期刊文献+

基于等级保护基本要求的云计算安全研究 被引量:8

Research of Cloud Computing Security based on classified protection
下载PDF
导出
摘要 随着云计算的进一步推进和发展,云计算面临的安全问题变得越来越突出,特别是在云计算安全中的用户数据机密性、完整性和可用性方面尤为突出,云计算安全已经成为云计算推进过程中的首要障碍和难题。从云计算应用安全和系统安全两个层面,提出了云计算安全中应用安全和系统安全的威胁所在以及相应的基本保护要求。 With further promotion and development of cloud computing, the security problems faced by cloud computing are becoming more and more prominent, especially in user data confidentiality , integrity and availability , Cloud Computing Security is more prominent, Cloud Computing Security is becoming the primary obstacle and problems in the promoting process of cloud computing . At the two levels of applications security and system security of Cloud Computing , this paper proposes the locality of threat to application security and system security and protection requirements to these threats .
作者 朱圣才
出处 《微型机与应用》 2013年第14期3-6,10,共5页 Microcomputer & Its Applications
关键词 云计算 云安全 应用安全 系统安全 分类保护 Cloud Computing Cloud Security application security system security classified protection
  • 相关文献

参考文献10

  • 1CSA.云计算关键领域安拿指南V2.1[Z].2010. 被引量:1
  • 2中华人民共和国国家标准《信息系统安全等级保护基本要求》(GB/T22239:2008)[S].2008. 被引量:1
  • 3ENISA.云汁算合同安全服务水平监洲指南[Z].2012. 被引量:1
  • 4JOHN R, JAMES R. Cloud computing: implementation, management, and security[M]. Beijing:China Machine Press, 2010. 被引量:1
  • 5I RINGS T. GRABOWSKI J, SCHUIZ S. Grid and cloud computing: opportunities for integration with lhe next gen- eration Network[J]. Grid Computing, 2009(7) : 375-393. 被引量:1
  • 6Zhang Liangjie, Zhou Qun. CCOA: cloud computing opent architecture[C]. Proc of 2009 IEEE International Confer-/ence on Web Ser',ices, New Youk: IEEE Computer Society.Press, 2009:607-616. 被引量:1
  • 7YOUSEF L, BULRICO M, SILVA D. Toward a unified ontology of cloud computing[EB/OL].(2010-xx-xx)[2013- 01 - 10 ] http ://www. collabogce, org/gce08/images / 7/76 / Lamia Yousef. pdf. 被引量:1
  • 8冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1069
  • 9陈尚义.浅谈云计算安全问题[J].网络安全技术与应用,2009(10):20-22. 被引量:28
  • 10李玮.云计算安全问题研究与探讨[J].电信工程技术与标准化,2012,25(4):44-49. 被引量:14

二级参考文献27

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/. 被引量:1
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home. 被引量:1
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org. 被引量:1
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7. 被引量:1
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396. 被引量:1
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11]. 被引量:1
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf. 被引量:1
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009. 被引量:1
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009. 被引量:1

共引文献1098

同被引文献33

引证文献8

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部