期刊文献+

云计算中可信访问控制的研究

Research on Trust Access Control of Cloud Computing
下载PDF
导出
摘要 云计算是指通过网络提供的软件服务。这些服务的安全问题由于云环境的异构和动态分布变得越来越严重。复杂的云平台对安全设备有更多的功能需求,这样才能适应现有网络环境。本文中提出了一种通过监控器定制的防火墙解决方案完成可信访问控制,描述了基于虚拟连接管理流量过滤机制的可信访问控制模型。 Cloud computing refers to the software services provided through the network.Security issues of these services due to the heterogeneous and dynamic distribution of the cloud environment are becoming increasingly serious.Complex cloud platform has more of the functional requirements of safety equipment,so as to adapt to the existing network environment.A monitor customized firewall solution to complete trust access control,this paper describes the credibility of the virtual connection management traffic filtering mechanism-based access control model.
作者 苟全登
出处 《科技通报》 北大核心 2013年第2期64-66,共3页 Bulletin of Science and Technology
关键词 云计算 可信访问控制 安全 cloud computing trusted access control security
  • 相关文献

参考文献4

  • 1胡春华,罗新星,王四春,刘耀.云计算环境下基于信任推理的服务评价方法[J].通信学报,2011,32(12):72-81. 被引量:15
  • 2Armbrust M,Fox A,Grith R. A view of cloud computing[J].Communications of the ACM,2010.50-58.
  • 3Brodkin Gartner. seven cloud-computing security risks[DB/OL].http://www.networkworld.com /news /2008 /070208-cloud.html,2008.
  • 4Raj H,Nathuji R,Singh A. Resource management for isolation enhanced cloud services[A].Chicago,Illinois,USA,2009.77-84.

二级参考文献17

  • 1MICHAEL H, MUNINDAR P S. Service-oriented computing: key concepts and principles[J]. IEEE Internet Computing, 2005, 9(1): 75-81.
  • 2DOU W C, CHEN J, LIU J X, et al. A workflow engine-driven SOA-based cooperative computing aradigm in grid environments[J]. International Journal of High Performance Computing Applications, 2008, 22(3): 284-300.
  • 3ZAKI M, ATHMAN B. Reputation bootstrapping for trust establishment among Web services[J]. IEEE Internet Computing, 2009, 13(1): 40-47.
  • 4CARDOSO J, SHETH A, MILER J, et al. Quality of service for workflows and Web service processes[J]. Journal of Web Semantics, 2004, 13(3): 281-320.
  • 5OH S C, LEE D W, KUMARA R T S. Effective Web service composition in diverse and largescale service networks[J]. IEEE Transactions on Services Computing, 2008, 1(1): 15-32.
  • 6ROSENBERG F, CELIKOVIC E MICHLMAYR A, et al. An erld-toend approach for QoS-aware service composition[A]. 13th IEEE International Enterprise Distributed Object Computing Conference[C]. 2009. 151-160.
  • 7CHEN W N, ZHANG J. An ant colony optimization approach to a grid workflow scheduling problem with various QoS requirements[J]. IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews, 2009, 39(1): 29-43.
  • 8SURYANARAYANA G Selection and Architecture-based Composition of Trust Models in Decentralized Applications[D]. University of California, lrvine, 2007.
  • 9JURCA R, FALTINGSI B. Eliciting truthful feedback for binary reputation mechanisms[A]. Proceedings of the 2004 IEEE/WlC/ACM International Conference on Web Intelligence[C]. Los Alamitos, CA: IEEE Computer Society Press. 2004, 214-220.
  • 10DAMIANI E, VIMERCATI S D, PARABOSCHI S. A reputation based approach for choosing reliable resources in P2P networks[A]. Proceedings of ACM conference on Computers and Communications Security[C]. New York: ACM Press, 2002. 18-22.

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部