期刊文献+

云电子商务的安全审计问题研究 被引量:6

Security Audit Problem of Cloud Electronic Commerce
下载PDF
导出
摘要 "云环境"与传统商务相结合,将引起电子商务重大变革。阿里云计算、京东云服务、当当云书架的相继推出,提升了服务质量,降低了运行成本,提高了商务的可拓展性。然而,通过对近年来网络安全事件统计分析发现,云电子商务的安全形势极为严峻,且我国还缺乏成熟的安全管理规范。由此,强化对云电子商务安全问题的审计与管理势在必行。云电子商务安全审计是系统工程,有必要梳理安全审计风险构成,并以此为基础,设计合理的安全审计模式,建立科学的安全审计过程挖掘平台,拓展审计策略,力求基于本质抑制相关安全事故的发生。 E -commerce will cause major changes because "the cloud" combined with the traditional commerce. It improves the service quality, reduces the operation cost, improves the business expand ability for a- li cloud computing, cloud services and dang- dang cloud bookshelf. However, we found that cloud of e -commerce security situation is very grim through the network security event statistical analysis, and our country is lack of mature security management specification. As a result, strengthen the audit and management of e - commerce security issues of cloud is imperative. Cloud e - commerce security audit is a systems engineering. It is necessary to comb the security audit risk, and on this basis, design reasonable safety audit mode, set up scientific safety audit process mining platform, expand the audit strategy. Our ultimate aim is to inhibit related safety accidents based on the nature factors.
出处 《兰州学刊》 CSSCI 北大核心 2017年第5期173-186,共14页
基金 国家社会科学基金项目“基于大数据过程挖掘的‘互联网+’审计预警研究”的阶段性成果(项目编号:16BJY022)
关键词 互联网+ 电子商务 云平台 安全审计 数据挖掘 审计模式 internet plus electronic commerce cloud platform security audit data mining audit mode
  • 相关文献

参考文献12

二级参考文献110

  • 1李强,杨朝辉,闫伟.教育资源城域云共享模式研究[J].武汉大学学报(理学版),2012,58(S1):155-158. 被引量:3
  • 2江伟,陈龙,王国胤.用户行为异常检测在安全审计系统中的应用[J].计算机应用,2006,26(7):1637-1639. 被引量:13
  • 3罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 4中华人民共和国国家质量监督检验检疫总局.GB/T22239-2008信息安全技术信息系统安全等级保护基本要求[S].2008.
  • 5杨艳,陈性元,杜学绘.基于VPN的安全审计系统的设计与实现[J].计算机工程,2007,33(9):177-179. 被引量:5
  • 6Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 7Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 8Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 9Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 10Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.

共引文献1361

同被引文献91

引证文献6

二级引证文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部