期刊文献+

基于云计算企业文档一致性方法的研究

Research on Enterprise Document Consistency Method Based on Cloud Computing
下载PDF
导出
摘要 当多用户并发访问基于云计算的企业文档管理系统时,容易出现分布式环境下文档不一致的问题,因而提出了文档一致性的控制机制——基于锁的拷贝-修改-合并机制,改进了Rsync。对比实验了改进后的Rsync与传统的同步算法Rsync,结果表明,改进后的Rsync算法能够减少网络流量,提高传输效率,更能适应云环境下文件的传输需求。 Document inconsistency is likely when concurrent access happens in enterprise document management sys tern. Therefore, a document consistency control mechanism, copy revision-merge, was presented based on lock. Rsync is improved. Comparing the improved Rsync and the traditional synchronization algorithm Rsync, comparative results indicated that the improved Rsync could reduce network traffic, improve the transmission efficiency and fit for the file transmission requirement in cloud environment better.
出处 《新乡学院学报》 2014年第6期23-26,共4页 Journal of Xinxiang University
基金 安徽省自然科学基金资助项目(11040606M152) 安徽省高等学校省级自然科学研究项目(KJ2013B182) 滁州学院科研基金资助项目(2012kj003B)
关键词 云计算 并发控制 文件同步 RSYNC cloud computing concurrency control file synchronization Rsync
  • 相关文献

参考文献5

  • 1冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1063
  • 2DELIC K A, RILEY J A. Enterprise Knowledge Clo- udes: Next Generation KM Systems[C]//Proceedings of 2009 IEEE International Conference on Information, Process, and Knowledge Management, Cancun, MEXICO, 2009, 49-53.
  • 3TRIDELL A. Efficient Algorithms for Sorting and Synchronization [D]. Canberra: The Australian Na- tional University, 1999.
  • 4TRIDGELL A, MACKERRAS P. The Rsync Algo rithm[R]. Canberra: Australian National University, 1996.
  • 5徐旦,生拥宏,鞠大鹏,吴建平,汪东升.高效的两轮远程文件快速同步算法[J].计算机科学与探索,2011,5(1):38-49. 被引量:12

二级参考文献25

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1073

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部