期刊文献+

网络存储安全分析 被引量:4

Analysis of Network Storage's Safety
下载PDF
导出
摘要 随着存储的网络化趋势,高效安全的信息存储与传输成为网络的一个重要部分。由于系统漏洞、黑客入侵、内部人员管理不善等原因,很容易发生文件或资料丢失泄漏,由此造成的重大后果将是无法弥补的,通过网络存储安全技术的应用,能够有效地防止此类事件的发生。通过对网络存储安全的必要性以及存储安全的基本要求进行分析,利用访问控制、加密技术、入侵检测等技术,为网络存储提供了安全保证。 With the networking trend for storage, efficient and safe storage of information becomes an important part of network. As operate system's loophole, hacking, internal mismanagement and other reasons, are prone to missing documents or information leakage, the resulting consequences will be significant irreparable, through the applications of network storage security technology, can effectively prevent such incidents from occurring. Based on the need for network storage and security of the basic requirements for safe storage were analyzed, using access control, encryption technology, intrusion detection and other technologies, providing security guarantees for network storage.
作者 黄世权
出处 《计算机技术与发展》 2009年第5期170-172,179,共4页 Computer Technology and Development
基金 重庆市科学技术研究项目(KJ081310)
关键词 网络存储 安全 访问控制 加密 入侵检测 network storage security access control encryption intrusion detection
  • 相关文献

参考文献10

二级参考文献72

  • 1韩德志,傅湘林,黄建忠.基于iSCSI的附网存储安全系统的研究与实现[J].小型微型计算机系统,2004,25(7):1223-1227. 被引量:8
  • 2刘书香.建立基于SAN技术的存储网络[J].北京工业职业技术学院学报,2005,4(1):49-52. 被引量:7
  • 3张郑擎.SAN技术及其在电信网络中的应用[J].现代通信,2005(2):22-24. 被引量:1
  • 4[1]Auspex whitepaper.NAS-SAN convergence today:new trends iN enterprise storage[EB/OL].www.internetnews.com/storage/article.php/,2002.
  • 5[2]XIE Chang-Sheng, FU Xiang-Lin, HAN De-Zhi et al. The Study and Implemetation of a New iSCSI-based SAN[J]. Computer Research and Development, 2003, 40(5):246-251.
  • 6[3]Howard J et al.Scale and performance in a distributed file system[J]. ACM transactions on Computer Systems ,February 1988 6(1):51-81.
  • 7[4]Ethan M,Darrell L,William F and Benjamin R.Strong security for distributed file systems[J]. IEEE Micro,May 2001,20(1):34-40.
  • 8[5]Gibson G et.al. A case for network-attached secure dicks[R]. Technical Report CMU-CS-96-142.June 17,1996.Available at http://www.pdl.cs.cmu.edu/NASD/.
  • 9[6]E. Zadok et.al. FiST: A language for stackable file systems[C]. Proceedings of the Annual USENIX Technical Conference,June 2000.
  • 10[1]Solomon D A.Inside Microsoft Windows 2000,Third Edition[M].北京:机械工业出版社,2000.

共引文献62

同被引文献20

  • 1王西武,阎梅,赵怀勋.在VC6下应用Windows系统钩子技术[J].现代电子技术,2004,27(17):45-46. 被引量:3
  • 2赵海峰,孔敏,罗斌.八元树三维表示法的磁盘存储与恢复[J].计算机技术与发展,2006,16(8):176-178. 被引量:1
  • 3袁建东,赵强,郑见灵.Windows系统下FAT32分区信息分析与获取方法[J].河北工业科技,2007,24(1):11-14. 被引量:7
  • 4Rafi M, Guennoun Z. DRMAA : DRM Adaptable Architecture [C]// Information and Communication Technologies: From Theory to Applications. [ s. l. ]: [s.n. ], 2008 : 1 - 4.
  • 5Pletka R, Cachin C. Cryptographic Security for a High-Performance Distributed File System[C]//Mass Storage Systems and Technologies. [s. l. ]: [s. n. ], 2007:227-232.
  • 6Hargreaves C, Chivers H. Recovery of Eneryption Keys from Memory Using a Linear Scan [C] //Availability, Reliability and Security. [ s. l. ] : [ s. n. ], 2008 : 1369-1376.
  • 7Yan Chenghua, Wu Min. An Executable File Encryption Based Scheme for Malware Defense [ C ]//Intelligent Systems and Applications. [ s. l. ]: [ s. n. ], 2009:1-5.
  • 8Mamun A A,Guo Guoxiao,Bi Chao.Hard Disk Drive Mecha-tronics and Control[M].[s.l.]:CRC Press,2007.
  • 9Microsoft Corporation.File System Functionality Comparison[EB/OL].2011-08-12.http://msdn.microsoft.com/en-us/library/ee681827(VS.85).aspx.
  • 10Microsoft Corporation.exFAT,MSDN Library[EB/OL].2007.http://msdn2.mirosoft.com/en-us/library/aa914353.aspx.

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部