期刊文献+

云计算中的网络信息安全技术应用

Application of Network Information Security Technology in Cloud Computing
原文传递
导出
摘要 基于当前云计算环境发展情况的分析,阐述影响网络信息安全的实际因素与问题,相关技术水平的不断提升与应用,在有效适应云计算环境发展趋势的同时,为客户与企业创造合适的网络发展环境。 Based on the analysis of the current development of cloud computing environment,this paper describes the actual factors and problems affecting network information security,and the continuous improvement and application of relevant technology level.It can effectively adapt to the development trend of cloud computing environment,and create a suitable network development environment for customers and enterprises.
作者 林新平 LIN Xinping(Shantou Polytechnic,Guangdong 515078,China)
出处 《电子技术(上海)》 2020年第7期86-87,共2页 Electronic Technology
关键词 信息技术 计算机工程 云计算 网络安全 information technology computer engineering cloud computing network security
  • 相关文献

参考文献11

二级参考文献50

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Cloud Security Alliance. Security guidance for critical areas of focus in cloud computing v2.1, http://www.eloudsecurityallianee. org/csaguide.pdf.
  • 3IBM.蓝云解决方案.http://www-900.ibm.com/ibm/ideasfromibm/cn/cloud,solution8/index.shtml.
  • 4Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 5Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 6Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 7Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 8Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 9Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 10Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.

共引文献1409

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部