JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2017, Vol. 52 ›› Issue (3): 60-67.doi: 10.6040/j.issn.1671-9352.2.2016.105
Previous Articles Next Articles
CHEN Guang-rui, CHEN Xing-shu*, WANG Yi-tong, GE Long
CLC Number:
[1] 中国国家标准化管理委员会. GB/T 31167-2014信息安全技术: 云计算服务安全指南[S].北京:中国标准出版社,2014. Standardization Administration of the Peoples Republic of China. GB/T 31167-2014 Information security technology-security guide of cloud computing service[S]. Beijing: Standards Press of China, 2014. [2] 陈兴蜀,罗永刚,罗锋盈.《信息安全技术 云计算服务安全指南》解读与实施[M].北京:科学出版社,2015. CHEN Xingshu, LUO Yonggang, LUO Fengying. The interpretation and implementation of Information security technology-Security guide of cloud computing service[M]. Beijing: Science Press, 2015. [3] Cloud Security Alliance. Cloud Controls Matrix v3.0[EB/OL].(2016-03-18)[2016-05-05]. https://downloads.cloudsecurityalliance.org/initiatives/ccm/CSA_CCM_v3.0.xlsx [4] BRUNETTE G, MOGULL R. Security guidance for critical areas of focus in cloud computing v3.0[M]. Toronto: Cloud Security Alliance, 2011: 1-177. [5] KRUTZ R L, VINES R D. Cloud security: a comprehensive guide to secure cloud computing[M]. New York: John Wiley & Sons, 2010. [6] 王含章. 可信云计算平台模型的研究及其改进[D]. 合肥: 中国科学技术大学, 2011. WANG Hanzhang. Research and improvement on the model of trusted cloud computing platform[D]. Hefei: University of Science and Technology of China, 2011. [7] DIOGENES Y, GILBERT J, GRONLUND C J. Best practices for software updates on Microsoft Azure IaaS[EB/OL].(2016-03-22)[2016-05-06]. https://azure.microsoft.com/zh-cn/documentation/articles/azure-security-best-practices-software-updates-iaas [8] 阿里云.阿里云盾补丁管理[EB/OL].[2016-05-06]. https://help.aliyun.com/product/9091838_28360.html?spm=5176.776708449.6.66.8rblHE Alibaba Cloud, Patch Management in Alibaba Cloud[EB/OL].[2016-05-06]. https://help.aliyun.com/product/9091838_28360.html?spm=5176.776708449.6.66.8rblHE [9] LIU Kai, ZOU Deqing, JIN Hai. Software Update as a Service for the IaaS Cloud[C] // IEEE International Conference on Services Computing. New York: IEEE, 2015: 483-490. [10] YAMATO Y. Automatic verification technology of software patches for user virtual environments on IaaS cloud[J]. Springer Journal of Cloud Computing, 2015, 10:S165-S167. [11] YAMATO Y. Automatic verification for plural virtual machines patches[C] // International Conference on Ubiquitous and Future Networks. Sapporo: IEEE Computer Society, 2015: 837-838. [12] YAMADA H, TONOSAKI S, KONO K. Efficient update activation for virtual machines in Iaas cloud computing environments[J]. IEICE Transactions on Information and Systems, 2014, E97-D(3): 469-479. [13] UFTP-Encrypted UDP based FTP with multicast[EB/OL].[2016-05-06]. http://uftp-multicast.sourceforge.net/ [14] 陈兴蜀, 胡亮, 陈广瑞, 等.虚拟网络环境下安全服务接入方法[J].华中科技大学学报(自然科学版), 2016,44(3):49-54. CHEN Xingshu, HU Liang, CHEN Guangrui, et al. Security service access method for virtual network[J]. Journal of Hangzhou University of Science and Technology(Natural Science Edition), 2016, 44(3):49-54. [15] LAURIKAINEN R. Improving the efficiency of deploying virtual machines in a cloud environment[D]. Degree Programme of Computer Science and Engineering, School of Science, Aalto University, 2012. |
[1] | WANG Xiao-yan, CHEN Xing-shu, WANG Yi-tong, GE Long. Performance measurement and analysis of cloud computing network based on OpenStack [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 30-37. |
[2] | HAN Pan-pan, QIN Jing. Verifiable and searchable encryption scheme for outsourced database in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(9): 41-53. |
[3] | HUANG Yu-qing, ZHAO Bo, XIAO Yu, TAO Wei. A vTPM-VM live migration scheme based on KVM [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 69-75. |
[4] | YAO Ke, ZHU Bin-rui, QIN Jing. Verifiable public key searchable encryption protocol based on biometrics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(11): 11-22. |
[5] | . An approach of detecting LDoS attacks based on the euclidean distance of available bandwidth in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 92-100. |
[6] | CAI Hong-yun, TIAN Jun-feng. Research of data privacy protection for cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(09): 83-89. |
[7] | LUO hai-yan, LÜ Ping, LIU Lin-zhong, YANG Xun. Enterprises trust comprehensive evaluation based on fussy rough AHP in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(08): 111-117. |
[8] | LIU Yang, QIN Feng-lin, GE Lian-sheng. Measurement study of cloud computing: a survey [J]. J4, 2013, 48(11): 27-35. |
|