期刊文献+

桌面云网络准入控制技术研究 被引量:5

Technology of Access Control of Desktop Cloud Network
下载PDF
导出
摘要 随着云计算的广泛应用,更多的计算机终端将组合成桌面云环境。文章探讨了桌面云及其安全准入体系的基本架构,指出了可能面临的威胁,分析了桌面云的网络准入控制技术特点和趋势,提供了桌面云准入控制技术的技术模型,并给出了具体解决办法和应用模型。 With the wide application of cloud computing, and more computer terminals will be combined into a desktop cloud environment. This paper discusses the basic architecture of desktop cloud and security access system, points out the possible threat, analyzes the characteristics and trends ofdesktop cloud network access control, provides the technical model of cloud access control technology of the desktop, and the concrete solution and application model are also given.
出处 《信息网络安全》 2013年第6期14-17,共4页 Netinfo Security
关键词 桌面云 安全 网络准入控制 desktop cloud security network access control
  • 相关文献

参考文献5

二级参考文献34

  • 1林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 2殷丽华,何松.一种入侵容忍系统的研究与实现[J].通信学报,2006,27(2):131-136. 被引量:12
  • 3[1]Ken Wheeler. Defense Information Infrastructure Common Operating Environment Overview [ EB/OL]. http://diicoe. disa.mil/coe/brief/brief_page. html, 2001-05-17.
  • 4[2]Darleen Sadoski. Software Technology Review: Reference Models, Architectures, Implementations-An Overview [ EB/OL ].http://www. sei. cmu. edu/str/descriptions/refmodels body.html, 2001.
  • 5[3]DoD JTA Development Group. JTA User Guide and Component JTA Management Plan, Version 1.0[ EB/OL]. http://www-jta.itsi. disa. mil, 2001-09-14.
  • 6[4]A K Burke,J S Kerner. Mapping of Joint Technical Architecture(JTA) Version 3. 1 Core Standards to Technical Reference Model (TRM) Version 1.0 Services And Interfaces [ EB/OL].http://www-trm. itsi. disa. mil, 2001-03-02.
  • 7[5]Department of Defense. Technical Reference Model, Version 2.0[EB/OL]. http://www-trm. itsi. disa. mil/dev/htdocs/trmv2 _oct 18 01.pdf, 2001-04-09.
  • 8[6]DoD JTA Development Group. JTA Frequently Asked Questions (FAQ) [ EB/OL]. http://www-jta. itsi. disa. mil/jta/faq. html,2001-11-05.
  • 9[7]P Kathie Sowell. The C4ISR Architecture Framework: History,Status, and Plans for Evolution(5th International Command and Control Research and Technology Symposium) [ EB/OL].http://www. firstmark. ca/ContentDocs/architectural % 20docs/C4ISR % 20framework/c4isrcontent. htm, 2001.
  • 10[8]DoD JTA Development Group. DoD Joint Technical Architecture,Version 4.0 [ EB/OL ]. http://www-jta. itsi. disa. mil, 2001-04-02.

共引文献20

同被引文献45

  • 1唐晓雷,余镇危,刘知一,李罡.准入控制研究综述[J].计算机工程与应用,2005,41(5):129-131. 被引量:3
  • 2刘家彬,朱世华,李文元.基于GoS的功率控制WCDMA系统呼叫准入控制算法[J].电子与信息学报,2005,27(5):679-682. 被引量:1
  • 3王明珠,朱轶,董晓婷,王刚.超宽带无线通信MAC层的准入控制[J].电子与信息学报,2007,29(8):1938-1941. 被引量:1
  • 4王郑,韩焱,单联春通信运营商桌面云运用探讨[C]//中国通信学会信息通信网络技术委员年会论文集(上册).中国通信学会信息通信网络技术委员会.2011:8.
  • 5SWILER L P, PHILLIPS C. Computer-attack graph generation tool[C]//DAR.PA Information Survivability Conference & Exposition II-DISCEX'01. IEEE, 2001, (2): 307-321.
  • 6KANDUKURI B R, PATURI V R, RAKSHIT A. Cloud security issues[C]//ServicesComputingSCC'09. IEEE International Conference on, 2009:517-520.
  • 7SWILER L P, PHILLIPS C, GAYLORT.Agraph-basednetwork- vulnerabilityanalysissystem[C]//Sandia National Laboratories, Albuquerque, New. 1997.
  • 8RAMGOVIND S, ELOFF M M, SMITHE. The management of security in cloud computing[C]//Information Security for South Africa(ISSA). IEEE, 2010:1-7.
  • 9VIVES X, Nash equilibrium with strategic complement arities[J]. Journal of Mathematical Economics, 1990, 19(3): 305-321.
  • 10陈伟,曹军威,钱瀚.基于虚拟组织的桌面云安全访问与共享机制研究[J].集成技术,2012,1(4):25-29. 被引量:3

引证文献5

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部