[1] |
ZHANG Xianlong. Research on General Security Framework and Key Technology of Cloud Computing[J]. Netinfo Security, 2013, 13(7): 28-31.
|
|
张显龙. 云计算安全总体框架与关键技术研究[J]. 信息网络安全, 2013, 13(7): 28-31.
|
[2] |
YANG Song, LIU Hongshan, Cheng Yan. Overview of Design and Implementation of Cloud Computing Security System[J]. Journal of Chongqing University of Posts and Telecommunications(Natural Science), 2020, 32(5): 816-824.
|
|
杨松, 刘洪善, 程艳. 云计算安全体系设计与实现综述[J]. 重庆邮电大学学报(自然科学版), 2020, 32(5):816-824.
|
[3] |
LUO Zuying. Cloud Computing Security Research[J]. Netinfo Security, 2011, 11(6): 33-35.
|
|
骆祖莹. 云计算安全性研究[J]. 信息网络安全, 2011, 11(6): 33-35.
|
[4] |
JIANG Rong, Yang Ming. Study on Cloud Computing Security Risk[J]. Computer Technology and Development, 2014, 24(3): 126-129.
|
|
姜茸, 杨明. 云计算安全风险研究[J]. 计算机技术与发展, 2014, 24(3): 126-129.
|
[5] |
ZHANG Yuqing, WANG Xiaofei, LIU Xuefeng, et al. Survey on Cloud Computing Security[J]. Journal of Software, 2016, 27(6): 1328-1348.
|
|
张玉清, 王晓菲, 刘雪峰, 等. 云计算环境安全综述[J]. 软件学报, 2016, 27(6): 1328-1348.
|
[6] |
TAN Tian, YUAN Song, XIAO Jie. Research on Security Issues of Cloud Computing[J]. Computer Technology and Development, 2016, 26(9): 124-128.
|
|
谭天, 袁嵩, 肖洁. 云计算安全问题研究[J]. 计算机技术与发展, 2016, 26(9): 124-128.
|
[7] |
JON-MICHAEL B, SCOTT F, DAVE S. Top Threats to Cloud Computing: Egregious Eleven[EB/OL]. [2022-04-28]. https://c-csa.cn/u_file/photo/20210129/9ea7cef10b.pdf.
|
[8] |
CHEN Yan, GE Jianyong, LAI Jing, et al. Security System of the Information System in the Cloud[J]. Netinfo Security, 2018, 18(4): 79-86.
|
|
陈妍, 戈建勇, 赖静, 等. 云上信息系统安全体系研究[J]. 信息网络安全, 2018, 18(4): 79-86.
|
[9] |
YU Xiaojun, WU Yabiao, ZHANG Yuqing. Research on the Design of Cloud Security Architecture[J]. Netinfo Security, 2020, 20(9): 62-66.
|
|
余小军, 吴亚飚, 张玉清. 云安全体系结构设计研究[J]. 信息网络安全, 2020, 20(9): 62-66.
|
[10] |
GUO Chunmei, BI Xueyao, YANG Fan. Research and Trend of Cloud Computing Security Technology[J]. Netinfo Security, 2010, 10(4): 16-17.
|
|
郭春梅, 毕学尧, 杨帆. 云计算安全技术研究与趋势[J]. 信息网络安全, 2010, 10(4): 16-17.
|
[11] |
YE Chaoyang, WANG Xin, ZHANG Shicong, et al. Research and Practice of SASE Cloud Security[J]. Telecommunications Science, 2022, 38(1): 140-149.
doi: 10.11959/j.issn.1000-0801.2022019
|
|
叶朝阳, 王欣, 张士聪, 等. SASE云安全研究与实践[J]. 电信科学, 2022, 38(1): 140-149.
doi: 10.11959/j.issn.1000-0801.2022019
|
[12] |
CHAO Mianxing. Research on Cloud Security Situation Awareness Method Based on Deep Learning[D]. Harbin: Harbin Normal University, 2020.
|
|
晁绵星. 基于深度学习的云安全态势感知方法研究[D]. 哈尔滨: 哈尔滨师范大学, 2020.
|
[13] |
WANG Wenjuan, DU Xuehui, WANG Na, et al. Review on Security Audit Technology for Cloud Computing[J]. Computer Science, 2017, 44(7): 16-20, 30.
doi: 10.11896/j.issn.1002-137X.2017.07.003
|
|
王文娟, 杜学绘, 王娜, 等. 云计算安全审计技术研究综述[J]. 计算机科学, 2017, 44(7): 16-20, 30.
doi: 10.11896/j.issn.1002-137X.2017.07.003
|
[14] |
CHEN Yan, LAIJing, WEIXiang. A Testing Method of the Residual Information Clearance in Virtual Machine for the Cloud Operating System[C]// IEEE. IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). New York:IEEE, 2018: 795-800.
|
[15] |
YANG Aimin, GAO Fang, BIAN Minhua, et al. Cloud Computing Security Evaluation and Countermeasure Based on AHP-Fuzzy Comprehensive Evaluation[J]. Journal on Communications, 2016, 37(S1): 104-110.
|
|
杨爱民, 高放, 边敏华, 等. 基于层次分析—模糊评价的云计算安全评估与对策[J]. 通信学报, 2016, 37(S1): 104-110.
|