期刊文献+

云计算时代不同类型企业的数据安全措施研究

Analysis of Data Security Measures for Different Types of Enterprises in the Cloud Computing Era
下载PDF
导出
摘要 为了保证云计算时代企业的数据安全,根据企业类型设计合理的数据安全措施是非常有必要的。本文采用文献分析法总结了现有数据安全技术,对比分析不同类型的企业的数据保护措施的区别,同时提出相应的数据安全建议。 In order to ensure the data security of enterprises in the era of cloud computing,it is necessary to design reasonable data security measures according to the type of enterprise.This article uses literature analysis to summarize existing data security technologies,compare and analyze the differences in data protection measures among different types of enterprises,and propose corresponding data security recommendations.
作者 王泽贤 WANG Zexian(College of Arts and Sciences,Jiangsu Aviation Vocational and Technical College,Zhenjiang,China,212000)
出处 《福建电脑》 2024年第11期39-44,共6页 Journal of Fujian Computer
基金 江苏航空职业技术学院院级重点课题(No.JATC22010108)资助。
关键词 企业数据安全 加密技术 数据保护措施 Enterprise Data Security Encryption Technology Data Protection Measures
  • 相关文献

参考文献3

二级参考文献68

  • 1SHAMIR A. Identity-Based Cryptosystems and Signature Schemes[C]// BLAKLEY G, CHAUM D. Advances in Cryptology. Lecture Notes in Com- puter Science, vol. 196, Berlin: Springer Berlin Heidelberg. 1985: 47-53.
  • 2BAEK J, SAFAVI-NAIN] R, SUSILO W. Public Key Encryption with Keyword Search Revisited[M]// GERVASI O, MURGANTE B, LAGAN A, et al. Computational Science and Its Applications ICCSA 2008. Lecture Notes in Computer Sci- ence, vol. 5072. Berlin: Springer Berlin / Heidel-berg. 2008: 1249-1259.
  • 3RHEE H S, PARK J H, SUSILO W, et al. Trapdoor security in a searchable public-key encryption scheme with a designated tester[J]. Journal of Systems and Software, 2010, 83(5): 763-771.
  • 4RHEE H S, PARK J H, LEE D H. Generic construc- tion of designated tester public-key encryption with keyword search[J]. Information Sciences, 2012, 205(0): 93-109.
  • 5XU Peng, JIN Hai, WU Qianhong, et al. Pub- lic-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack[J]. Computers, IEEE Transac- tions on, 2012, 62(11): 2266-2277.
  • 6AL-RIYAMI S, PATERSON K. Certificateless Public Key Cryptography[M]// LAIH C S. Advances in Cryptology - ASIACRYPT 2003. Lecture Notes in Computer Science, vol. 2894. Berlin: Springer Berlin / Heidelberg. 2003: 452-473.
  • 7DENT A. A survey of certificateless encryption schemes and security models[J], internation- al Journal of Information Security, 2008, 7(5): 349-377.
  • 8BARBOSA M, FARSHIM P. Certificateless sign- cryption[C]// Proceedings of the 2008 ACM symposium on Information, computer and communications security. Tokyo, Japan: ACM. 2008: 369-372.
  • 9WANG Fengjiao, ZHANG Yuqing. A new prov- ably secure authentication and key agreement mechanism for SIP using certificateless pub- lic-key cryptography[J]. Computer Communica- tions, 2008, 31(10): 2142-2149.
  • 10CATALANO D, FIORE D, GENNARO R. Certif- icateless onion routing[C]// Proceedings of the 16th ACM conference on Computer and communications security. Chicago, ll]inois, USA: ACM. 2009: 151-160.

共引文献135

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部