[1] |
Chinese Information Communication Research Institute.Application Report of Key Cloud Computing Industry[R].Beijing: Chinese Information Communication Research Institute, 2017.
|
|
中国信息通信研究院.云计算关键行业应用报告(2017年)[R].北京:中国信息通信研究院,2017.
|
[2] |
SUN Dapeng.Application and Implementation of Hadoop Cloud Computing Technology in Junk Message Filtering[J]. Netinfo Security, 2015(7): 13-19.
|
|
孙大鹏. 云计算技术在垃圾短信过滤中的应用与实现[J]. 信息网络安全,2015(7):13-19.
|
[3] |
The Ministry of Industry and Information Technology.The Three Year Action Plan for the Development of Cloud Computing[R].Beijing: The Ministry of Industry and Information Technology, 2017.
|
|
工信部. 云计算发展三年行动计划[R].北京:工信部,2017.
|
[4] |
TANG Chunming, ZHENG Xiaolong.A Privacy-Preserving Public Auditing Mechanism for the Date with Large Groups Users in the Cloud Computing[J]. Netinfo Security, 2015(2): 19-25.
|
|
唐春明,郑晓龙. 云计算中一种对大群组用户的隐私保护公共审计方案[J]. 信息网络安全,2015(2):19-25.
|
[5] |
WAYNE J,TIMOTHY G.Guidelines on Security and Privacy in Public Cloud Computing[J].Journal of E-Governance , 2011 , 34(3): 149-151.
|
[6] |
PETER M,TIMOTHY G.Special Publication 800-145, The NIST Definition of Cloud Computing[J].National Institute of Standards & Technology , 2011 , 53(6) :50.
|
[7] |
GB/T 27921-2011 Risk Management-Risk Assessment Techniques [S]B/T 27921-2011 Risk Management-Risk Assessment Techniques [S]. Beijing: Standards Press of China, 2011.
|
[8] |
TIAN Yan, ZHANG Xingang, LIANG Jingjing, et al.Research on Typical Security Threat and Defensive Strategy in Cloud Computing Environment[J].Experimental Technology and Management, 2013, 30(4): 81-83.
|
|
田燕,张新刚,梁晶晶,等. 云计算环境下典型安全威胁分析及防御策略研究[J].实验技术与管理,2013,30(4):81-83.
|
[9] |
The Ministry of Public Security Information Security Level Protection Assessment Center. A Training Course for Information Security Rating Appraisers[M]. Beijing: Publishing House of Electronics Industry, 2015.
|
|
公安部信息安全等级保护评估中心,信息安全等级测评师培训教程[M]信息安全等级测评师培训教程[M]. 北京:电子工业出版社,2015.
|
[10] |
GB/T 22239-2008 Information Security Technology - Baseline for Classified Protection of Information System Security[S]B/T 22239-2008 Information Security Technology - Baseline for Classified Protection of Information System Security[S]. Beijing: Standards Press of China, 2008.
|
[11] |
LIU Meng.Architecture of DDoS Attacks Defense in Cloud Environment and Its Key Technologies[D].Nanjing University, 2016.
|
|
刘孟. 云环境下DDoS攻防体系及其关键技术研究[D]. 南京:南京大学,2016.
|
[12] |
MEN Hong, YAO Shunli.Research on a Framework Based on Virtual Cloud Network for Monitoring Safe Production[J].Netinfo Security, 2017(3):14-20.
|
|
门红,姚顺利. 安全监控虚拟云安全网络架构研究[J]. 信息网络安全,2017(3):14-20.
|
[13] |
DUAN Xindong.Research on Cloud Platform Data Protection Technology Based on Ciphertext Operation[J]. Modern Electronics Technique, 2016, 39(11) : 90-94.
|
|
段新东. 基于密文操作的云平台数据保护技术研究[J].现代电子技术,2016 , 39(11): 90-94.
|
[14] |
LI Jianfeng, LIU Yuan, ZHANG Hao, et al.Research and Implementation of Routing Performance Optimization for IaaS Cloud Platform[J].Netinfo Security,2017(9): 10-15.
|
|
李剑锋,刘渊,张浩,等. 面向IaaS云平台的路由转发优化研究与实现[J]. 信息网络安全,2017(9):10-15.
|
[15] |
JI Haiping, XU Lei, WEI Xiaoling, et al.Research on Hierarchical Identity-based Encryption Management System in Cloud Computing[J].Netinfo Security, 2016(05):30-36.
|
|
计海萍,徐磊,蔚晓玲,等. 云计算环境下基于身份的分层加密管理系统研究[J]. 信息网络安全,2016(5):30-36.
|
[16] |
LIANG Shaozhu.Design and Implementation of the Cloud Platform User Centralized Management System Based on OpenStack[D]. Guangzhou:Sun Yat-Sen University. 2015.
|
|
梁绍祝. 基于OpenStack的云平台用户统一管理系统的设计与实现[D]. 广州:中山大学,2015.
|
[17] |
KONG Dan, MA Zhaofeng,JIANG Ming.Design and Realization of Security Audit System Based on Cloud Platform[J].Information security and communications privacy, 2013 (10): 66-70.
|