期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
ISP可能是企业安全维护的最佳选择
1
作者 唐慧 《电子与金系列工程信息》 2003年第1期34-35,共2页
如果一个企业用户自己做日常的安全维护工作,那么可能会由于不够专业带来安全性没有保证;如果找一家专业的安全服务商,那么他们可能又觉得不够放心。如何在这种“安全性”与“安全心”间找到一个最佳平衡点?专业人士指出——ISP可能... 如果一个企业用户自己做日常的安全维护工作,那么可能会由于不够专业带来安全性没有保证;如果找一家专业的安全服务商,那么他们可能又觉得不够放心。如何在这种“安全性”与“安全心”间找到一个最佳平衡点?专业人士指出——ISP可能是最佳选择。 展开更多
关键词 ISP 安全维护 安全服务商 企业网 管理安全服务 NTT DATA
下载PDF
PKI、双赢与专业——访TrustAsia首席执行官Seth Jutan
2
作者 Celia 《计算机》 2002年第21期37-37,共1页
计算机周刊:TrustAsia作为亚太地区领先的网络安全服务商,拥有网络身份辨认、网络支付和网络安全的技术,该技术不仅能够帮助个人及企业用户建立自有的网络领域,而且能令其安全地检查进行交易和传送信息。TrustAsia所提供的公钥加密技术(... 计算机周刊:TrustAsia作为亚太地区领先的网络安全服务商,拥有网络身份辨认、网络支付和网络安全的技术,该技术不仅能够帮助个人及企业用户建立自有的网络领域,而且能令其安全地检查进行交易和传送信息。TrustAsia所提供的公钥加密技术(PKI)和支付服务早已在全球诸多行业有着实战经验。 展开更多
关键词 TrustAsia公司 网络安全服务商 Seth Jutan PKI 公钥加密技术 企业文化 销售业绩
下载PDF
Secure Big Data Storage and Sharing Scheme for Cloud Tenants 被引量:10
3
作者 CHENG Hongbing RONG Chunming +2 位作者 HWANG Kai WANG Weihong LI Yanyan 《China Communications》 SCIE CSCD 2015年第6期106-115,共10页
The Cloud is increasingly being used to store and process big data for its tenants and classical security mechanisms using encryption are neither sufficiently efficient nor suited to the task of protecting big data in... The Cloud is increasingly being used to store and process big data for its tenants and classical security mechanisms using encryption are neither sufficiently efficient nor suited to the task of protecting big data in the Cloud.In this paper,we present an alternative approach which divides big data into sequenced parts and stores them among multiple Cloud storage service providers.Instead of protecting the big data itself,the proposed scheme protects the mapping of the various data elements to each provider using a trapdoor function.Analysis,comparison and simulation prove that the proposed scheme is efficient and secure for the big data of Cloud tenants. 展开更多
关键词 cloud computing big data stor-age and sharing security
下载PDF
A Retrievable Data Perturbation Method Used in Privacy-Preserving in Cloud Computing 被引量:3
4
作者 YANG Pan 《China Communications》 SCIE CSCD 2014年第8期73-84,共12页
With the increasing popularity of cloud computing,privacy has become one of the key problem in cloud security.When data is outsourced to the cloud,for data owners,they need to ensure the security of their privacy;for ... With the increasing popularity of cloud computing,privacy has become one of the key problem in cloud security.When data is outsourced to the cloud,for data owners,they need to ensure the security of their privacy;for cloud service providers,they need some information of the data to provide high QoS services;and for authorized users,they need to access to the true value of data.The existing privacy-preserving methods can't meet all the needs of the three parties at the same time.To address this issue,we propose a retrievable data perturbation method and use it in the privacy-preserving in data outsourcing in cloud computing.Our scheme comes in four steps.Firstly,an improved random generator is proposed to generate an accurate "noise".Next,a perturbation algorithm is introduced to add noise to the original data.By doing this,the privacy information is hidden,but the mean and covariance of data which the service providers may need remain unchanged.Then,a retrieval algorithm is proposed to get the original data back from the perturbed data.Finally,we combine the retrievable perturbation with the access control process to ensure only the authorized users can retrieve the original data.The experiments show that our scheme perturbs date correctly,efficiently,and securely. 展开更多
关键词 PRIVACY-PRESERVING data perturbation RETRIEVAL access control cloudcomputing
下载PDF
Towards Efficient and Secure Access Control System for Mobile Cloud Computing 被引量:5
5
作者 TU Shanshan HUANG Yongfeng 《China Communications》 SCIE CSCD 2015年第12期43-52,共10页
This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud infrastructure.This middle layer is composed of cloudlets which are deployed ... This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud infrastructure.This middle layer is composed of cloudlets which are deployed by cloud services providers,such as wireless network access points(APs),to improve the performance of mobile cloud servicesand be different from traditional mobile operator mode.Then based on this new architecture.we improve our previous(Attribute-basedencryption) ABE access control scheme on cloud for mobile cloud,which is proposed to offload the main amount of computations to the cloudlet as the function of cloud.Simulationresults demonstratethe new access control scheme takes into consideration response time constraints and network statusof access task execution,while satisfying certain network security for mobile cloud. 展开更多
关键词 cloud execution constraints partition encryption Encryption satisfying assume posed visualization
下载PDF
Stumbling Blocks in Cloud Computing Adoption Pathway: A Charter
6
作者 Devesh Kumar Harsh Vardhan Samalia +1 位作者 Piyush Verma Hergovind Singh 《Computer Technology and Application》 2013年第12期635-642,共8页
Cloud computing is currently an embryonic domain in the area of information technology that possesses the power of transforming the way information technology (IT) services are delivered and maintained in the busine... Cloud computing is currently an embryonic domain in the area of information technology that possesses the power of transforming the way information technology (IT) services are delivered and maintained in the business world. Pay as per the usage kind of cost structure coupled with delivery of computing services through internet makes cloud computing an exciting and potential growth oriented information technology model compared with conventional computing services delivery models. Various additional features like scalability, flexibility and easy deployment process creates a window for the organizations even relatively smaller in size to get benefitted by the highly advanced & modern technologies without incurring substantial cost. In spite of so many benefits of this new delivery model, concerns are beginning to grow about how safe an environment it is. Despite of all the hype surrounding the cloud, enterprise customers are still reluctant to deploy their business in the cloud. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. Other related concerns associated with the adoption of cloud computing include trust on service providers, loss of control and compliance issues. This paper is an attempt to explore security & trust issues linked with cloud computing adoption in the Small and Medium Enterprises (SME) sector. 展开更多
关键词 Cloud computing PRIVACY security and SME.
下载PDF
信息安全建设应该以什么为核心? 被引量:1
7
作者 沈继业 《信息安全与通信保密》 2002年第9期18-19,共2页
信息安全建设应该以什么为核心?信息安全建设应该以什么为核心?有人说应该以密码算法为核心,因为采用密码来保护整个系统的安全,成本低廉且效果明显;有人说应该以防火墙为核心,因为防火墙是门户,守好大门最重要;也有人说应该以IDS(入侵... 信息安全建设应该以什么为核心?信息安全建设应该以什么为核心?有人说应该以密码算法为核心,因为采用密码来保护整个系统的安全,成本低廉且效果明显;有人说应该以防火墙为核心,因为防火墙是门户,守好大门最重要;也有人说应该以IDS(入侵检测系统)为核心,因为IDS才能动态监测入侵企图…… 展开更多
关键词 信息安全 核心 安全服务商 安全管理
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部