期刊文献+

基于云计算技术的云存储生态系统研究 被引量:1

下载PDF
导出
摘要 云计算及其相关技术是计算机技术未来发展的必然趋势,本文首先对基于云计算技术的云生态系统及其运行机制做了简要介绍和分析,然后就云存储生态系统进行了重点研究,分别分析了其构建方案、构建内容以及所应用的关键技术。
机构地区 中南民族大学
出处 《消费电子》 2013年第10期93-93,共1页 Consumer Electronics Magazine
  • 相关文献

参考文献3

二级参考文献20

  • 1SONG D,WAGNER D,PERRIG A. Practical Techniques for Searches on Encrypted Data,Proceedings of the IEEE Symposium on Security and Privacy(S&P" 00), May 14 - 17,2000, Berkeley, CA, USA. Piscataway, N J, USA : IEEE, 2000 : 44 - 55. 被引量:1
  • 2BONEH D,CRESCENZO G,OSTROVSKY R,et al. Public Key Encryption With Keyword Search , Advances in Cryptology. - ceedings of the 23rd Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 04), May 2- 6,2004, Interlaken,Switzerland. LNCS 3027. Berlin,Germany: Springer-Verlag,2004 : 506- 522. 被引量:1
  • 3PARK D,KIM K,LEE P. Public Key Eneryption With Conjunctive Field Keyword Search,Proceedings of the 2004 Workshop on Information Security Applications (WISA'04) ,Oct 29- 31,2004, Wuhan,China. LNCS 3325. Berlin,Germany: Springer-Verlag, 2004 : 73- 86. 被引量:1
  • 4SWAMINATHAN AoMAO Y, SU G M, et al. Confidentiality-Preserving Rank-Ordered Search , Proceedings of the 2007 ACM Workshop on Storage Security and Survivability (StorageSS 07), Oct 29,2007, Alexandria, VA, USA. New York, NY, USA: ACM, 2007:7-12. 被引量:1
  • 5Damiani E,et al. Key management for multi-user encrypted databases ,Proc of the 2005 ACM Workshop on Storage Security and Survivability. New York: ACM, 2005 : 74- 83. 被引量:1
  • 6Kallahalla M,Riedel E, Swaminathan R, et al. Plutus-scalable secure file sharing on untrusted storage , Proc of the 2nd USENIX Conf on File and Storage Technologies (FAST). Berkeley: USENIX, 2003 : 29- 42. 被引量:1
  • 7Goh E,Shacham H,Modadugu N,et al. SiRiUS:Securing remote untrusted storage,NDSS. San Diego:ISOC,2003:131- 145. 被引量:1
  • 8Tian X,Wang X,Zhou A. DSP RE-encryption:A flexible mechanism for access control enforcement management in DaaS, Proc of IEEE Int Conf on Cloud Computing. Washington:IEEE,2009:25-32. 被引量:1
  • 9Vimereati S D C,Foresti S,Jajodia S, et al. Over-encryption: Management of access control evolution on outsoureed data, Proc of VLDB 2007. 2007 : 123- 134. 被引量:1
  • 10洪澄 张敏 冯登国.AB-ACCS一种云存储密文访问控制方法.计算机研究与发展,2010,47(1):259-265. 被引量:9

共引文献37

同被引文献2

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部