期刊文献+

移动互联网中云计算的应用与安全分析

the Applicationand the Security analysis of Cloud Computing on the Mobile Internet
下载PDF
导出
摘要 IT行业飞速发展,移动通信技术与互联网技术二者结合产生了移动互联网。本文从当前移动互联网发展的前提下分析了云计算在移动互联网上的应用,并简单阐述了云计算在移动互联网中存在的安全问题。 With the rapid development ofiTindustry,themobile Internet is produced by the combination ofmobilecommunication technology andInternet technology.Under the premise of the current mobilelntemet development,this article analysesthe cloud computing applicationson the mobileInternet, andbriefly discussescloud computingsecurity issuesthat existin the mobile Internet.
作者 谢于晨
机构地区 江西科技学院
出处 《电子世界》 2014年第22期1-2,共2页 Electronics World
关键词 移动互联网 云计算 云安全 Mobileintemet Cloud computing Cloud Security
  • 相关文献

参考文献5

二级参考文献30

  • 1郄小明,徐军库.云计算在移动互联网上的应用[J].计算机科学,2012,39(S2):101-103. 被引量:7
  • 2罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 3Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 4Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 5Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 6Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 7Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 8Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 9Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 10Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.

共引文献1077

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部