期刊文献+

云计算客户虚拟机间的安全机制研究与实现

下载PDF
导出
摘要 云计算弹性服务主要依赖于一些虚拟技术支持,但是虚拟技术存在安全问题,这就会导致云计算安全受到威胁。本文主要分析云计算客户虚拟机安全管理的模块设计与云资源控制隔离机制的设计,深入研究系统实现方式,保护客户虚拟机的安全性。
出处 《新校园(上旬刊)》 2016年第9期121-121,共1页 New Campus
  • 相关文献

参考文献2

二级参考文献30

  • 1王鹏,黄华峰,曹珂.云计算:中国未来的IT战略.北京:人民邮电出版社,2010.
  • 2Jasti A,Shah P,Nagaraj R,et al.Security in multi-tenancycloud.Proceedings of 2010 IEEE International CarnahanConference on Security Technology(ICCST),San Jose,CA,2010:35~41.
  • 3Hanqian Wu,Yi Ding,Winer Chuck,et al.Network securityfor virtual machine in cloud computing.Proceedings of 5thInternational Conference on Computer,Sciences andConvergence Information Technology(ICCIT),Seoul,Korea,2010:18~21.
  • 4Tim Mather,Subra Kumaraswamy,Shahed Latif.Cloud Securityand Privacy.O'Reilly Media,2009.
  • 5Yanfeng Zhang,Cuirong Wang,Yuan Gao.A QoS-oriented network architecture based on virtualization.Proceedings of First International Workshop on Education Technology and Computer Science,Wuhan,China,2009:959~963.
  • 6Sehgal N K,Ganguli M.Applications of virtualization for server management and security.Proceedings of IEEE International Conference on Industrial Technology(ICIT),Mumbai,India,2006:2 752~2 755.
  • 7Xiaorui Wang,Yefu Wang.Coordinating power control and performance management for virtualized server clusters.IEEE Transactions on Parallel and Distributed Systems,2011,22(2):245~259.
  • 8Xen Introduction.http://xen.xensource.com/media/xen/player.html.
  • 9Challener D,Yoder K,Catherman R,et al.A Practical Guide to Trusted Computing.IBM Press,2008.
  • 10Chen P M,Noble B D.When virtual is better than real.Proceedings of the 8th Workshop on HotTopics in Operating Systems,IEEE Computer Society,Washington,DC,USA,2001.

共引文献57

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部