期刊文献+

云服务可信性量化模型研究

Research on Quantitative Model of Cloud Service Credibility
下载PDF
导出
摘要 针对目前云计算平台有可能被恶意利用及云服务提供商不被信任的问题,迫切地需要建立一个客观、有效的方法来评估云服务是否可信。已有的研究缺乏完善的云计算可信性测评框架和质量模型。基于典型的云服务应用,研究云平台可信性的指标体系,通过对可信性质量属性建模,建立云服务可信性量化评估模型,从而指导云服务可信性评估方法的建立。最后,给出了模型分析和应用模式,验证了所提出的模型的有效性。 In view of the problems that current cloud computing platform may be maliciously used and the cloud service providers may not be trusted, it is urgent to establish an objective and effective method to assess whether the cloud service is credible. However, there is no perfect credibility evaluation framework and evaluation model of cloud computing in the existing researches. Based on the typical cloud service application, the index system of cloud platform credibility is studied, and the quantitative evaluation model of cloud service credibility is established by modeling the quality attributes of credibility, so as to guide the establishment of cloud service credibility evaluation method. Finally, analysis and application modes are given to verify the effectiveness of the proposed model.
作者 朱茗 汪京培
出处 《电子产品可靠性与环境试验》 2017年第6期6-11,共6页 Electronic Product Reliability and Environmental Testing
关键词 云服务 可信性 质量属性 量化评估 cloud service credibility quality attribute quantitative assessment
  • 相关文献

参考文献4

二级参考文献118

  • 1沈昌祥,张焕国,王怀民,王戟,赵波,严飞,余发江,张立强,徐明迪.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-166. 被引量:248
  • 2李梦君,李舟军,陈火旺.基于进程代数安全协议验证的研究综述[J].计算机研究与发展,2004,41(7):1097-1103. 被引量:25
  • 3罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 4Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 5Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 6Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 7Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 8Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 9Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 10Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.

共引文献1096

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部