期刊文献+

云计算环境下的恶意代码解决方案研究

Research on the solution of malicious code in the cloud computing environment
原文传递
导出
摘要 从云计算环境下恶意代码解决方案特殊性分析入手,总结出面向云计算中服务器集群的3种解决方案及其优缺点,并提出相应的技术要求,最后指出轻代理和白名单可能会成为解决云计算环境恶意代码问题的重要技术措施。 Through particularity analysis of malicious code solutions in the cloud computing environment,three solutions and their advantages and disadvantages for cloud computing server clusters were summarized, the corresponding technical requirements were proposed. Finally, the point that light agents and whitelist could be the important measures to solve the malicious code problems in the cloud computing environment was indicated.
出处 《互联网天地》 2016年第5期49-52,共4页 China Internet
关键词 恶意代码 云计算 代理 虚拟机 malicious code cloud computing agent virtual machine
  • 相关文献

参考文献2

二级参考文献12

  • 1Jamil D, Zaki H. Cloud Computing Security[J]. International Journal of Engineering Science and Technology, 2011, 3(4): 3478- 3483. 被引量:1
  • 2Mowbray M, Pearson S. A Client-based Privacy Manager for Cloud Computing[C]//Proc. of the 4th International Conference on Communication System Software and Middleware. New York, USA: Association for Computing Machinery, 2009. 被引量:1
  • 3Pearson S. Taking Account of Privacy When Designing Cloud Cornputing Services[C]//Proc. of 2009 Workshop on Software Engineering Challenges of Cloud Computing. Washington D. C., USA: IEEE Computer Society, 2009. 被引量:1
  • 4Kang Z, Kumar A, Harrison T P, et al. Analyzing the Resilience of Complex Supply Network Topologies Against Random and Targeted Disruptions[J]. IEEE Systems Journal, 2011, 5(1): 28-39. 被引量:1
  • 5Masuda N, Konno N. Multi-state Epidemic Process on Complex Networks[J]. Theoretical Biology, 2006, 243(1): 64-75. 被引量:1
  • 6Hill A L. Emotions as Infectious Diseases in a Large Social Network: The SISa Model[J]. The Royal Society of London, 2010, 277(1701): 3827-3835. 被引量:1
  • 7Barabdsi A L, Albert R. Emergence of Scaling in Random Networks[J]. Science, 1999, 286(10): 509-512. 被引量:1
  • 8CSA. Security guidance for critical areas of focus in cloud comouting v2.1[EB/OL].http://www.Cloud security aliance.org/guidance,2010. 被引量:1
  • 9夏承遗,刘忠信,陈增强,袁著祉.复杂网络上带有直接免疫的SIRS类传染模型研究[J].控制与决策,2008,23(4):468-472. 被引量:35
  • 10陈龙,肖敏.云计算安全:挑战与策略[J].数字通信,2010,37(3):43-47. 被引量:13

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部