期刊文献+

如何应用云计算构建电力信息系统数据安全技术 被引量:1

How cloud computing power to build information systems data security technology
下载PDF
导出
摘要 本文希望研究电力企业通过应用云计算来提高信息系统安全的一些情况,希望了解电力信息系统对数据的安全性的要求以及对电力信息系统数据安全中运用私有云技术的情况进行分析,从而总结提出一些企业在运用云计算时采取的非技术方式,希望可以为电力企业更好更快的发展提供一定的建议和借鉴。 This paper aims to examine some cases electricity companies to improve information system security through the application of cloud computing,We want to know the power of information systems data security requirements and the situation of electric power information system data security in the use of private cloud technology to analyze,Thus proposed non-technical summary of the way some companies in the use of cloud computing take,Hope can provide some suggestions and reference for the power companies to better and faster development.
出处 《电子测试》 2016年第6X期99-100,共2页 Electronic Test
关键词 云计算 电力 安全 cloud computing electricity Safety
  • 相关文献

参考文献3

二级参考文献19

  • 1杨明芳,袁曦临.云计算环境下的数字图书馆[J].图书馆建设,2009(9):7-9. 被引量:104
  • 2Crampton J, Martin K, Wild P. On key assignment for hierarchical access control[M]. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 3Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcingIM]. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Cone Sandton: Springer-Verlag,2007. 385-396.
  • 4Goyal V, Pandey A, Sahai A, Waters B. Attribute-Based encryption for fine-grained access control of encrypted data[M]. In: Juels A, Wright RN, Vimercati SDC, eds. Proc. of the 13th ACM Conf. on Computer and Communications Security, CCS 2006. Alexandria: ACM Press, 2006. 89-98.
  • 5Bowers KD, Juels A, Oprea A. implementation[C]. In: Sion R, ed. Proofs of retrievability: Theory and Proc. of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009, Co-Located with the 16th ACM Computer and Communications Security Conf., CCS 2009. New York: Association for Computing Machinery, 2009.43-54.
  • 6Elangop S, Dusseauaetal A. Deploying virtual machines as sandboxes for the grid[C]. In: Karp B, ed. USENIX Association Proc. of the 2nd Workshop on Real, Large Distributed Systems. San Francisco, 2005.7-12.
  • 7Gartner. Cloud Computing Will Be As Influential As E-business[EB/ OL]. Gartner.com, 2010-08-22/2011-07-01.
  • 8Gruman, Galen. What cloud computing really means[EB/OL]. InfoWorld, 2008-04-07/2009-06-02.
  • 9Rivest R, Adleman L, Dertouzos M. On data banks and privacy homomorphisms[M]. In Foundations of Secure Computation, 1978.169-180.
  • 10Gntry C. Fully homomorphic encryption using ideal lattices[M]. In: Mitzenmacher M, ed. Proc. of the 2009 ACM Int'l Syrup. On Theory, of Computing. New York: Association for Computing Machinery, 2009. 169-178.

共引文献28

同被引文献3

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部