Netinfo Security ›› 2015, Vol. 15 ›› Issue (12): 28-33.doi: 10.3969/j.issn.1671-1122.2015.12.005
Previous Articles Next Articles
WU Jikang1(), YU Xuhong1, WANG Hong2
Received:
2015-08-15
Online:
2015-12-20
Published:
2016-01-04
CLC Number:
WU Jikang, YU Xuhong, WANG Hong. Research on Security of Hybrid Cloud Based on Trusted Computing Technology[J]. Netinfo Security, 2015, 15(12): 28-33.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2015.12.005
[1] | WARD B T, STPIOR J C.The Internet Jurisdiction Risk of Cloud Computing[J]. Information Systems Management, 2010(27):334-339. |
[2] | 唐春明,郑晓龙. 云计算中一种对大群组用户的隐私保护公共审计方案[J]. 信息网络安全,2015(2):19-25. |
[3] | MACKAY M,BAKER T, Al-YASIRI A.Security-oriented Cloud Computing Platform for Critical Infrastructures[J]. Computer Law & Security Review, 2012(28):679-686. |
[4] | ZISSIS D, LEKKAS D.Addressing Cloud Computing Security Issues[J]. Future Generation Computer System, 2012(28):583-592. |
[5] | 马威,韩臻,成阳. 可信云计算中的多级管理机制研究[J]. 信息网络安全,2015(7):20-25. |
[6] | FIRDHOUS M, GHAZALI O, HASSAN S.Trust Management in Cloud Computing: A critical Review[J]. International Journal on Advances in ICT for Emerging Regions, 2011,4(2):24-36. |
[7] | DYKSTRA J, SHERMAN A T.Acquiring Forensic Evidence from Infrastructure-as-a-service Cloud Computing: Exploring and Evaluating Tools, Trust, and Techniques[J]. Digital Investigation, 2012(9):90-98. |
[8] | 张卓奇,郭卫斌.混合云存储环境下的数据访问隐私保护方案[J].计算机工程与设计,2015,35(7):2317-2320. |
[9] | 周艺华,蒿金志,赵航.混合云服务中的跨云际认证机制[J].计算机系统应用,2015(4):118-122. |
[10] | 郑周,张大军,李运发. 云计算中面向数据存储的安全访问控制机制[J]. 信息网络安全,2015(9):221-226. |
[11] | 陈克非,翁健.云计算环境下数据安全与隐私保护[J]杭州师范大学学报(自然科学版),2014,13(6):561-570. |
[12] | 吴遥,赵勇.可信云计算平台中外部信任实体的安全性研究[J].计算机仿真,2012,29(6):156-158. |
[1] | HUANG Wangwang, ZHOU Hua, WANG Daiqiang, ZHAO Qi. Design of Reconfigurable Key Security Authentication Protocol for IoT Based on National Cryptography SM9 [J]. Netinfo Security, 2024, 24(7): 1006-1014. |
[2] | ZHANG Xiaojun, ZHANG Nan, HAO Yunpu, WANG Zhouyang, XUE Jingting. Three-Factor Authentication and Key Agreement Protocol Based on Chaotic Map for Industrial Internet of Things Systems [J]. Netinfo Security, 2024, 24(7): 1015-1026. |
[3] | ZHANG Jiwei, WANG Wenjun, NIU Shaozhang, GUO Xiangkuo. Blockchain Scaling Solutions: ZK-Rollup Review [J]. Netinfo Security, 2024, 24(7): 1027-1037. |
[4] | ZHANG Liqiang, LU Mengjun, YAN Fei. A Cross-Contract Fuzzing Scheme Based on Function Dependencies [J]. Netinfo Security, 2024, 24(7): 1038-1049. |
[5] | DONG Yunyun, ZHU Yuling, YAO Shaowen. High-Quality Full-Size Image Steganography Method Based on Improved U-Net and Hybrid Attention Mechanism [J]. Netinfo Security, 2024, 24(7): 1050-1061. |
[6] | ZHOU Shucheng, LI Yang, LI Chuanrong, GUO Lulu, JIA Xinhong, YANG Xinghua. Context-Based Abnormal Root Cause Algorithm [J]. Netinfo Security, 2024, 24(7): 1062-1075. |
[7] | REN Changyu, ZHANG Ling, JI Hangyuan, YANG Liqun. Research on TTP Extraction Method Based on Pre-Trained Language Model and Chinese-English Threat Intelligence [J]. Netinfo Security, 2024, 24(7): 1076-1087. |
[8] | CAI Manchun, XI Rongkang, ZHU Yi, ZHAO Zhongbin. A Fingerprint Identification Method of Multi-Page and Multi-Tag Targeting Tor Website [J]. Netinfo Security, 2024, 24(7): 1088-1097. |
[9] | XIANG Hui, XUE Yunhao, HAO Lingxin. Large Language Model-Generated Text Detection Based on Linguistic Feature Ensemble Learning [J]. Netinfo Security, 2024, 24(7): 1098-1109. |
[10] | SHEN Xiuyu, JI Weifeng. Optimization of Cost of Edge-Cloud Collaborative Computing Offloading Considering Security [J]. Netinfo Security, 2024, 24(7): 1110-1121. |
[11] | ZHAO Xinqiang, FAN Bo, ZHANG Dongju. Research on APT Attack Defense System Based on Threat Discovery [J]. Netinfo Security, 2024, 24(7): 1122-1128. |
[12] | WEN Wen, LIU Qinju, KUANG Lin, REN Xuejing. Research and Scheme Design of Cyber Threat Intelligence Sharing under Privacy Protection System [J]. Netinfo Security, 2024, 24(7): 1129-1137. |
[13] | LIU Yidan, MA Yongliu, DU Yibin, CHENG Qingfeng. A Certificateless Anonymous Authentication Key Agreement Protocol for VANET [J]. Netinfo Security, 2024, 24(7): 983-992. |
[14] | LUO Ming, ZHAN Qibang, QIU Minrong. A Heterogeneous Cross-Domain Conditional Privacy Protection Ring Signcryption Scheme for V2I Communication [J]. Netinfo Security, 2024, 24(7): 993-1005. |
[15] | LI Zengpeng, WANG Siyang, WANG Mei. Research of Privacy-Preserving Proximity Test [J]. Netinfo Security, 2024, 24(6): 817-830. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||