相似文献/References:
[1]王茜,朱志祥,史晨昱,等.应用于数据库安全保护的加解密引擎系统[J].计算机技术与发展,2014,24(01):143.
WANG Qian[],ZHU Zhi-xiang[],SHI Chen-yu[],et al.Encryption and Decryption Engine System Applying to Database Security and Detection[J].,2014,24(01):143.
[2]陈丹伟 黄秀丽 任勋益.云计算及安全分析[J].计算机技术与发展,2010,(02):99.
CHEN Dan-wei,HUANG Xiu-li,REN Xun-yi.Analysis of Cloud Computing and Cloud Security[J].,2010,(01):99.
[3]孙放 陈云芳 林杭锋.适用于富客户端的云计算模型[J].计算机技术与发展,2010,(08):96.
SUN Fang,CHEN Yun-fang,LIN Hang-feng.Cloud Computing Model Applicable to Rich Client Applications[J].,2010,(01):96.
[4]郭苑 张顺颐 孙雁飞.物联网关键技术及有待解决的问题研究[J].计算机技术与发展,2010,(11):180.
GUO Yuan,ZHANG Shun-yi,SUN Yan-fei.Research of Key Technologies and Unresolved Questions of Internet of Things[J].,2010,(01):180.
[5]李玲娟 张敏.云计算环境下关联规则挖掘算法的研究[J].计算机技术与发展,2011,(02):43.
LI Ling-juan,ZHANG Min.Research on Algorithms of Mining Association Rule under Cloud Computing Environment[J].,2011,(01):43.
[6]王德政 申山宏 周宁宁.云计算环境下的数据存储[J].计算机技术与发展,2011,(04):81.
WANG De-zheng,SHEN Shan-hong,ZHOU Ning-ning.Data Storage in Cloud Computing Environment[J].,2011,(01):81.
[7]宋丽华 姜家轩 张建成 田长录 马文征.黄河三角洲云计算平台关键技术的研究[J].计算机技术与发展,2011,(06):40.
SONG Li-hua,JIANG Jia-xuan,ZHANG Jian-cheng,et al.Research of Key Technologies of Cloud Computing of Yellow River Delta[J].,2011,(01):40.
[8]田宏伟 解福 倪俊敏.云计算环境下基于粒子群算法的资源分配策略[J].计算机技术与发展,2011,(12):22.
TIAN Hong-wei,XIE Fu,NI Jun-min.Resource Allocation Algorithm Based on Particle Swarm Algorithm in Cloud Computing Environment[J].,2011,(01):22.
[9]张慧 邢培振.云计算环境下信息安全分析[J].计算机技术与发展,2011,(12):164.
ZHANG Hui,XING Pei-zhen.Information Security Analysis in Cloud Computing Environment[J].,2011,(01):164.
[10]张慧.基于云计算的开放性教学资源平台建设研究[J].计算机技术与发展,2012,(01):202.
ZHANG Hui.Cloud-Based Open Platform Building Research of Teaching Resources[J].,2012,(01):202.