期刊文献+

云计算安全可靠性研究 被引量:3

Research on Security and Reliability of Cloud Computing
下载PDF
导出
摘要 云计算是全新的互联网应用商业模式,它在提高资源利用率的同时,也给信息安全带来了很大的安全隐患和挑战,安全性成为用户选择云计算应用时的首要考虑因素。本文在介绍云计算的关键特征及安全问题基础上,对云计算的安全参考模型和安全应对策略进行了分析,并分别从云计算服务提供商和云计算用户的角度提出不同对象的云计算安全应对策略与建议。 Cloud computing is a new business model of Internet applications, it improves the resource utilization rate, but at the same time, it has also brought great security risks and challenges in the fi eld of information security, the security is the prime consideration for the customer to adapt cloud computing. The paper analyzes the key features and the security issues of cloud computing, and gives the security policy and recommendations from the perspective of cloud computing service provider and the customer.
作者 徐小云
出处 《软件产业与工程》 2016年第4期49-51,56,共4页
基金 2014年度上海市软件和集成电路产业发展专项资金项目(140211)
关键词 云计算 安全可靠性 安全参考模型 安全策略 Cloud Computing Security and Reliability Security Reference Model Security Policy
  • 相关文献

参考文献2

二级参考文献26

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Cloud Security Alliance. Security guidance for critical areas of focus in cloud computing v2.1, http://www.eloudsecurityallianee. org/csaguide.pdf.
  • 3IBM.蓝云解决方案.http://www-900.ibm.com/ibm/ideasfromibm/cn/cloud,solution8/index.shtml.
  • 4Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 5Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 6Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 7Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 8Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 9Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 10Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.

共引文献1117

同被引文献28

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部