期刊文献+

SaaS环境下的安全问题 被引量:2

Security Issues in SaaS Environment
原文传递
导出
摘要 随着云计算的快速发展,云安全问题日渐突出并得到了广泛的关注。基于SaaS(Software-as-a-Service:软件即服务)应用服务体系架构,从用户使用、物理部署和应用开发三个视图层面出发,重点描述了SaaS环境下的安全问题,为SaaS应用的开发和使用提供了安全性参考。 The paper takes second-hand mobile phone transaction information for eample, achieves the function of information collection and alarming via studying and designing. In this paper, the system requirements have been determined, then a design of this system has been made. This paper designs the structural and logical framework ,defines the modules.
出处 《网络安全技术与应用》 2013年第1期10-13,13,共4页 Network Security Technology & Application
关键词 云计算 安全 SAAS 体系架构 问题 Second-hand Mobile Phone Transaction Information Information Collection constract and Alarming InformationSystem
  • 相关文献

参考文献5

二级参考文献57

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2王鹏.走进云计算[M].北京:人民邮电出版社,2009.
  • 3赵志俊.基于SaaS模式在线CEM系统的研究与实现[D] 武汉:武汉理工大学,2008.4-6.
  • 4百会.百会SAAS技术白皮书.http://partner.baihui.com,2009.
  • 5Tomas Kwok,Thao Nguyen,Linh Lam,A software as a Service with Multi-tenancy Support for an Electronic Contract Management Application[A] ,2008 IEEE International Conference on Services Computing2008.182-184.
  • 6Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 7Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 8Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 9Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 10Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.

共引文献1111

同被引文献27

  • 1CHOUDHARY V. Comparison of software quality under perpetual licensing and software as a service[J].Journal of Management Information Sys terns, 2007(24):141 165.
  • 2易观国际.2015年中国企业级SaaS市场年度综合报告[EB/0L].[20l5-11—20].http:∥www.199it.com/archives/400091.html?fmm—groupmessage.
  • 3LEE S G, CHAE S H, CHO K M. Drivers and in- hibitors of SaaS adoption in Korea[J]. Internation- al Journal of Information Management, 2013, 33 (3) :429--440.
  • 4TOLLIVER N H. SaaS 101 : the basics of softwareas a service[J]. Seybold Anual Technology, 2009, 9(15):3--8.
  • 5ISACA. COBIT 5: Enabling Processes [EB/OL]. [2015-11- 20]. http.//www, isaca, org/COBIT/ Pages/COBIT-- 5 -- Enabling-- Processes-- product page. aspx.
  • 6S~i/iksjafirvi M, LASSILA A, Nordstrofim H. Eval uating the software as a service business model; from cpu time-sharing to online innovation sharing [C]//Michael R M. Proceedings of the IADIS In- ternational Conference e-Society. Portugal :IADIS Press, 2005:177-- 186.
  • 7SUBASHINI S, KAVITHA V. A survey on secur ity issues in service delivery models of cloud com- puting[J]. Journal of Network and Computer Ap- plications,2011, 34(1) :1--11.
  • 8BRENDER N, MARKOV 1. Risk perception and risk management in cloud computing ; results from a case study of Swiss companies[J]. International Journal of Information Management, 2013, 33 (5):726--733.
  • 9BENLIAN A, HESS T. Opportunities and risks of software-as-a-service:Findings from a survey of IT executives[J]. Decision Support Systems, 2011, 52 (1) :232--246.
  • 10IPLAND F F. An investigation to determine incre- mental risk to software as a service from a user's perspective[D]. Stellenboseh: Stellenbosch Univer- sity,2011.

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部