期刊文献+

基于云计算的政务数据信息共享平台构建研究——以“数字福建”为例 被引量:18

Study of Construction of Government Affairs' Data and Information Sharing Platform of Cloud Computing- based——A Case of Digital Fujian
下载PDF
导出
摘要 为了解决"数字福建"建设过程中出现的数据异构、信息共享困难的问题,利用云计算在海量数据处理和共享方面的优势,本文构建了基于云计算的电子政务平台,详细阐述了该平台中Saa S、Paa S、Iaa S等3种模式,讨论了实现数据共享的虚拟化技术、数据抽取技术、数据转换技术和数据处理技术等关键技术,以期为福建省推动政务信息的深度开发和有效利用提供有益的探索。 In order to solve the problem like heterogeneous data and di^cult information sharing that appeared in the con- struction process of "distal Fujian", this paper exploited the advantages of cloud - computing in data processing and sharing to build e - government platform, it described three modes (SaaS, PaaS, IaaS) of platform in detail, and it discussed the key technology of data sharing, such as virtualization technology, data extraction, data conversion and data processing, it would pro- mote the government information to develop deeply and utilize effectively in Fujian province.
出处 《现代情报》 CSSCI 北大核心 2015年第10期76-81,共6页 Journal of Modern Information
基金 "十三五"数字福建专题规划前提重点研究项目"政务与行业数据(信息)资源共享机制研究"(项目编号:822924)
关键词 “数字福建” 云计算 数据共享 政务云平台 电子政务 digital Fujian cloud computing information sharing government clouds platform e- government
  • 相关文献

参考文献11

  • 1冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1072
  • 2杨冬菊,王菁,蒋贵凰.eGovCloud:一种基于云服务的电子政务框架[J].计算机工程与科学,2014,36(11):2067-2073. 被引量:7
  • 3鲁俊杰,侯卫真.面向信息资源整合的电子政务云平台构建研究[J].图书馆学研究,2012(13):36-40. 被引量:28
  • 4Hyebong Choi,Kyong-Ha Lee,Yoon-Joon Lee et al.Parallel labeling of massive XML data with MapReduce[J].Journal of supercomputing,2014,67(2):408-437.
  • 5Bogdan Nicolae,Franck Cappello.BlobCR:Virtual disk based checkpoint-restart for HPC applications on IaaS clouds[J].Journal of Parallel and Distributed Computing,2013,73(5):698-711.
  • 6Praveena D,Rangarajan P.Analysis of trend,service and deployment models in clouding computing with focus on hybrid cloud and its implementation[J].Research Journal of Applied Science,2014,9(4):181-186.
  • 7Van Gorp,P.,Comuzzi,M..Lifelong Personal Health Data and Application Software via Virtual Machines in the Cloud[J].IEEE journal of biomedical and health informatics,2014,18(1):36-45.
  • 8Binh Viet Phan,Eric Pardede.Active XML(AXML)research:Survey on the representation,system architecture,data exchange mechanism and query evaluation[J].Journal of network and computer applications,2014,37(1):348-364.
  • 9Marozzo,F.,Talia,D.,Trunfio,P.et al.P2P-MapReduce:Parallel data processing in dynamic Cloud environments[J].Journal of Computer and System Sciences,2012,78(5):1382-1402.
  • 10Sven Groppe,Jinghua Groppe,Niklas Klein et al.Transforming XSLT stylesheets into XQuery expressions and vice versa[J].Computer languages,systems &structures,2011,37(2):76-111.

二级参考文献43

  • 1李晓东,杨扬,郭文彩.基于企业服务总线的数据共享与交换平台[J].计算机工程,2006,32(21):217-219. 被引量:79
  • 2李长河,赵洁,张亚玲,石争浩.一种安全异构数据交换技术的研究与实现[J].计算机工程,2007,33(2):88-89. 被引量:22
  • 3罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 4Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 5Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 6Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 7Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 8Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 9Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 10Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.

共引文献1111

同被引文献178

引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部