期刊文献+

云计算安全对策研究 被引量:8

A Study of Countermeasure for Cloud Security
在线阅读 下载PDF
导出
摘要 云计算的安全问题是制约和影响云计算发展及应用的关键问题。从云计算的基本概念入手,介绍了云计算安全的发展现状和几种典型的云安全体系架构,结合3种云服务模式分析得出云计算安全目标,针对这些安全目标提出了相应的对策和思路,并且重点探讨了基于可信计算的云计算安全。 Cloud security is a key issue that restricts the development of cloud computing.This paper introduced basic concepts and related work in cloud security study,as well as several classic cloud security architecture.It analyzed three types of cloud service model and verified goals of cloud security.Corresponding countermeasures were put forward,and cloud security based on trusted computing was the high spot.
作者 江雪 何晓霞
出处 《微型电脑应用》 2014年第2期30-34,共5页 Microcomputer Applications
关键词 云计算 信息安全 安全体系架构 可信计算 Cloud Computing Information Security Security Architecture Trusted Computing
  • 相关文献

参考文献20

  • 1Mell P, Grance T. The NIST Definition of Cloud Compu- ting. National Institute of Standards and Technology, [C]Information Technology Laboratory, 2009.
  • 2Cloud Security Alliance. Security Guidance for Critical Areas of Focus in Cloud Computing V3.0. [C]The Cloud Security Appliance, 2011.
  • 3FORUM J. Cloud cube model: selecting cloud formations for secure collaboration[EB/OL], http://www.opengroup.org/jericho/cloud_cube_model_vl .0.pdf2012,1,11.
  • 4Elangop S, Dusseauaetal A. Deploying virtual machines as sandboxes for the grid. USENIX Association Proceed- ings of the 2nd Workshop on Real, [C]Large Distributed Systems. San Francisco, USA, 2005: 7-12.
  • 5Raj H, Nathuji R, Singh A, England P. Resource man agement for isolation enhanced cloud services. Proceed] ings of the 2009 ACM Workshop on Cloud Computin Security. New York, USA, 2009: 77-84. |.
  • 6Gong L, Qian XL. Computational issues in secure inte- roperation. [J]IEEE Transactions on Software and Engi- neering, 1996, 22(1): 43-52.
  • 7Bonatti P, Vimercati SC, Samarati P. An algebra for composing access control policies. [J]ACM Transactions on Information and System Security, 2002, 5(1): 1-35.
  • 8Wijesekera D, Jajodia S. A propositional policy algebra for access control. [J]ACM Transactions on Informationand System Security, 2003,6(2):286-325.
  • 9Agarwal S, Sprick B. Access control for semantic Web services. [C]Proceedings of the IEEE International Con- ference on Web Services. San Diego, USA, 2004: 770-773.
  • 10Shafiq B, Joshi JBD, Bertino E, GhafoorA. Secure inte- roperation in a multidomain environment employing RBAC policies. [G] IEEE Transactions on Knowledge and Data Engineering, 2005,17(11): 1557-1577.

同被引文献26

引证文献8

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部