[1] |
Yuan LIU, Wei QIAO.
Research and Optimization of Container Network Based on Kubernetes Cluster System in Cloud Environment
[J]. Netinfo Security, 2020, 20(3): 36-44.
|
[2] |
Jiameng BAI, Yingshuai KOU, Zeyi LIU, Daren ZHA.
Docker-based RBAC Task Management System
[J]. Netinfo Security, 2020, 20(1): 75-82.
|
[3] |
Liangqin REN, Wei WANG, Qiongxiao WANG, Linli LU.
A New Cloud Cryptographic Computing Platform Architecture and Implementation
[J]. Netinfo Security, 2019, 19(9): 91-95.
|
[4] |
Yi YU, Liangshuang LV, Xiaojian LI, Tianbo WANG.
Dynamic Network Topology Description Language for Mobile Cloud Computing Scenario
[J]. Netinfo Security, 2019, 19(9): 120-124.
|
[5] |
Zixuan WANG, Liangshuang LV, Xiaojian LI, Tianbo WANG.
A Shared Storage-based Virtual Machine Application Distribution Strategy for OpenStack
[J]. Netinfo Security, 2019, 19(9): 125-129.
|
[6] |
Yanpeng CUI, Luming FENG, Zheng YAN, Huaqing LIN.
Research on Software Security Model of Cloud Computing Based on Program Slicing Technology
[J]. Netinfo Security, 2019, 19(7): 31-41.
|
[7] |
Xinrui GE, Wei CUI, Rong HAO, Jia YU.
Verifiable Keywords Ranked Search Scheme over Encrypted Cloud Data
[J]. Netinfo Security, 2019, 19(7): 82-89.
|
[8] |
Chunqi TIAN, Jing LI, Wei WANG, Liqing ZHANG.
A Method for Improving the Performance of Spark on Container Cluster Based on Machine Learning
[J]. Netinfo Security, 2019, 19(4): 11-19.
|
[9] |
Pu ZHAO, Wei CUI, Rong HAO, Jia YU.
A Secure Outsourcing Computation Scheme for El-Gamal Signature Generation
[J]. Netinfo Security, 2019, 19(3): 81-86.
|
[10] |
Zhenfeng ZHANG, Zhiwen ZHANG, Ruichao WANG.
Model of Cloud Computing Security and Compliance Capability for Classified Protection of Cybersecurity 2.0
[J]. Netinfo Security, 2019, 19(11): 1-7.
|
[11] |
Xinyang FENG, Jianjing SHEN.
A Yarn and NMF Based Big Data Clustering Algorithm
[J]. Netinfo Security, 2018, 18(8): 43-49.
|
[12] |
Yuan TAO, Tao HUANG, Mohan ZHANG, Shuilin LI.
Research and Development Trend Analysis of Key Technologies for Cyberspace Security Situation Awareness
[J]. Netinfo Security, 2018, 18(8): 79-85.
|
[13] |
Qi ZHANG, Xijun LIN, Haipeng QU.
Identity-based Encryption Scheme Support Authorization Equality Test in Cloud Environment
[J]. Netinfo Security, 2018, 18(6): 52-60.
|
[14] |
LI Yue, JIANG Wei, JI Jiahua, DUAN Dezhong.
Research on the Security Outsourcing Technology Based on Virtualization Platform
[J]. 信息网络安全, 2018, 18(5): 82-88.
|
[15] |
Yue LI, Wei JIANG, Jiahua JI, Dezhong DUAN.
Research on the Security Outsourcing Technology Based on Virtualization Platform
[J]. Netinfo Security, 2018, 18(5): 82-88.
|