期刊文献+

云计算可靠性的现状分析 被引量:1

下载PDF
导出
摘要 云计算的可靠性成为决定云计算能否广泛应用的一个关键因素。本文对云计算的可靠性现状进行了调查与分析,从云硬件系统、云网络系统、云存储系统的可靠性分别进行研究与分析,并对其发展前景进行了分析与总结。
出处 《福建电脑》 2014年第4期10-14,共5页 Journal of Fujian Computer
基金 江苏省大学生实践创新训练计划项目(12ssjcxzdy07)
  • 相关文献

参考文献28

  • 1M.Armbrust,A.Fox,R.Griflith,et al.A view of cloud computing.Communications of the ACM,2010,53(4):50-58.
  • 2S.Wang,Z Liu,Q Sun,et al.Towards an accurate evaluation of quality of cloud service in service-oriented cloud computing.Journal of Intelligent Manufacturing,2012:1-9.
  • 3冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1072
  • 4M.R.Lyu.Handbook of Software Reliability Engineering[M] .New York:McGraw-Hill,1996.
  • 5J.D.Musa,A.Iannino,K.Okumoto.Software reliability[M] ,New York:McGraw-Hill,1987.
  • 6B.Littlewood,A.Abdel-Ghaly,P.Chan.Tools for the Analysis of the Accuracy of Software Reliability Predicitons.Spring-Verlag,Heidelberg,1986.
  • 7M.R.Lyu.Software Reliability Engineering:A Roadmap[C] .In:Proceding of Future of Software Engineering,Minneapolis,Minnesota,May 23-25,2007,153-170.
  • 8K.Goseva-Popstojanova,K.Trivedi.Architecture-Based approach to reliability assessment of software systems[J] .Performance Evaluation,2001,45(2-3):179-204.
  • 9S.S.Gokhale.Architecture-Based Software Reliability Analysis:Overview and Limitations.IEEE Transactions on Dependable and Secure Computing[J] ,2007,4(1):32-40.
  • 10R.C.Cheung.A user-oriented software reliability model[J] .IEEE Transactions on Software and Engineer.1980,6(2):118-125.

二级参考文献24

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1071

同被引文献14

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部