期刊文献+

信息系统数据自动备份技术研究 被引量:2

Automated Information System Data Backup Technology Research
下载PDF
导出
摘要 随着信息技术的不断发展和完善,现代社会日益依赖于信息数据,一旦数据损坏或者丢失就可能会造成难以估量的损失。因此,采用数据自动备份技术保护信息系统中的数据安全,已经成为了信息系统研究发展的重要方向。该研究中,在对信息系统自动备份与恢复业务流程进行分析的基础上,对信息系统数据自动备份的完全备份、差分备份以及数据恢复功能的具体设计和实现进行研究。 With the continuous development and improvement of information technology, modern society is increasingly dependent on information and data, once the data may be damaged or lost incalculable loss. Therefore, the data using automatic data backup technology to protect the security of information systems has become an important direction of research and development of information systems. The study, carried out research on the specific design and implementation of information systems-based automatic backup and recovery business process analysis, information systems for automatic data backup full backup, differential backup and data recovery functions.
作者 林晓君
出处 《电脑知识与技术(过刊)》 2014年第3X期1637-1641,1646,共6页 Computer Knowledge and Technology
关键词 信息系统 数据备份 完全备份 差分备份 数据恢复 information systems data backup full backup differential backup data recovery
  • 相关文献

参考文献2

二级参考文献45

  • 1王树鹏,云晓春,余翔湛,胡铭曾.容灾的理论与关键技术分析[J].计算机工程与应用,2004,40(28):54-58. 被引量:57
  • 2Bhagwat D,Pollack K,Long DDE,Schwarz T,Miller EL,P-ris JF.Providing high reliability in a minimum redundancy archival storage system.In:Proc.of the 14th Int'l Symp.on Modeling,Analysis,and Simulation of Computer and Telecommunication Systems (MASCOTS 2006).Washington:IEEE Computer Society Press,2006.413-421.
  • 3Zhu B,Li K.Avoiding the disk bottleneck in the data domain deduplication file system.In:Proc.of the 6th Usenix Conf.on File and Storage Technologies (FAST 2008).Berkeley:USENIX Association,2008.269-282.
  • 4Bhagwat D,Eshghi K,Mehra P.Content-Based document routing and index partitioning for scalable similarity-based searches in a large corpus.In:Berkhin P,Caruana R,Wu XD,Gaffney S,eds.Proc.of the 13th ACM SIGKDD Int'l Conf.on Knowledge Discovery and Data Mining (KDD 2007).New York:ACM Press,2007.105-112.
  • 5You LL,Pollack KT,Long DDE.Deep store:An archival storage system architecture.In:Proc.of the 21st Int'l Conf.on Data Engineering (ICDE 2005).Washington:IEEE Computer Society Press,2005.804-815.
  • 6Quinlan S,Dorward S.Venti:A new approach to archival storage.In:Proc.of the 1st Usenix Conf.on File and Storage Technologies (FAST 2002).Berkeley:USENIX Association,2002.89-102.
  • 7Sapuntzakis CP,Chandra R,Pfaff B,Chow J,Lam MS,Rosenblum M.Optimizing the migration of virtual computers.In:Proc.of the 5th Symp.on Operating Systems Design and Implementation (OSDI 2002).New York:ACM Press,2002.377-390.
  • 8Rabin MO.Fingerprinting by random polynomials.Technical Report,CRCT TR-15-81,Harvard University,1981.
  • 9Rivest R.The MD5 message-digest algorithm.1992.http://www.python.org/doc/current/lib/module-md5.html.
  • 10U.S.National Institute of Standards and Technology (NIST).Federal Information Processing Standards (FIPS) Publication 180-1:Secure Hash Standard.1995.http://www.itl.nist.gov/fipspubs/fip180-1.htm.

共引文献122

同被引文献10

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部