首页 | 本学科首页   官方微博 | 高级检索  
     检索      

云计算安全研究
引用本文:庄金莲,周志平.云计算安全研究[J].泉州师范学院学报,2014(2):96-99.
作者姓名:庄金莲  周志平
作者单位:龙岩学院数学与计算机科学学院,福建龙岩364012
基金项目:龙岩学院校立服务海西面上项目(LYXY2011071)
摘    要:为解决云计算平台的安全问题,对云计算的安全架构进行了系统的研究.针对云计算平台跨区域模糊边界、虚拟化服务、数据保密的安全威胁特点,从虚拟化技术、可信云计算、可信访问控制机制三个层面深入分析云计算安全框架,并提出云计算平台的安全策略与建议,满足云计算安全框架的建设需求.

关 键 词:云计算  虚拟化  可信云计算  可信访问控制  云计算安全框架

Research on Cloud Computing Security
ZHUANG Jin-lian,ZHOU Zhi-ping.Research on Cloud Computing Security[J].Journal of Quanzhou Normal College,2014(2):96-99.
Authors:ZHUANG Jin-lian  ZHOU Zhi-ping
Institution:( College of Mathematics and Computer Science, Longyan University, Fujian 364012, China)
Abstract:This paper systematically studied the security architecture of cloud computing, so as to solve the security problem of cloud computing platform. Security threats of cloud computing platform are characterized by the fuzzy boundary across the region, virtualization service and data security. According to the above characteristics, this thesis analyses detailedly the cloud computing security framework from the virtualization technology, the trusted cloud computing and the trusted access control mechanism, and puts forward the security strategies and suggestions of cloud computing to meet the construction demand of cloud computing security framework.
Keywords:cloud computing  virtualization  trusted cloud computing  trusted computing access controlcloud computing securily framework
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号