期刊文献+

云计算应用的安全问题分析 被引量:4

The Security Problems of the Application of Cloud Computing Analysis
下载PDF
导出
摘要 近年来,作为一个基于互联网的商业模式,云计算已经取得了长足的发展,对现代生活产生了巨大的影响。随着云计算应用范围的扩大,作为云计算应用可靠性的保证,其安全问题成为用户普遍关注的一个重要问题。本文主要从分析云计算应用存在的安全问题入手,重点分析应该采取哪些措施来加强云计算应用的安全管理。 In recent years, as a business model based on Internet, cloud computing has achieved great development and made a great impact on modern life. With the expansion of the scope of cloud computing applications, to ensure the reliability of cloud computing applications, security issue has become the center of attention. Starting by analyzing the threats cloud computing applications have to face, what methods should be used to strengthen cloud computing applications has been explained and stated in this paper.
作者 韩宇
出处 《信息安全与技术》 2014年第1期8-9,共2页
关键词 云计算 网络安全 通信 信息 cloud computing network security communication information
  • 相关文献

参考文献2

二级参考文献26

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1077

同被引文献10

引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部