集云平台数据,并对其进行平滑计算和规范化处理,再对其进行... 由于提取的云平台数据特征与异常行为相关性不高,云平台自适应恶意攻击检测效果不佳。因此,设计了基于深度学习和信任度量的云平台自适应恶意攻击检测与响应算法。利用传感器采集云平台数据,并对其进行平滑计算和规范化处理,再对其进行聚类分析,在深度学习网络的作用下,提取出云平台运行数据的多个特征,并计算其信任度值,通过计算自适应控制函数,构建恶意攻击检测模型,将检测结果作为基础,计算恶意攻击带来的风险值,由此设计恶意攻击响应机制。以某云平台为实验对象的测试结果表明该算法在实际应用中检出率较高,检测效果较好。 展开更多
关键词 深度学习 信任度量 云平台 恶意攻击 攻击响应 攻击检测算法 算法设计
在线阅读 下载PDF
基于TrustZone的可信移动终端云服务安全接入方案 被引量:29
14
作者 杨波 冯登国 +1 位作者 秦宇 张英骏 《软件学报》 EI CSCD 北大核心 2016年第6期1366-1383,共18页
可信云架构为云计算用户提供了安全可信的云服务执行环境,保护了用户私有数据的计算与存储安全.然而在移动云计算高速发展的今天,仍然没有移动终端接入可信云服务的安全解决方案.针对上述问题,提出了一种可信移动终端云服务安全接入方案... 可信云架构为云计算用户提供了安全可信的云服务执行环境,保护了用户私有数据的计算与存储安全.然而在移动云计算高速发展的今天,仍然没有移动终端接入可信云服务的安全解决方案.针对上述问题,提出了一种可信移动终端云服务安全接入方案.方案充分考虑了移动云计算应用背景,利用ARM Trust Zone硬件隔离技术构建可信移动终端,保护云服务客户端及安全敏感操作在移动终端的安全执行.结合物理不可克隆函数技术,给出了移动终端密钥与敏感数据管理机制.在此基础上,借鉴可信计算技术思想设计了云服务安全接入协议.协议兼容可信云架构,提供云服务端与移动客户端间的端到端认证.分析了方案具备的6种安全属性,给出了基于方案的移动云存储应用实例,实现了方案的原型系统.实验结果表明:可信移动终端TCB较小,方案具有良好的可扩展性和安全可控性,整体运行效率较高. 展开更多
关键词 移动云计算 可信计算 可信移动终端 安全接入 trust Zone 物理不可克隆函数(PUF)
在线阅读 下载PDF
零信任与虚拟化技术驱动的数据安全访问体系实践与优化
15
作者 赵幽 余莎莎 +2 位作者 肖辉 郑清 肖阳 《中国卫生信息管理杂志》 2025年第3期403-408,共6页
目的探讨建设一种医院外部接入通道的身份认证及访问控制体系,保障医院内部IT系统的访问安全和数据安全。方法使用全栈国产化的零信任、虚拟化技术和医院统一身份管理平台,搭建医院数据安全访问体系,为医院职工提供安全的桌面环境。结... 目的探讨建设一种医院外部接入通道的身份认证及访问控制体系,保障医院内部IT系统的访问安全和数据安全。方法使用全栈国产化的零信任、虚拟化技术和医院统一身份管理平台,搭建医院数据安全访问体系,为医院职工提供安全的桌面环境。结果实现了医院职工从互联网端安全、便捷地接入医院网络环境,进行办公、科研及运维工作,且数据不落地、不出院。结论通过结合国产化的虚拟桌面及零信任认证技术,有效解决了医院外部接入访问场景下,人员权限开通难、数据流转管控难、终端环境管理难等弊端,在保障业务及使用人员体验的同时,实现了对医院信息系统数据的保护。 展开更多
关键词 国产化 零信任 桌面云 数据安全 新一代无界办公
暂未订购
面向隐私计算的可信执行环境综述 被引量:1
16
作者 张涵 于航 +2 位作者 周继威 白云开 赵路坦 《计算机应用》 北大核心 2025年第2期467-481,共15页
随着云计算和大数据的普及,越来越多的用户隐私数据被上传到云端计算和处理;然而,由于隐私数据交由不可信的第三方存储和管理,因此面临被泄露的风险,进而导致公民的生命和财产安全乃至国家的安全都受到不利影响。近年来,一些基于密码学... 随着云计算和大数据的普及,越来越多的用户隐私数据被上传到云端计算和处理;然而,由于隐私数据交由不可信的第三方存储和管理,因此面临被泄露的风险,进而导致公民的生命和财产安全乃至国家的安全都受到不利影响。近年来,一些基于密码学算法的隐私计算技术,例如安全多方计算、同态加密(HE)和联邦学习等,解决了隐私数据传输和计算过程中的安全问题,进而实现了隐私数据的“可用不可见”;然而,这些方案由于计算和通信复杂度的原因没能得到广泛部署和应用。许多研究工作致力于利用可信执行环境(TEE)降低隐私计算技术的计算量和通信复杂度,同时保证不影响这些技术的安全性。TEE通过硬件辅助创建可以信赖的执行环境,并保证其中隐私数据和代码的机密性、完整性和可用性。因此,从隐私计算和TEE结合的研究入手。首先,全面分析TEE保护用户隐私数据的系统架构和硬件支持;其次,对比现有TEE架构各自的优势和不足;最后,结合工业界和学术界的最新进展,探讨隐私计算和TEE交叉研究领域的未来发展方向。 展开更多
