期刊文献+

云计算技术环境下计算机网络安全分析 被引量:5

Analysis of Computer Network Security in the Environment of Cloud Computing Technology
下载PDF
导出
摘要 随着云计算时代的到来,数据信息虚拟化技术应运而生,缓解了企业服务器的压力,提高了高科技的应用。在此基础上,以云计算技术为切入点,探讨了云计算环境下互联网建设的安全措施。指出了当前电子计算机网络信息安全的不足,探讨了建立网络信息安全对策的途径。 With the advent of the era of cloud computing, data information virtualization technology emerges at the right moment, alleviates the pressure of enterprise server, improves the application of high-tech. On this basis, the cloud computing technology as the entry point, discusses the security measures of Internet construction under the cloud computing environment This paper points out the deficiency of the current electronic computer network information security, and probes into the way to establish the network information security countermeasures.
作者 李芳 LI Fang(Wuhan Polytechnic,Hubei Wuhan 430074)
出处 《长江信息通信》 2022年第5期153-155,共3页 Changjiang Information & Communications
关键词 云计算技术 计算机网络 安全保护系统 cloud computing technology computer network security protection system
  • 相关文献

参考文献6

二级参考文献46

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1095

同被引文献16

引证文献5

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部