期刊文献+

教育考试云计算安全体系构建探析

Building a Cloud Computing Security System for Education Examinations
下载PDF
导出
摘要 根据云计算面临的用户安全、网络安全、应用架构安全、数据安全、云环境安全等风险,提出从用户层、数据层、业务服务层和基础层4个维度构建教育考试云平台安全防护体系,以解决教育考试领域应用云计算技术所面临的安全问题。 In consideration of the risks that may arise in cloud computing of user security, network security, application architecture security, data security, cloud environment security and so on, this study proposes to address security concerns surrounding the application of cloud computing technology in education examinations by building a cloud platform security system from four dimensions, namely the user layer, the data layer, the business service layer and the infrastructure layer.
出处 《中国考试》 2016年第12期14-18,共5页 journal of China Examinations
基金 全国教育科学"十二五"规划2011年度教育部重点课题"云计算技术在教育考试中的应用研究"(批准号:GFA111005)的研究成果
关键词 教育考试 云计算 云安全 Education Examinations Cloud Computing Cloud Security
  • 相关文献

参考文献3

二级参考文献38

  • 1孙波,赵庆松,孙玉芳.TRDM——具有时限的基于角色的转授权模型[J].计算机研究与发展,2004,41(7):1104-1109. 被引量:26
  • 2徐震,李斓,冯登国.基于角色的受限委托模型[J].软件学报,2005,16(5):970-978. 被引量:52
  • 3翟征德.基于量化角色的可控委托模型[J].计算机学报,2006,29(8):1401-1407. 被引量:33
  • 4罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 5Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 6Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 7Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 8Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 9Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 10Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].

共引文献1234

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部