期刊文献+

公有云安全风险分析及应对技术 被引量:2

Public Cloud Computing Security Risk Analysis and Countmeasures
下载PDF
导出
摘要 随着云计算的蓬勃发展,公有云作为云计算的主要形态,安全问题不可避免并且日渐突出。论文首先简单阐述了公有云安全产生的背景和相关概念,介绍了公有云环境中面临的攻击,然后基于公有云的安全需求和面临的攻击,详细介绍了公有云安全的关键技术并做分析,最后给出了多方面综合来解决公有云安全问题的结论。 With the prosperous development of cloud computing technologies,public cloud computing is the dominant form of cloud computing,and its security issuses are inevitably and increasingly prominent.Firstly the paper briefly explains the backgrounds and the relevant concepts of public cloud computing security,introduces the network attacks in public cloud computing environment.And then,base on the security requirements and network attacks,particularly explains the key technologies of public cloud computing security and give analysis.Finally,the conclusion was given that we need the comprehensive solution of public cloud computing security issues.
出处 《网络空间安全》 2016年第7期67-72,79,共7页 Cyberspace Security
基金 "中科院开放课题基金"
关键词 公有云安全 虚拟化安全 数据私密性和安全性 访问控制 拒绝服务攻击 侧信道 public cloud computing security virtualization security data privacy and safty access control dos side channel
  • 相关文献

参考文献5

二级参考文献57

  • 1梁彬,孙玉芳,石文昌,孙波.一种改进的以基于角色的访问控制实施BLP模型及其变种的方法[J].计算机学报,2004,27(5):636-644. 被引量:30
  • 2李益发,沈昌祥.一种新的操作系统安全模型[J].中国科学(E辑),2006,36(4):347-356. 被引量:20
  • 3MILLER M.Cloud Computing:Web-Based Applications ThatChange the Way You Work and Collaborate Online[M].Que PrintPublication,2008.
  • 4SIRISHA A,GEETHAKUMARI G.API access control in cloud usingthe role based access control model[A].Trendz in Information Sci-ences and Computing-TISC2010[C].2010.
  • 5LI D,LIU C,WEI Q,et al.RBAC-Based access control for SaaSsystems[A].2010 2nd International Conference on Information Engi-neering and Computer Science(ICIECS)[C].2010.
  • 6XUE J,ZHANG J J.A brief survey on the security model of cloudcomputing[A].2010 Ninth International Symposium on DistributedComputing and Applications to Business Engineering and Science(DCABES)[C].2010.
  • 7Nat’l Computer Security Center.Trusted network interpretation of thetrusted computer system evaluation criteria[A].NCSC-TG2005[C].1987.
  • 8BELL D E,LAPADULA L J.Secure Computer Systems:Mathemati-cal Foundations[R].The MITRE Corporation,Bedford,Massachus-setts,1973.
  • 9LIN T,BELL Y,AXIOMS L.A“new”paradigm for an“old”model[A].Proc 1992 ACM SIGSAC New Security Paradigms Work-shop[C].1992.
  • 10BIBA K J.Integrity Considerations for Secure Computer Systems[R].Bedford:ESD-TR-76-732,1977.

共引文献94

同被引文献16

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部