[1]阮进勇,徐凌宇,丁广太. 数字海洋云计算平台工作流安全机制[J].计算机技术与发展,2015,25(01):155-158.
 NGUYEN Tien-dung,XU Ling-yu,DING Guang-tai. Security Mechanism of Workflow on Cloud Computing Platform of Digital Ocean[J].,2015,25(01):155-158.
点击复制

 数字海洋云计算平台工作流安全机制()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
25
期数:
2015年01期
页码:
155-158
栏目:
安全与防范
出版日期:
2015-01-10

文章信息/Info

Title:
 Security Mechanism of Workflow on Cloud Computing Platform of Digital Ocean
文章编号:
1673-629X(2015)01-0155-04
作者:
 阮进勇徐凌宇丁广太
 上海大学 计算机学院
Author(s):
 NGUYEN Tien-dungXU Ling-yuDING Guang-tai
关键词:
 数字海洋云平台身份认证双元素技术工作流
Keywords:
 digital ocean cloud platformidentity authenticationdouble factor technologyworkflow
分类号:
TP31
文献标志码:
A
摘要:
 云计算技术业已成为计算机资源交付使用的一种越来越受关注的方式。随着云计算技术的发展,其安全问题也面临巨大挑战。工作流管理系统是“数字海洋云计算平台”的重要组成部分,其中,资源鉴权和用户身份认证贯穿于工作流管理系统所有过程。文中研究数字海洋云平台上用户管理和定制复合模型工作流过程中的安全问题。根据数字海洋云平台上用户定制服务流时使用公有、私有资源安全问题和用户身份认证等功能,提出了一种工作流安全机制,结合手机和电子邮箱的双因素口令技术。
Abstract:
 In recent years,cloud computing technology has attracted much attention of various applications. Along with its development, cloud computing faces enormous challenges in security. Workflow management system is an important part of"cloud computing platform of the Digital Ocean of China". The functions of resource authentication and user identity authentication have played an important role in whole process of workflow management system. In this paper,study the security problem in the processing of user management and cus-tom compound model on ocean cloud platforms. According to the security problem when users customize service flow with public and pri-vate resources on digital ocean cloud platforms and user identity authentication function,a workflow security mechanism,combined the technology of double factors of mobile phone and email,is proposed.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(01):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(01):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(01):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(01):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(01):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(01):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(01):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(01):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(01):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(01):47.

更新日期/Last Update: 2015-04-17