期刊文献+

托管PaaS平台安全容器的设计与实现 被引量:10

Design and Implementation of A Novel Secure Servlet Container in Paas
下载PDF
导出
摘要 作为一种新型的分布式计算模型,云计算近年来发展讯速并成为学术界和产业界的焦点,但是其推广应用却没有像人们想象中那样被广泛接受,最主要原因就在于其大规模共享资源的同时带来的一系列安全问题。PaaS作为云计算的一种服务方式,是一种较低成本的方案,同时也是SaaS模式的一种应用,降低了SaaS开发应用的门槛,是一场互联网应用软件开发的革命。本文研究了托管PaaS平台及其面临的安全问题,分析目前已有的云平台安全解决方案,并提出多租户托管PaaS平台的应用安全解决方案,从应用安全、容器安全和网络安全三个方面来实现托管PaaS平台安全容器。 Cloud Computing develops rapidly in recent years, but it is not widely accepted by uses due to its security challenges. As a form of Cloud Computing, Platform-as-a-Service (PaaS) is believed to be a revolution of the Intemet application software, development. This paper analysed the typical security issues in PaaS and existing security solutions in this paper, and then proposed a novel security container in PaaS. PaaS security container will provide a security deploying and running environment for applications from three aspects: security of applications in PaaS, security of container and networking security of the container.
作者 杨莎莎 邹华
出处 《软件》 2012年第12期1-5,共5页 Software
基金 中国国家自然科学基金(2009CB320406) 中国863高科技项目基金(2011AA01A102)
关键词 云计算 安全 PAAS 安全容器 Cloud Computing Security PaaS Secure Servlet Container
  • 相关文献

参考文献7

二级参考文献31

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1095

同被引文献68

引证文献10

二级引证文献135

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部