期刊文献+

云安全管理体系和建设研究 被引量:1

Research on the Cloud Computing Security Management System and Its Construction
下载PDF
导出
摘要 云安全是云计算和云服务发展面临的重要挑战,云安全所涉及的技术和管理方面的问题也是多方面的。本文对云安全管理体系和建设提出建议,首先分析云计算的安全需求,提出云安全管理体系建议,并对云计算不同发展阶段的重点项目提出安全保障建议。 Security is an important challenge to the development of cloud computing and cloud services. Cloud computing security technology and management issues are muhi-faceted, In this paper, cloud computing security management system and construction were researched. Firstly the security needs of cloud computing were analyzed. Then a sound cloud computing security management system was recommended. Lastly, the proposals for the different stages to construct the security management system were focused.
出处 《电信科学》 北大核心 2012年第12期114-118,共5页 Telecommunications Science
基金 国家科技重大专项基金资助项目(No.2012ZX03002001)
关键词 云计算 安全 安全管理体系 cloud computing, security, security management system
  • 相关文献

参考文献8

  • 1Cloud Security Alliance.Security Guidance for Critical Areas of Focus in Cloud Computing, 2011.
  • 2Udo Helmbrecht. European Network and Information Security Agency. Proceedings of Cloud Computing, Benefits, Risks and Recommendations for Information Security, Heraklion, Greece, 2004.
  • 3Tim Mather, Subra Kumaraswamy, Shahed Latif. Cloud Security and Privacy, an Enterprise Perspective on Risks and Compliance. USA: O' Reilly,2009.
  • 4The National Institute of Standards and Technology, US Department of Commerce. Guide to Security for Full Virtualization Technologies, 2011.
  • 5Vic Winkler. Securing the cloud, cloud computer security techniques and tactics. Elsevier, 2011.
  • 6James E S, Ravi N, Morgan K. Virtual machines: versatile platforms for systems and processes, Morgan Kaufmann, 2005.
  • 7英特尔开源软件技术中心.系统虚拟化-原理与实现.北京.清华大学出版社,2009,03.
  • 8冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1072

二级参考文献24

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1073

同被引文献6

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部