期刊文献+

基于IaaS云计算的高效服务器管理相关问题探析 被引量:1

Analysis of Related Issues of Efficient Severs Based on Cloud Computing in IaaS
下载PDF
导出
摘要 IaaS(Infrastructure as a Service)基础设施即服务是进行云服务的基础工作部分,通过这种基础服务设施可以对多种数据资源进行资源池优化,真正做到最低成本同时又能够满足各种外部资源服务。首先对IaaS云计算的相关概念进行了阐述,并与传统VPS业务进行了对比,在此基础上对基于IaaS云计算的高效服务器管理相关问题进行了探讨。 IaaS(Infrastructure as a Service)infrastructure as a service is the most fundamental part of cloud computing services through IaaS deployments for computing, data storage, networking and management of various IT resources can be optimized resource pool,and it could cost lowly to meet a variety of external resources services. Firstly,the IaaS cloud computing concepts are described,and traditional VPS services are compared.On the basis of this,the relevant issues for efficient server management based IaaS cloud are discussed.
作者 蔡昕
出处 《电脑开发与应用》 2014年第3期73-74,78,共3页 Computer Development & Applications
关键词 云计算 高效服务器 服务平台 cloud computing efficient servers service platforms
  • 相关文献

参考文献2

二级参考文献29

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1235

同被引文献16

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部