关键词 隐私计算 可信执行环境 云计算 机密性 完整性
在线阅读 下载PDF
基于联动入侵检测的云服务零信任内网主动防御技术研究
17
作者 李倩倩 张涛 张甜甜 《现代电子技术》 北大核心 2025年第10期147-151,共5页
为保证云服务零信任内网的安全运行,有效实现攻击防御,提出一种基于联动入侵检测的云服务零信任内网主动防御技术。该技术依据云服务零信任内网架构和其自身的防御机制结构的机制原理,利用密度参数的K-means算法聚类该网络运行数据,感... 为保证云服务零信任内网的安全运行,有效实现攻击防御,提出一种基于联动入侵检测的云服务零信任内网主动防御技术。该技术依据云服务零信任内网架构和其自身的防御机制结构的机制原理,利用密度参数的K-means算法聚类该网络运行数据,感知内网安全态势;依据感知结果通过蜜罐诱捕策略诱捕网络中的攻击者;将模糊约束控制方法和蜜罐诱捕相结合,实现攻击行为的联合处理,完成云服务零信任内网主动防御。结果表明,所提防御技术的内网态势感知效果良好,簇内紧凑度的值均在0.906以上,入侵行为谱值均在±0.5 dB范围内,主动防御效果良好。 展开更多
关键词 联动入侵检测 云服务 零信任内网 主动防御技术 安全态势 蜜罐诱捕策略
在线阅读 下载PDF
基于零信任的云计算网络安全方案研究
18
作者 李东锴 《江苏通信》 2025年第2期63-68,共6页
近年来,随着云计算技术的飞速发展,企业数智化转型不断深入,网络架构日趋复杂,各项数据逐渐云化,虽然确保了资源按需索取,但也带来了相应的安全问题—传统的网络安防体系难以适应复杂多变的网络环境。以企业为例,本地服务器未部署主机... 近年来,随着云计算技术的飞速发展,企业数智化转型不断深入,网络架构日趋复杂,各项数据逐渐云化,虽然确保了资源按需索取,但也带来了相应的安全问题—传统的网络安防体系难以适应复杂多变的网络环境。以企业为例,本地服务器未部署主机安全防御相关措施,可能导致主机系统中的漏洞无法被及时发现和修复,勒索病毒和恶意软件可能会感染系统文件、窃取用户信息或者破坏系统稳定性,这给黑客和恶意攻击者留下可乘之机,让他们可以利用这些漏洞窃取敏感数据对系统进行破坏。在当今的数字化时代,安全威胁呈现出多样化、复杂化的特点。面对未知威胁,如0day、新型病毒、高级持续威胁(advanced persistent threats,APT)等,企业需要采取更加全面和有效的安全防御措施,防范黑客入侵,窃取敏感信息、破坏系统或干扰关键业务运营。零信任安全架构作为新一代企业网络安全规划,可为用户、应用提供更加动态和细致的访问控制,提高解决云计算环境下相关问题的几率。本文以云计算网络环境为出发点,重点介绍零信任架构(zero trust architecture,ZTA)的概念,列举了基于ZTA的网络必备属性,并将其与传统网络安全架构进行比较,在此基础上设计了基于零信任的云计算网络安全方案,最后对零信任架构在云环境中的发展和应用前景进行了展望。 展开更多
关键词 零信任 云计算 网络安全规划 ZTA
在线阅读 下载PDF
基于零信任安全的云网管理平台应用分析
19
作者 丁慧玲 《软件》 2025年第5期154-156,共3页
信息技术飞速发展背景下,各行业正经历着数字化转型浪潮。业务云化成为提高组织效率的关键路径。变革带来的网络安全问题也逐渐成为制约数字化转型进程的重大瓶颈。在这样的背景下,基于零信任安全理念的云网管理平台应运而生,为构建适... 信息技术飞速发展背景下,各行业正经历着数字化转型浪潮。业务云化成为提高组织效率的关键路径。变革带来的网络安全问题也逐渐成为制约数字化转型进程的重大瓶颈。在这样的背景下,基于零信任安全理念的云网管理平台应运而生,为构建适应云计算时代需求的网络安全信任体系提供了创新的路径。因此,本文基于零信任安全理念,分析了云网管理平台的构建途径,以供参考。 展开更多
关键词 零信任安全 云网管理平台 应用
在线阅读 下载PDF
新一代电信云网内生安全架构研究
20
作者 袁超颖 白景鹏 +1 位作者 袁淑美 何国锋 《中兴通讯技术》 北大核心 2025年第3期3-8,共6页
数字化时代下,云网融合推动网络向虚拟化、服务化深度演进,传统基于边界防护的被动安全体系难以满足远程办公、智能运维等新兴场景的需求。聚焦新一代电信云网架构演进趋势,系统梳理业界内生安全技术路线,剖析其面临的云网环境下安全可... 数字化时代下,云网融合推动网络向虚拟化、服务化深度演进,传统基于边界防护的被动安全体系难以满足远程办公、智能运维等新兴场景的需求。聚焦新一代电信云网架构演进趋势,系统梳理业界内生安全技术路线,剖析其面临的云网环境下安全可见性不足、安全能力与云网业务协同滞后等挑战,提出一种深度嵌入云网基础设施的内生安全架构。该架构涵盖智能威胁感知、零信任策略联动等关键技术。本研究可为电信云网的安全范式转型及产业实践提供理论支撑与技术参考。 展开更多
关键词 云网融合 内生安全 零信任 安全架构
在线阅读 下载PDF
上一页 1 2 27 下一页 到第
使用帮助 返回顶部