期刊文献+

云计算安全研究 被引量:3

Reasearch on Cloud Computing Security
下载PDF
导出
摘要 随着云计算的深入人心,云计算安全性问题逐渐成为引人关注的焦点之一,实际上这已经成为制约云计算发展的瓶颈。从不同参与者的角度分析了云计算安全需求,并深入剖析了云计算安全问题及面临的挑战。同时,在此基础上提出了一种云计算安全模型,并对相关安全技术进行了具体分析。 With cloud computing of thorough popular feeling, cloud computing security problem has become one of the focus of public attention. In fact, it has already become the bottleneck of the development of cloud computing. This paper, analyses the cloud computing security needs from the different perspectives of participants, and in-depth dissects the security problems and challenges of cloud computing. Based on this, this paper builds a cloud computing security model, and analyses the relevant security technology.
作者 陆晓 向涛
出处 《软件导刊》 2013年第6期122-124,共3页 Software Guide
关键词 云计算 云计算安全 安全技术 Cloud Computing Security Security Demands Security Techniques
  • 相关文献

参考文献7

  • 1MELL P,GRANCE T. The NIST definition of cloud computing[R].National Institute of Standards and Technology,Information Technology Laboratory,2009.
  • 2CONG WANG,QIAN WANG,KUI REN. Ensuring data storage security in cloud computing[A].2009.
  • 3LAN FOSTER,YONG ZHAO,IOAN RAICU. Cloud computing and grid computing 360-degree compared[A].2008.
  • 4GARTNER. Seven cloud-computing security risks[EB/OL].http://www.networkworld.com/news/2008/070208-cloud.html,2008.
  • 5YAN LIANG;RONG CHUN-MING;ZHAO GAN-SEN.Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography[A]北京,2009.
  • 6CENTRY C. A Fully Homorphic encryption scheme[D].Stanford,California:Stanford University,2009.
  • 7TIM MATHER,SUBRA KUMARASWAMY,SHAHED LATIF. Loud security and privacy[M].Beijing:O'Reilly Media,2009.

同被引文献9

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部