期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
对云计算安全服务问题的思考
1
作者 邱宏 《通讯世界(下半月)》 2015年第6期269-269,共1页
作为信息科技领域的热点话题,云计算应用中的安全服务问题受到社会公众的关注度越来越高。在计算机网络技术迅猛发展的同时,云计算安全服务问题日益突显。为此,本文结合云计算服务中存在的主要问题,思考了相关的安全防护技术。
关键词 云计算 安全服务问题 对策
下载PDF
数字图书馆云存储技术服务安全问题探讨 被引量:1
2
作者 李金建 《数字技术与应用》 2020年第2期191-191,193,共2页
在新时代,数字图书馆不仅是图书馆发展的必然趋势,同时也是全面提升图书馆馆藏资源的利用效率和价值的关键所在。因此,相关人员需要对云存储技术进行全面的研究分析,掌握其优势和特点之后,将其全面的引入数字图书馆当中。本文首先分析... 在新时代,数字图书馆不仅是图书馆发展的必然趋势,同时也是全面提升图书馆馆藏资源的利用效率和价值的关键所在。因此,相关人员需要对云存储技术进行全面的研究分析,掌握其优势和特点之后,将其全面的引入数字图书馆当中。本文首先分析了数字图书馆的云存储技术及其服务安全问题,然后分析了提升数字图书馆云存储技术服务安全的有效措施,希望能对相关的研究有所助益。 展开更多
关键词 数字图书馆 云存储技术 服务安全问题 探讨
下载PDF
MTBAC: A Mutual Trust Based Access Control Model in Cloud Computing 被引量:12
3
作者 LIN Guoyuan WANG Danru +1 位作者 BIE Yuyu LEI Min 《China Communications》 SCIE CSCD 2014年第4期154-162,共9页
As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure ... As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure the security of cloud computing.But applying traditional access control model into the Cloud directly could not solve the uncertainty and vulnerability caused by the open conditions of cloud computing.In cloud computing environment,only when the security and reliability of both interaction parties are ensured,data security can be effectively guaranteed during interactions between users and the Cloud.Therefore,building a mutual trust relationship between users and cloud platform is the key to implement new kinds of access control method in cloud computing environment.Combining with Trust Management(TM),a mutual trust based access control(MTBAC) model is proposed in this paper.MTBAC model take both user's behavior trust and cloud services node's credibility into consideration.Trust relationships between users and cloud service nodes are established by mutual trust mechanism.Security problems of access control are solved by implementing MTBAC model into cloud computing environment.Simulation experiments show that MTBAC model can guarantee the interaction between users and cloud service nodes. 展开更多
关键词 cloud computing access control trust model mutual trust mechanism MTBAC
下载PDF
A Survey of Security Issues in Cognitive Radio Networks 被引量:9
4
作者 LI Jianwu FENG Zebing +1 位作者 FENG Zhiyong ZHANG Ping 《China Communications》 SCIE CSCD 2015年第3期132-150,共19页
In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utili... In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utilization.However,there exist enormous challenges for the open and random access environment of CRNs,where the unlicensed secondary users(SUs) can use the channels that are not currently used by the licensed primary users(PUs) via spectrum-sensing technology.Because of this access method,some malicious users may access the cognitive network arbitrarily and launch some special attacks,such as primary user emulation attack,falsifying data or denial of service attack,which will cause serious damage to the cognitive radio network.In addition to the specifi c security threats of cognitive network,CRNs also face up to the conventional security threats,such as eavesdropping,tampering,imitation,forgery,and noncooperation etc..Hence,Cognitive radio networks have much more risks than traditional wireless networks with its special network model.In this paper,we considered the security threats from passive and active attacks.Firstly,the PHY layer security is presented in the view of passive attacks,and it is a compelling idea of using the physical properties of the radio channel to help provide secure wireless communications.Moreover,malicious user detection is introduced in the view of active attacks by means of the signal detection techniques to decrease the interference and the probabilities of false alarm and missed detection.Finally,we discuss the general countermeasures of security threats in three phases.In particular,we discuss the far reaching effect of defensive strategy against attacks in CRNs. 展开更多
关键词 CRNs security physical layer security security capacity active attacks passive attacks
下载PDF
Network Access Mechanisms and Security Issues under the Cloud Service Architecture
5
作者 Yonghua LIU 《International Journal of Technology Management》 2015年第6期98-100,共3页
Currently, under the cloud service architecture, the increasing importance of network security and security issues are still emerging. With the rapid development of the network platform, it is connected to the number ... Currently, under the cloud service architecture, the increasing importance of network security and security issues are still emerging. With the rapid development of the network platform, it is connected to the number and size of the trusted computing environment for all kinds of applications that are rapidly expanding, ever-changing network health, network time being emergencies, assault, failure, threat of disaster, its safety, survivability and availability of face serious challenges. Although TNC Working Group made safe and reliable framework from the network access layer, it is not at the level of user access, system access levels and further given the level of situational awareness and effective solutions. 展开更多
关键词 Cloud Services Access Mechanism SECURITY
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部