期刊文献+

云WAF技术系统研究 被引量:3

Research on Cloud WAF Systems
下载PDF
导出
摘要 如今云WAF已经开始正式商业化,它既是Web应用防火墙的云模式,也是一种全新的信息安全产品模式,已经具备了完善的功能定义和成熟的技术平台。云WAF服务提高了云计算的安全性,增强了应用的可用性和安全性,也提升了网络的总体安全性。云WAF正处于高速应用发展阶段,文章结合实际情况,针对云WAF平台的整体架构和具体技术策略进行了分析和探讨。 Today, as a Web application firewall cloud model, cloud WAF has officially commercialized. It is a new model of information security products, and already has a perfect function deifnition and mature technology platform. Many providers who supply cloud services to consumers begin to release solutions to cloud WAF. Cloud WAF service has improved cloud computing’s security, enhanced application availability and security, and it increased the overall security of the network . The paper analysed and investigated the overall framework of cloud WAF platform and its technology strategy based on the actual situation.
出处 《信息网络安全》 2014年第12期1-6,共6页 Netinfo Security
关键词 云计算 云安全 云WAF WEB应用防火墙 cloud computing cloud security cloud WAF Web application ifrewall
  • 相关文献

参考文献13

二级参考文献102

  • 1盖凌云,黄树来.分布式拒绝服务攻击及防御机制研究[J].通信技术,2007,40(6):40-41. 被引量:6
  • 2杨武,方滨兴,云晓春,张宏莉.入侵检测系统中高效模式匹配算法的研究[J].计算机工程,2004,30(13):92-94. 被引量:24
  • 3罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 4Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 5Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 6Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 7Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 8Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 9Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 10Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.

共引文献1243

同被引文献30

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部