Netinfo Security ›› 2015, Vol. 26 ›› Issue (12): 28-33.doi: 10.3969/j.issn.1671-1122.2015.12.005
• Orginal Article • Previous Articles
Jikang WU1(), Xuhong YU1, Hong WANG2
Received:
2015-08-15
Online:
2015-12-20
Published:
2016-01-04
CLC Number:
Jikang WU, Xuhong YU, Hong WANG. Research on Security of Hybrid Cloud Based on Trusted Computing Technology[J]. Netinfo Security, 2015, 26(12): 28-33.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2015.12.005
[1] | WARD B T, STPIOR J C.The Internet Jurisdiction Risk of Cloud Computing[J]. Information Systems Management, 2010(27):334-339. |
[2] | 唐春明,郑晓龙. 云计算中一种对大群组用户的隐私保护公共审计方案[J]. 信息网络安全,2015(2):19-25. |
[3] | MACKAY M,BAKER T, Al-YASIRI A.Security-oriented Cloud Computing Platform for Critical Infrastructures[J]. Computer Law & Security Review, 2012(28):679-686. |
[4] | ZISSIS D, LEKKAS D.Addressing Cloud Computing Security Issues[J]. Future Generation Computer System, 2012(28):583-592. |
[5] | 马威,韩臻,成阳. 可信云计算中的多级管理机制研究[J]. 信息网络安全,2015(7):20-25. |
[6] | FIRDHOUS M, GHAZALI O, HASSAN S.Trust Management in Cloud Computing: A critical Review[J]. International Journal on Advances in ICT for Emerging Regions, 2011,4(2):24-36. |
[7] | DYKSTRA J, SHERMAN A T.Acquiring Forensic Evidence from Infrastructure-as-a-service Cloud Computing: Exploring and Evaluating Tools, Trust, and Techniques[J]. Digital Investigation, 2012(9):90-98. |
[8] | 张卓奇,郭卫斌.混合云存储环境下的数据访问隐私保护方案[J].计算机工程与设计,2015,35(7):2317-2320. |
[9] | 周艺华,蒿金志,赵航.混合云服务中的跨云际认证机制[J].计算机系统应用,2015(4):118-122. |
[10] | 郑周,张大军,李运发. 云计算中面向数据存储的安全访问控制机制[J]. 信息网络安全,2015(9):221-226. |
[11] | 陈克非,翁健.云计算环境下数据安全与隐私保护[J]杭州师范大学学报(自然科学版),2014,13(6):561-570. |
[12] | 吴遥,赵勇.可信云计算平台中外部信任实体的安全性研究[J].计算机仿真,2012,29(6):156-158. |
[1] | Zhiyan ZHAO, Xiaomo JI. Research on the Intelligent Fusion Model of Network Security Situation Awareness [J]. Netinfo Security, 2020, 20(4): 87-93. |
[2] | Min LIU, Shuhui CHEN. Research on VoLTE Traffic Based on Association Fusion [J]. Netinfo Security, 2020, 20(4): 81-86. |
[3] | Lingyu BIAN, Linlin ZHANG, Kai ZHAO, Fei SHI. Ethereum Malicious Account Detection Method Based on LightGBM [J]. Netinfo Security, 2020, 20(4): 73-80. |
[4] | Yifeng DU, Yuanbo GUO. A Dynamic Access Control Method for Fog Computing Based on Trust Value [J]. Netinfo Security, 2020, 20(4): 65-72. |
[5] | Zhizhou FU, Liming WANG, Ding TANG, Shuguang ZHANG. HBase Secondary Ciphertext Indexing Method Based on Homomorphic Encryption [J]. Netinfo Security, 2020, 20(4): 55-64. |
[6] | Rong WANG, Chunguang MA, Peng WU. An Intrusion Detection Method Based on Federated Learning and Convolutional Neural Network [J]. Netinfo Security, 2020, 20(4): 47-54. |
[7] | Xiaoli DONG, Shuai SHANG, Jie CHEN. Impossible Differential Attacks on 9-Round Block Cipher Rijndael-192 [J]. Netinfo Security, 2020, 20(4): 40-46. |
[8] | Chun GUO, Changqing CHEN, Guowei SHEN, Chaohui JIANG. A Ransomware Classification Method Based on Visualization [J]. Netinfo Security, 2020, 20(4): 31-39. |
[9] | Lu CHEN, Yajie SUN, Liqiang ZHANG, Yun CHEN. A Scheme of Measurement for Terminal Equipment Based on DICE in IoT [J]. Netinfo Security, 2020, 20(4): 21-30. |
[10] | Jinfang JIANG, Guangjie HAN. Survey of Trust Management Mechanism in Wireless Sensor Network [J]. Netinfo Security, 2020, 20(4): 12-20. |
[11] | Jianwei LIU, Yiran HAN, Bin LIU, Beiyuan YU. Research on 5G Network Slicing Security Model [J]. Netinfo Security, 2020, 20(4): 1-11. |
[12] | Peng LIU, Qian HE, Wangyang LIU, Xu CHENG. CP-ABE Scheme Supporting Attribute Revocation and Outsourcing Decryption [J]. Netinfo Security, 2020, 20(3): 90-97. |
[13] | Yubo SONG, Ming FAN, Junjie YANG, Aiqun HU. Multipath Solution and Blocking Method of Network Attack Traffic Based on Topology Analysis [J]. Netinfo Security, 2020, 20(3): 9-17. |
[14] | Tengfei WANG, Manchun CAI, Tianliang LU, Ting YUE. IPv6 Network Attack Source Tracing Method Based on iTrace_v6 [J]. Netinfo Security, 2020, 20(3): 83-89. |
[15] | Yi ZHANG, Hongyan LIU, Hequn XIAN, Chengliang TIAN. A Cloud Storage Encrypted Data Deduplication Method Based on Authorization Records [J]. Netinfo Security, 2020, 20(3): 75-82. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||