期刊文献+

电信业务云的安全体系架构与关键技术研究 被引量:3

Study on Security Architecture and Key Technologies for Telecommunication Business Cloud
下载PDF
导出
摘要 云计算的快速发展带来了新的安全问题,文章从物理环境、硬件资源、虚拟资源、管理平台、服务与应用五个层面解析电信业务云面临的安全威胁和需求,提出基于"云、管、端"模型的云计算安全体系架构,同时从用户域、网络域、服务域、监管域分别解析每个域涉及到的关键技术与方法。 The rapid development of cloud computing leads to some new security problems. This paper analyzes the securitythreats and demands of telecommunications business cloud from five levels, including physical environment, hardwareresources, virtual resources, management platforms, services and applications. Then it presents a security architecturebased on the model of cloud, pipeline and terminal. It introduces the key technologies and methods in user domain, networkdomain, service domain and regulatory domain.
出处 《信息通信技术》 2014年第1期40-45,共6页 Information and communications Technologies
关键词 云计算安全 体系架构 关键技术 Cloud Computing Security Security Architecture Key Technologies
  • 相关文献

参考文献9

二级参考文献147

  • 1马冠骏,许胤龙,林明宏,宣颖.基于网络编码的P2P内容分发性能分析[J].中国科学技术大学学报,2006,36(11):1237-1240. 被引量:14
  • 2Michael Miller姜进磊,孙瑞志,向勇等译.云计算[M].北京:机械出版社.2009. 被引量:34
  • 3MICHAEL ARMBRUST, ARMANDO FOX, REAN GRIFFITH, et al. Above the Clouds: A Berkeley View of Cloud. Technical Report No. UCB/EECS-2009-28.http://www.eecs.berke~ey.edu/Pubs/TechRpts/2009/EECS-2009-28.html. 被引量:1
  • 4BRIAN HAYES. Cloud computing[J]. Communications of the ACM, 2008, 51 (7): 9-11. 被引量:1
  • 5Weatherspoon H Kubiatowicz J. Erasure coding vs. replication: A quantitative comparison[J]. Peer-to-Peer Systems, 2002, 2429: 328-337. 被引量:1
  • 6Bhagwan R, Moore D, Savage S, et al. Replication strategies for highly available peer-to-peer storage[J]. Future directions in distributed computing: research and position papers, 2003, 2584: 153-158. 被引量:1
  • 7Wu Ji-Yi, Zhang Jian-Lin, Wang Tong, et al. Study on Redundant Strategies in Peer to Peer Cloud Storage Systems[J]. Applied Mathematics & Information Sciences, 2011, 5(2): 235-242. 被引量:1
  • 8Ahlswede R, Cai Ning, Li S Y, et al. Network information flow[J]. Information Theory, IEEE Transactions on, 2000, 46(4): 1204-1216. 被引量:1
  • 9Aceda fi ski S, Deb S, M dard M, et al. How good is random linear coding based distributed networked storage[EB/OL], http://www.netcod. org/papers/11AcedanskiDMK-final.pdf, [2005-03- 07] .2012-03-06. 被引量:1
  • 10Dimakis A.G, Godfrey P.B, Wu Y, et al. Network coding for distributed storage systems[J]. InformationTheory, IEEE Transactions on, 2010, 56(9): 4539-4551. 被引量:1

共引文献887

同被引文献25

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部