期刊文献+

有线电视行业的云安全运维服务 被引量:1

Operation Service of Cloud Computing Security in Wired Television Industry
下载PDF
导出
摘要 云计算的出现为有线电视行业提供了优秀的基础计算设施,但云计算引入的新计算和服务模式也为云环境中业务系统的安全运维服务带来了新挑战。有线电视的业务系统对安全的敏感性使得安全运维服务在云计算中显得尤为重要。基于这一问题,提出了一种适应于有线电视行业的云安全运维服务框架,并详细阐述了该框架下安全运维服务的内容。 Cloud computing provides an outstanding basic computing facility for the wired television industry. But the new computing and service model of cloud computing also brings new challenges of security operation service in the television's cloud business environment.The operation service security is very important for the television system because of its sensibility of security and complexity.Based on this problem, a cloud security operation service framework is proposed for wired television industry and the detail contents of this framework are described.
作者 李学乔
出处 《中国有线电视》 2016年第S1期380-383,共4页 China Digital Cable TV
关键词 云安全 有线电视 运维服务 安全策略 cloud security Cable TV operation service security strategy
  • 相关文献

参考文献3

二级参考文献35

  • 1蒋青泉.基础电信网络容灾技术的研究与应用[J].长沙通信职业技术学院学报,2004,3(4):12-16. 被引量:1
  • 2武波.从灾备等级划分到方案选择[J].金融电子化,2004(9):67-68. 被引量:1
  • 3罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 4Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 5Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 6Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 7Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 8Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 9Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 10Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.

共引文献1069

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部