期刊文献+

云计算视角下的供应链信息协同研究 被引量:5

Supply Chain Information Collaboration Research under the Perspective of Cloud Computing
下载PDF
导出
摘要 随着供应链的不断发展,供应链信息协同出现了较多问题,而云计算对供应链信息协同是一种很好的选择.指出了传统信息管理系统在供应链信息管理中的应用弊端,在此基础上将云计算引入供应链信息协同应用中,建立了云计算在供应链中的应用模型,分析了云计算服务在模型中的具体职能. With the continuous development of the supply chain, supply chain collaboration has some questions, and cloud computing is a good choice for that. In this context, we point out the disadvantages of traditional infor- mation management systems in the supply chain information management. On the basis of the introduction, we establish a model to indicate the cloud computing used in the supply chain.
作者 王文铭 李钊
出处 《河南科学》 2013年第10期1787-1790,共4页 Henan Science
基金 国家社科基金项目(12BJY075)
关键词 云计算 供应链 信息协同 一体化 cloud computing supply chain: information collaboration integration
  • 相关文献

参考文献7

  • 1Ghemawat S, Gobioffh, Leung P T. The google file system [C] //Proceedings of the 19th ACM Symposium on Operating Systems Principles New York: ACM Press, 2003: 29-43.
  • 2Apache Hadoop. Hadoop[EB/OL]. [2009-03-06]. http://hadoop, apache, org/.
  • 3Dean J, Ghemawat S. MapReduce: Sire-plied data processing on large clusters [C]//OSDI 04: Proceedings of the 6th Symposium on Operating System Design and Implementation New York: ACM Press, 2004: 157-150.
  • 4Yuy, Isardm, Fetterly D, et al. Dryad LINQ: A system for general-purpose distributed data-parallel computing using a high-level language [C]//Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation New York: ACM Press, 2008: 1-14.
  • 5Foster I, Kesselman C, Tuecke S. The anatomy of the grid enabling scalable virtual organizations [J]. International Journal of High Performance Computing Applications, 2001,15 (3) : 200-222.
  • 6冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1067
  • 7Yahoo. Yahoo! Hadoop tutorial [EB/OL]. [2009-02-27]. http://public.yahoo.com/gogate/hadoop-tutorial/start-tutoria.1 htm.1.

二级参考文献24

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1066

同被引文献33

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部