期刊文献+

电信运营商的安全服务云研究与设计 被引量:3

Research and Design of Telecommunication Operator Cloud Security Services
下载PDF
导出
摘要 文章首先分析了当前安全服务存在的主要问题,提出了一种全新的基于电信运营商网络的云安全运营服务体系架构,阐述了基于电信运营商强大资源池和安全基础设施环境、完备的技术服务支撑体系,向互联网用户推送按需定制的云安全应用增值服务的基本体系,并论述了该体系建成后为整个安全产业带来的影响和意义。 This paper analyzes the main problems in the current security services, and proposes a new architecture for cloud security services based oncarrier's netowk, which can pushon-demand value-added cloud security services to Internet users on the base of carrier's powerful resource pool and security in frastructure environment, as well as its technical service support system. It also discusses the impactand significance of the system to the information security industry.
出处 《现代电信科技》 2012年第1期105-109,112,共6页 Modern Science & Technology of Telecommunications
基金 国家发改委重大信息安全专项资金支持
关键词 云安全 SaaS PaaS IaaS cloud security, SaaS, PaaS, IaaS
  • 相关文献

参考文献8

二级参考文献42

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1133

同被引文献8

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部