期刊文献+

企业信息管理云平台的设计与实现 被引量:8

Design and Implementation of Cloud Platform in Enterprise Information Management
原文传递
导出
摘要 云计算是近几年出现的一系列共享信息化基础架构的理念、方法和构成。集团企业在生产经营过程产生大量的信息,对这些信息的深入有效应用可为企业提供必要的管理手段,提高经济效益。利用云计算技术,研究集团企业综合信息管理云平台的设计与实现,对云平台的物理架构、技术架构、功能设计、编码规则等方面,进行深入地讨论和分析,给出了具体的设计思路和实现方法,有一定的应用价值。 Cloud computing is the concept, method and composition of a series of basic information-share frameworks appeared in recent years. The group enterprise would bring about a great deal of information in its production and management, and the in-depth application of this information by the enterprise could provide necessary management means, and thus raise its economical benefit. By using cloud computing technology, the design and implementation of cloud platform for comprehensive information management of the group enterprise are studied, the physical and technical frameworks, the function design and coding rule of the could platform analyzed, the design thinking and implementation of the cloud platform also given. All described in this paper would undoubtedly of certain practical value.
作者 杜庆灵
出处 《通信技术》 2012年第6期110-112,共3页 Communications Technology
基金 公安部应用创新项目(No.2010XYCXHNST059)
关键词 云计算 架构 综合信息 cloud computing framework comprehensive information
  • 相关文献

参考文献7

二级参考文献49

  • 1蔡昱,张玉清,冯登国.基于GB17859-1999标准体系的风险评估方法[J].计算机工程与应用,2005,41(12):134-137. 被引量:4
  • 2舒良友,晏启鹏.以制造商为核心的供应链非线性优化模型研究[J].系统工程理论与实践,2006,26(2):36-42. 被引量:4
  • 3徐家旺,黄小原.市场供求不确定供应链的多目标鲁棒运作模型[J].系统工程理论与实践,2006,26(6):35-40. 被引量:29
  • 4李娟,梁军,李永杰.信息安全风险评估研究[J].计算机与数字工程,2006,34(11):64-66. 被引量:11
  • 5周权.网络系统安全风险评估研究.计算机科学,2007,34(7):317-319.
  • 6Ingo ClaBen, Hartmut Ehrig, Dietmav Wolz. Specification Techniques and Tools for Software Development: the ACT Approach[M].Volume 1 AMAST Series in Computing, Inc. River Edge, NJ: World Scientific Publishing Co.,Nov. 1993:91-98.
  • 7Joseph A. Goguen, Grant Malcolm. Software Engineering with OBJ: Algebraic Specification in Action(ADVANCES IN FORMAL METHODS Volume 2)[M]. Boston: Kluwer Academic Publishers, April 2000: 45-48.
  • 8Mohamed Hamdi, Noureddine Boudriga. Computer and Network Security Risk Management: Theory, Challenges and Countermeasures[J]. International Journal of Communication Systems, 2005,18 (08):763 - 793.
  • 9Mohamed Hamdi, Noureddine Boudriga. Algebraic Specification of Network Security Risk Management[C]. Proceedings of the 2003ACM workshop on Formal methods in security engineering FMSE '03, Washington: ACM, October 2003:52-60.
  • 10Wei T.Yue,Metin Cakanyldirim, Young U. Ryu, Dengpan Liu. Network Externalities , Layered Protection and IT Security Risk Management[J]. Decision Support System, 2007,44(01):1-16.

共引文献143

同被引文献46

  • 1王红兵.Web应用威胁建模与定量评估[J].清华大学学报(自然科学版),2009(S2):2108-2112. 被引量:6
  • 2王永杰,鲜明,刘进,王国玉.基于攻击图模型的网络安全评估研究[J].通信学报,2007,28(3):29-34. 被引量:57
  • 3王鹏.走进云计算[M].北京:人民邮电出版社,2009.
  • 4怀进鹏,李沁,胡春明.基于虚拟机的虚拟计算环境研究与设计[J].软件学报,2007,18(8):2016-2026. 被引量:78
  • 5Cloud Security Alliance. Security Guidance for Gritical Areas of Focus in Cloud Computing[R]. USA: Cloud Security Alliance, 2009.
  • 6网络世界.Gartner:云计算的安全风险[N].网络世界,2008.
  • 7网络世界.2012中国企业云计算应用现状及需求调研报告[N].网络世界,2012.
  • 8云安全联盟.云计算关键领域安全指南V2.1[s].云安全联盟,2009.
  • 9Fost er I,Zhao Yong.Cloud Computing and G rid Computing 360-Degree Compar [M].2008 Grid Computing Environments Workshop,IEEE.Austin ,Texas:[s.n.],2008.
  • 10Aymerich FM,Fenu G,Surcis S.An Approach to a Cloud Computing Network[C].2008 First International Conference on Ap- plications of Digital Information and Web Tecbnolo~es,IEEE.Czech Republic:Technical University of Ostrava,2008:113-118.

引证文献8

二级引证文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部