期刊文献+

云计算安全问题探析 被引量:9

Analysis of Security Issues in Cloud Computing
下载PDF
导出
摘要 云计算作为一项迅速发展的信息新技术目前已应用在国内外诸多领域。简述了云计算的概念和特点,结合存在的问题,分析了当前环境下的安全风险,并提出了相应的安全策略。 Cloud computing as a rapidly developing information technology has been applied in many fields at home and abroad.This paper outlines the concept of cloud computing and features,combined with the problems,analysis of the current environment,security risks,and the corresponding security policy.
出处 《计算机安全》 2012年第3期63-66,共4页 Network & Computer Security
关键词 云计算 安全 加密 cloud computing security encryption
  • 相关文献

参考文献5

二级参考文献41

  • 1DEAN J, GHEMAWAT S. MapReduce: Simp lied data p roeessing on large elusters[C]//OSD Ip04: Proceedings of the 6th Symposium on Operating System Design and Imp lementation. New York: ACM Press, 2004 : 137-150.
  • 2AVANADE. 2009 Global Survey of Cloud Computing[EB/OL]. [2009-03-03]. bttp://avanade, dk/_ uploaded/pd f/avanadethoughtleadersbipcloudsurveyex ecutivesummary833173, pdf.
  • 3MICHAEL ARMBRUST, ARMANDO FOX, RE- AN GRIFFITH, et al. Above the Clouds: A Berkeley View of Cloud Computing [EB/OL]. [2009-02-10]. http://www, eees. berkeley, edu/ Pubs/ TechRpts/ 2009 /EECS- 2009- 28. pdf.
  • 4RAJKUMAR BUYYA, CHEE SHIN YEO, SRI- KUMAR VENUGOPAL. Market-Oriented Cloud Computing.. Vision, Hype, and Reality for Delivering IT Services as Computing Utilities[C]//2008 10th IEEE International Conference on High Performance Computing and Communications, 2008:5-13.
  • 5An Oracle White Paper in Enterprise Architecture. Architectural Strategies for Cloud Computing [EB/ OL]. [2009-08-11]. http://www, oracle, com/ technology/architect/entarch/pdf/architectural_ stra tegies_ for_cloud_computing, pdf.
  • 6SNIA. Cloud Storage for Cloud Computing [EB/ OL]. [2009-09-20]. http://www, snia. org/eloud/ CloudStorageForCloudComputing. pdf.
  • 7GTSI. Cloud Computing [EB/OL]. [2009-10-17]. http://www, gtsi. com/cms/documents/White-Papers/Cloud-Computing, pdf.
  • 8THIRUMAL NELLUTLA, JOHN TEOH. Cloud Computing [EB/OL]. [2008-09-15]. http:// media, govteeh, net/GOVTECH _ WEBSITE/ EVENTS/PRESENTATION_ DOCS/2008/Illinois_ DGS/230CloudComputingTEOH. pdf.
  • 9NIGEL BALLARD. Taking Advantage of Cloud Computing [EB/OL]. [ 2010-03-11 ]. http ://ipip. intel, com/go/wp-content/themes/ipip/includes/ea mpaigns/cloud/federal-cloud-computing, pdf.
  • 10GREG BOSS, PADMA MALLADI, DENNIS QUAN, et al. Cloud Computing[EB/OL]. [2007- 10-08]. http://download, boulder, ibm. com/ibmdl/ pub/ software/ dw/ wes/hipods/Cloud _ computing_wp_final 8Oct. pdf.

共引文献107

同被引文献35

  • 1郝文江.云计算与信息安全[J].城市与减灾,2010(4):12-15. 被引量:6
  • 2裴小燕,张尼.浅析云计算安全[J].信息通信技术,2012,6(1):24-28. 被引量:9
  • 3李德毅.云计算热点分析.北京:第二届中国云计算大会,2010.
  • 4李虹,李吴.可信云安全的关键技术与实现.北京:人民邮电出版社.
  • 5Farrell S, Housley R. RFC 3281,An Inlemel AllribuleCertificate Profile for Authorization, 2002.
  • 6TuecRe S, Welch V,Engert D, et a1 . RFC 3820,Internet X. 509 Public Key fnfrastructure(PK.i)ProxyCertificate Profile, 2004.
  • 7N.R.Adam,V.Atluri.A Content-Based Authorization Model for Digital Libraries[J].IEEE Transactions on Knowledge and Data Engineering,2005,14 (2):263-301.
  • 8Farrell.S,Housley.R.RFC 3281-An Intemet Attribute Certificate Profile for Authorization[EB/OL].http:// www.ietf.org/rfc/rfc3281.txt,2002-04.
  • 9Tuecke.S,Welch.V etc.RFC 3820-hternet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile[EB/OL].http://www.faqs.org/rfcs/rfc3820.html,2004-06.
  • 10Bertino.E,Samarati.P,Jajodia.S.A Temporal Access Control Mechanism for Database System[J].IEEE Transactions on Knowledge and Data Engineering,2004.8 (1):67-80.

引证文献9

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部