期刊文献+

云计算背景下的用户身份认证安全分析

Security Analysis of User Identity Authentication in the Background of Cloud Computing
下载PDF
导出
摘要 作为计算机技术和互联网结合的重要产物内容,云计算已经开启了IT界与信息领域的新一轮技术革命。然而,云计算存在着许多风险问题,在目前的网络监管环境下依然还存在有许多漏洞性问题,对于网络用户的信息安全产生了巨大的威胁,要想解决这一问题,开展云计算背景下的用户身份认证安全分析已经迫在眉睫,对此本文将就云计算的安全问题展开具体的分析,并提出了一些具体的应对措施。 As an important product of the combination of computer technology and the Internet, cloud computing has opened a new round of technological revolution in the field of IT and information. However, cloud computing has a lot of risk problems. There are still many vulnerability problems under the current regulatory network environment, producing a huge threat for the information security of the network users. In order to solve this problem, it is imminent to carry out the user authentication security analysis in the background of cloud computing. This paper will focus on the cloud computing security problems and puts forward some specific measures.
作者 沈燕
出处 《电脑与电信》 2016年第8期55-57,共3页 Computer & Telecommunication
关键词 云计算 用户身份认证 安全分析 cloud computing user identity authentication security analysis
  • 相关文献

参考文献6

二级参考文献36

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:307
  • 2刘正伟,文中领,张海涛.云计算和云数据管理技术[J].计算机研究与发展,2012,49(S1):26-31. 被引量:170
  • 3陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:341
  • 4李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 5王伟.多信息源的实时入侵检测方法研究[M].西安:西安交通大学出版社,2005.
  • 6B Waters. Egleient identity - based encryption without random ora - cles [ C ]. Advances in Cryptology - EUROCRYPT 2005. Ber- lin : Springer - Verlag, 2005 : 114 - 127.
  • 7董贵山,卢显良,邓春梅,罗俊.一种Linux网络硬件加密高性能并发调度方法[J].计算机应用,2008,28(1):65-67. 被引量:8
  • 8Cloud Security Alliance. Security guidance for critical areas of focus in cloud computing v3.0 [OL]. 2011 [2014-06-20]. https ://cloudseeurityalliance. org/guidance/esaguide, v3.0. pdf.
  • 9Modi C, Dhiren P, Bhavesh B, et al. A survey on security issues and solutions at different layers of cloud computing [J]. The Journal of Supercomputing, 2013, 63(2): 561-592.
  • 10Arbor Networks. The arbor networks 8th annual worldwide infrastructure security report finds DDoS has become part of advanced threat landscape lOLl. 2013 [2014-06-20]. http:// www. arbornetworks, com/news-and-events/press-releasesl recent press-releases/4737-the-arbor-networks-8t h-annuat- worldwide-infrastructure-security-report-finds-ddos-has- become-part of-advanced-threat-landscape.

共引文献58

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部