期刊文献+

云计算技术在工程设计中的应用探讨 被引量:2

Application of Cloud Computing Technology in Engineering Design
下载PDF
导出
摘要 随着社会的发展和进步,网络技术已实现了飞速发展,云计算技术作为信息时代的产物,在很大程度上改变了传统工作模式和方法,为各行业带来了新的发展方向。本文将主要以网络机房工程设计为例对云计算技术在工程设计中的应用进行探讨和分析,以期能为相关从业者带来一些帮助和启发。 With the development and progress of society,network technology has achieved rapid development.Cloud computing technology,as a product of the information age,has been widely used in many fields.It has changed the traditional working mode and method to a great extent,and brought new development direction for all industries.In this paper,the application of cloud computing technology in engineering design will be discussed and analyzed with the example of network computer room engineering design,in order to bring some help and inspiration to relevant practitioners.
作者 曹宏亮 CAO Hong-liang(China Light Industry Guangzhou Engineering Co.,Ltd.,Guangzhou Guangdong 511447)
出处 《数字技术与应用》 2019年第7期228-228,230,共2页 Digital Technology & Application
关键词 云计算技术 工程设计 应用探讨 cloud computing technology engineering design application discussion
  • 相关文献

参考文献2

二级参考文献40

  • 1刘正伟,文中领,张海涛.云计算和云数据管理技术[J].计算机研究与发展,2012,49(S1):26-31. 被引量:170
  • 2罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 3王庆波,金漳,何乐,等.虚拟化与云计算[M].北京:电子工业出版社,2010.
  • 4Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 5Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 6Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 7Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 8Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 9Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 10Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.

共引文献1084

同被引文献11

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部