期刊文献+

Formal Protection Architecture for Cloud Computing System 被引量:1

Formal Protection Architecture for Cloud Computing System
下载PDF
导出
摘要 Cloud computing systems play a vital role in national security. This paper describes a conceptual framework called dualsystem architecture for protecting computing environments. While attempting to be logical and rigorous, formalism method is avoided and this paper chooses algebra Communication Sequential Process. Cloud computing systems play a vital role in national security. This paper describes a conceptual framework called dualsystem architecture for protecting computing environments. While attempting to be logical and rigorous, formalism method is avoided and this paper chooses algebra Communication Sequential Process.
出处 《ZTE Communications》 2014年第2期63-66,共4页 中兴通讯技术(英文版)
关键词 formal method trusted computing PRIVACY cloud computing formal method trusted computing privacy cloud computing
  • 相关文献

参考文献11

  • 1T. Schelling,“Dynamic models of segregation,”Journal of Mathematical Sociolo?gy, vol. 1, no.2, pp. 143-186, 1971.
  • 2M. Matuszewski, N. Beijar, J. Lehtinen, and T. Hyyrylainen,“Understanding atti?tudes towards mobile peer?to?peer content sharing services,”in PORTABLE’07,Orlando, FL, USA, pp. 1-5. doi: 10.1109/PORTABLE.2007.11.
  • 3Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues andEvaluation Considerations, IETF Network Working Group RFC 2501, 1999.
  • 4J. Li, C. Blake, D. De Couto, H. Lee, and R. Morris,“Capacity of ad hoc wirelessnetworks,”in ACM MobiHoc 2001, Long Beach, CA, USA, pp. 61- 69. doi:10.1145/381677.381684.
  • 5X. Li,“Multicast capacity of wireless ad hoc networks,”IEEE/ACM Trans.Netw., vol. 17, no. 3, pp. 950-961, Jun. 2008. doi: 10.1109/TNET.2008.927256.
  • 6P. Gupta and P. Kumar,“The capacity of wireless networks,”IEEE Trans. Inf.Theory, vol. 46, no. 2, pp. 388-404, Mar. 2000. doi: 10.1109/18.825799.
  • 7C. Perkins and E. Royer,“Ad?hoc on?demand distance vector routing,”in WMC?SA 1999, New Orleans, LA, USA, pp. 90-100. doi: 10.1109/MCSA.1999.749281.
  • 8D. Johnson and D. Maltz,“Dynamic source routing in ad hoc wireless networks,”Mobile Computing, T. Imielinski and H. Korth, Eds., New York: Kulwer Academ?ic Publishing, 1996, pp. 153-181.
  • 9R. Draves, J. Padhye, and B. Zill,“Comparison of routing metrics for static mul?tihop wireless networks,”in ACM SIGCOMM 2004, Portland, OR, USA, pp.133-144. doi: 10.1145/1015467.1015483.
  • 10D. De Couto, D. Aguayo, J. Bicket, and R. Morris,“A high throughput path met?ric for multihop wireless routing,”in ACM MobiCom 2003, San Diego, CA,USA, pp. 134-46. doi: 10.1145/938985.939000.

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部