期刊文献+

云计算的安全模型和策略分析 被引量:9

Analyze the Security Model and Policy of Cloud Computing
下载PDF
导出
摘要 云计算作为当前信息领域研究的一个热点,以IBM为首的全球各大知名企业和研究机构及政府等各界都十分关注。它在提高各种资源的利用率的同时,也给信息安全与隐私方面带来了很大的安全隐患和挑战。该文在介绍云计算的基本概念基础上,对云计算下的安全模型和策略所面临的挑战进行了分析。 Cloud Computing is currently a hot spot of information industry.On the hand,it brings about not only convenience and efficiency problems,but also great challenges in the field of information security and privacy protection.This paper is to introduce the basic concept,and analyze the challenges of security model and policy in cloud computing.
作者 刘楷华 李雄
出处 《电脑知识与技术(过刊)》 2011年第3X期1750-1751,共2页 Computer Knowledge and Technology
关键词 云计算 安全模型 安全策略 云计算模型 信息安全 cloud computing security model security policy cloud model information security
  • 相关文献

参考文献2

二级参考文献24

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1066

同被引文献60

  • 1吴珍.漫步云端——探秘云安全[J].信息安全与通信保密,2008(11):16-18. 被引量:11
  • 2葛慧.云计算的信息安全[J].硅谷,2009,2(2):42-43. 被引量:14
  • 3郝文江.云计算与信息安全[J].城市与减灾,2010(4):12-15. 被引量:6
  • 4张庆华.云存储技术在视频监控中的应用与发展[J].中国公共安全,2013(20):190-194. 被引量:2
  • 5孙威民.全球大型互联网和云计算服务提供商安全漏洞[EB/OL].http://it.shin.com.cn/network/185879/781081174777.shtml.2011-04-01.
  • 62010技术回顾:云安全将成为复合型技术[EB/OL].http://www.chinacloud.cn/show.aspx?id=5406&cid=14,2010-12-26.
  • 7菲菲.云安全新概念:解读云安全2.0技术[J].电脑知识与术,2009,(10):56-58.
  • 8那罡.保卫云端[N].中国计算机报,2011-01-03(35).
  • 9CSA. Security Guidance for Critical Areas of Focus in Cloud Computing V3.0[OL].htt ps://downloads.cloudsecurityalliance.org/initiatives/guidance/csaguide.v3.0.pdf,.
  • 10CSA. Cloud Controls Matrix Version 3.0[OL].https://cloudsecurityalliance.org/download/cloud-controls-mat rix-v3/,.

引证文献9

二级引证文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部