期刊文献+

云计算虚拟化技术安全防护 被引量:2

Protection of Cloud Computing Virtualization Technology
下载PDF
导出
摘要 以云计算虚拟化技术的安全为例,探讨云计算的安全挑战与防护策略。 Based on the security of the cloud computing virtualization technology, the security challenges and protection strategies in cloud computing virtualization technology are presented.
作者 黄柳铃 张瑞
出处 《安徽电子信息职业技术学院学报》 2015年第1期26-28,共3页 Journal of Anhui Vocational College of Electronics & Information Technology
关键词 云计算 虚拟化 云安全 cloud computing virtualization cloud security
  • 相关文献

参考文献2

二级参考文献23

  • 1Ian Foster,Zhao Yong,Ioan Raicu,et al.Cloud computing and grid computing 360-degree compared[C].Grid Computing Environments Workshop,2008:1-10.
  • 2Mladen A Vouk.Cloud computing-issues,research and implementations[J].Journal of Computing and Information Technology,2008(4):235-246.
  • 3Luis M Vaquero,Luis Rodero-Merino,Juan Caceres,et al.A break in the clouds:Towards a cloud definition[C].ACM SIGCOMM Computer Communication Review,2008.
  • 4Rajkumar Buyya,Chee Shin Yeo,Srikumar Venugopal.Marketoriented cloud computing:Vision,hype,and reality for delivering IT services as computing utilities[c].HPCC,IEEE CS Press,2008.
  • 5Armbrust M,Fox A,Griffith R,et al.A bove the clouds:A berkeley view of cloud computing[EB/OL].http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.pdf.
  • 6Amazon elastic compute cloud(amazon EC2)[EB/OL].http://aws.amazon.com/ec2,2009.
  • 7MicroSoft.Cloud computing platform:Azure service platform overview[R].INSIGHT(MicroSoft),2008.
  • 8Hadoop[EB/OL].http://hadoop.apache.org/,2009.
  • 9Hadoop中文资料[EB/OL].http://www.cloudcomputing-china.cn,2009.
  • 10Siegele L.Let it rise:A special report on corporate IT[C].Economist,2008.

共引文献153

同被引文献16

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部