期刊文献+

“图书馆之城”的云之路——以深圳图书馆为例 被引量:1

Cloud Road of The Library City:Taking the Practice of Shenzhen Library as an Example
下载PDF
导出
摘要 云时代的到来,为深圳"图书馆之城"的大力发展提供了契机。论文结合深圳图书馆行业现状,提出了一种基于虚拟化技术为全市图书馆行业构建云服务的思路,给出建设方法,突出云时代数字图书馆为读者提供服务的新优势。 The arrival of the cloud era provides a vigorously development opportunity to the "Library City". Combining the Shenzhen library profession situation, this paper proposes one kind of idea based on the virtualization technology, that is to construct cloud services for the Shenzhen library industry, gives the method of construction, highlights the new readers service advantage of the digital library in the cloud era.
作者 成星
机构地区 深圳图书馆
出处 《新世纪图书馆》 CSSCI 2014年第6期61-64,共4页 New Century Library
关键词 云计算 云服务 虚拟技术 服务器虚拟化 网络虚拟化 存储虚拟化 Cloud computing. Cloud services. Virtualization technology. Server Virtualization. Network virtualization. Storagevirtualization.
  • 相关文献

参考文献8

二级参考文献42

  • 1云计算[四个特点][发展现状][判断方法].http://www.so-time.com/show/44_2.html.
  • 2m5171cn.国际国内云计算发展现状及未来前景[EB/OL].http://www.cloudcomputing-china.cn/Artich/cloudcomputing/200808/177_2.html.2008-8-19.
  • 3OCLC announces strategy to move library management services to Web scale [EB/OL]. http://www, oclc. org/us/en/news/releases/200927, htm. [2010 - 09 - 08].
  • 4Crampton J, Martin K, Wild P. On key assignment for hierarchical access control[M]. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 5Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcingIM]. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Cone Sandton: Springer-Verlag,2007. 385-396.
  • 6Goyal V, Pandey A, Sahai A, Waters B. Attribute-Based encryption for fine-grained access control of encrypted data[M]. In: Juels A, Wright RN, Vimercati SDC, eds. Proc. of the 13th ACM Conf. on Computer and Communications Security, CCS 2006. Alexandria: ACM Press, 2006. 89-98.
  • 7Bowers KD, Juels A, Oprea A. implementation[C]. In: Sion R, ed. Proofs of retrievability: Theory and Proc. of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009, Co-Located with the 16th ACM Computer and Communications Security Conf., CCS 2009. New York: Association for Computing Machinery, 2009.43-54.
  • 8Elangop S, Dusseauaetal A. Deploying virtual machines as sandboxes for the grid[C]. In: Karp B, ed. USENIX Association Proc. of the 2nd Workshop on Real, Large Distributed Systems. San Francisco, 2005.7-12.
  • 9Gartner. Cloud Computing Will Be As Influential As E-business[EB/ OL]. Gartner.com, 2010-08-22/2011-07-01.
  • 10Gruman, Galen. What cloud computing really means[EB/OL]. InfoWorld, 2008-04-07/2009-06-02.

共引文献315

同被引文献10

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部