期刊文献+

云计算安全技术研究 被引量:11

Research on Cloud Computing Security Technology
下载PDF
导出
摘要 云计算代表IT领域向集约化、规模化与专业化道路发展的趋势.当前,安全成为云计算领域亟待突破的重要问题,云计算的普及与应用将引发信息安全领域又一次重要的技术变革.本文分析了云计算的安全参考框架及该框架下的主要研究内容,对云计算中的关键技术进行了分析,为当前云计算发展提供技术上的参考. Cloud computing represents the trends in IT field to intensive and large-scale.At present,it has become an important issue to solve in cloud computing field.The popularization and application of cloud computing will lead to another important change in the field of security technique.This paper analyzes the main contents of the framework,which will provide the technique development with reference.
作者 赵越
出处 《吉林建筑工程学院学报》 CAS 2012年第1期86-88,共3页 Journal of Jilin Architectural and Civil Engineering
关键词 云计算 安全技术 安全服务 cloud computing security technology security services
  • 相关文献

参考文献4

二级参考文献81

  • 1何永忠,李晓峰,冯登国.RBAC实施中国墙策略及其变种的研究[J].计算机研究与发展,2007,44(4):615-622. 被引量:10
  • 2Sims K. IBM introduces ready-to-use cloud computing collaboration services get clients started with cloud computing. 2007. http://www-03.ibm.com/press/us/en/pressrelease/22613.wss
  • 3Boss G, Malladi P, Quan D, Legregni L, Hall H. Cloud computing. IBM White Paper, 2007. http://download.boulder.ibm.com/ ibmdl/pub/software/dw/wes/hipods/Cloud_computing_wp_final_8Oct.pdf
  • 4Zhang YX, Zhou YZ. 4VP+: A novel meta OS approach for streaming programs in ubiquitous computing. In: Proc. of IEEE the 21st Int'l Conf. on Advanced Information Networking and Applications (AINA 2007). Los Alamitos: IEEE Computer Society, 2007. 394-403.
  • 5Zhang YX, Zhou YZ. Transparent Computing: A new paradigm for pervasive computing. In: Ma JH, Jin H, Yang LT, Tsai JJP, eds. Proc. of the 3rd Int'l Conf. on Ubiquitous Intelligence and Computing (UIC 2006). Berlin, Heidelberg: Springer-Verlag, 2006. 1-11.
  • 6Barroso LA, Dean J, Holzle U. Web search for a planet: The Google cluster architecture. IEEE Micro, 2003,23(2):22-28.
  • 7Brin S, Page L. The anatomy of a large-scale hypertextual Web search engine. Computer Networks, 1998,30(1-7): 107-117.
  • 8Ghemawat S, Gobioff H, Leung ST. The Google file system. In: Proc. of the 19th ACM Symp. on Operating Systems Principles. New York: ACM Press, 2003.29-43.
  • 9Dean J, Ghemawat S. MapReduce: Simplified data processing on large clusters. In: Proc. of the 6th Symp. on Operating System Design and Implementation. Berkeley: USENIX Association, 2004. 137-150.
  • 10Burrows M. The chubby lock service for loosely-coupled distributed systems. In: Proc. of the 7th USENIX Symp. on Operating Systems Design and Implementation. Berkeley: USENIX Association, 2006. 335-350.

共引文献1804

同被引文献35

  • 1阮洁珊.计算机网络云计算技术浅析[J].科协论坛(下半月),2009(7):49-49. 被引量:11
  • 2丁丽萍,王永吉.计算机取证的相关法律技术问题研究[J].软件学报,2005,16(2):260-275. 被引量:84
  • 3Shor P W. Algorithms for quantum computation: discrete logarithms and factoring[C]//35th Annual Symposium on Foundations of Computer Science, 1994:124-134.
  • 4Vandersypen L M K, Steffen M, Breyta G, eta Experimenta realization of Shor's quantum factoring algorithm using nuclear magnetic resonance[J].Nature 2001,414(6866), 883-887.
  • 5Micciancio. The short vector problem is NP-hard to approximate to within some constant[J].SIAM Journal on Computing,2007,30 (6): 2008-2035.
  • 6Micciancio D, Goldwasser S. Complexity of lattice problem[M].Kluwer Academic Publishers,2002.
  • 7Garey M R, Johnson D.S. Computer and Intractability-A Guide to the Theory of NP-Completeness[M].Appendix A7.2 W H Freeman and Company,1979.
  • 8Craig Gentry.Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness[EB/OL].http://www. iacr.org/conferences/crypto2010/accepted.html.
  • 9范平.英特尔云创合推数据立方云计算一体机.http://server.chinabyte.com/412/12460412.shtml 2012-11-02.
  • 10佚名.历数频频发生的云安全事故[DB/OL].http://www.cioage.com/art/201105/92121.htm 2012-9-28.

引证文献11

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部