[1]黄秀丽.解读云立方体模型[J].计算机技术与发展,2012,(03):245-248.
 HUANG Xiu-li.Analysis of Cloud Cube Model[J].,2012,(03):245-248.
点击复制

解读云立方体模型()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2012年03期
页码:
245-248
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
Analysis of Cloud Cube Model
文章编号:
1673-629X(2012)03-0245-04
作者:
黄秀丽
国网电力科学研究院
Author(s):
HUANG Xiu-li
State Grid Electric Power Research Institute
关键词:
云计算云安全云立方体模型COA技术解读
Keywords:
cloud computing cloud security cloud cube model COA technology analysis
分类号:
TP309
文献标志码:
A
摘要:
作为一种新兴的技术,云计算的出现给IT界带来了很大的变革。但和所有新技术一样,云计算也将带来新的风险。面对云计算的各种风险,业务该怎样搬进什么样的云里,是所要面临的亟待解决的问题,也是文中研究的重点。首先分析了云计算带来的风险,给出了风险各要素之间的关系;接着,介绍了云立方体模型,对云立方体模型各个维度进行了详细的解读,在此基础上,介绍了COA技术;最后,结合电力系统,对电力云进行了思考,对未来的工作给出了建议
Abstract:
As an emerging technology,cloud computing brings a lot of changes into the IT industry.But same as all new technologies,cloud computing will also bring new risks.Facing the risks of cloud computing,how do move into what kind of clouds is a serious problem and the research content of this paper.First analyze the risks of cloud computing and show the relationship between the various elements of risk,then present the cube model of the cloud and COA technology in detail,and finally think about state grid cloud and give recommendations for future work according to state grid

相似文献/References:

[1]王茜,朱志祥,史晨昱,等.应用于数据库安全保护的加解密引擎系统[J].计算机技术与发展,2014,24(01):143.
 WANG Qian[],ZHU Zhi-xiang[],SHI Chen-yu[],et al.Encryption and Decryption Engine System Applying to Database Security and Detection[J].,2014,24(03):143.
[2]陈丹伟 黄秀丽 任勋益.云计算及安全分析[J].计算机技术与发展,2010,(02):99.
 CHEN Dan-wei,HUANG Xiu-li,REN Xun-yi.Analysis of Cloud Computing and Cloud Security[J].,2010,(03):99.
[3]孙放 陈云芳 林杭锋.适用于富客户端的云计算模型[J].计算机技术与发展,2010,(08):96.
 SUN Fang,CHEN Yun-fang,LIN Hang-feng.Cloud Computing Model Applicable to Rich Client Applications[J].,2010,(03):96.
[4]郭苑 张顺颐 孙雁飞.物联网关键技术及有待解决的问题研究[J].计算机技术与发展,2010,(11):180.
 GUO Yuan,ZHANG Shun-yi,SUN Yan-fei.Research of Key Technologies and Unresolved Questions of Internet of Things[J].,2010,(03):180.
[5]李玲娟 张敏.云计算环境下关联规则挖掘算法的研究[J].计算机技术与发展,2011,(02):43.
 LI Ling-juan,ZHANG Min.Research on Algorithms of Mining Association Rule under Cloud Computing Environment[J].,2011,(03):43.
[6]王德政 申山宏 周宁宁.云计算环境下的数据存储[J].计算机技术与发展,2011,(04):81.
 WANG De-zheng,SHEN Shan-hong,ZHOU Ning-ning.Data Storage in Cloud Computing Environment[J].,2011,(03):81.
[7]宋丽华 姜家轩 张建成 田长录 马文征.黄河三角洲云计算平台关键技术的研究[J].计算机技术与发展,2011,(06):40.
 SONG Li-hua,JIANG Jia-xuan,ZHANG Jian-cheng,et al.Research of Key Technologies of Cloud Computing of Yellow River Delta[J].,2011,(03):40.
[8]田宏伟 解福 倪俊敏.云计算环境下基于粒子群算法的资源分配策略[J].计算机技术与发展,2011,(12):22.
 TIAN Hong-wei,XIE Fu,NI Jun-min.Resource Allocation Algorithm Based on Particle Swarm Algorithm in Cloud Computing Environment[J].,2011,(03):22.
[9]张慧 邢培振.云计算环境下信息安全分析[J].计算机技术与发展,2011,(12):164.
 ZHANG Hui,XING Pei-zhen.Information Security Analysis in Cloud Computing Environment[J].,2011,(03):164.
[10]张建成[] 宋丽华[] 鹿全礼[] 郭锐[] 刘永泉[].云计算方案分析研究[J].计算机技术与发展,2012,(01):165.
 ZHANG Jian-cheng,SONG Li-hua,LU Quan-li,et al.Study and Analysis of Cloud Computing Procedure[J].,2012,(03):165.
[11]朱圣才.基于Azure的云安全研究[J].计算机技术与发展,2013,(12):143.
 ZHU Sheng-cai.Research on Cloud Computing Security Based on Windows Azure[J].,2013,(03):143.
[12]王茜,朱志祥,葛新,等.应用于云计算中心的虚拟主机安全防护系统[J].计算机技术与发展,2014,24(03):134.
 WANG Qian[],ZHU Zhi-xiang[],GE Xin[],et al.A Virtual Host Protection System Applying to Cloud Computing Center[J].,2014,24(03):134.
[13]谭天,袁嵩,肖洁. 云计算安全问题研究[J].计算机技术与发展,2016,26(09):124.
 TAN Tian,YUAN Song,XIAO Jie. Research on Security Issues of Cloud Computing[J].,2016,26(03):124.
[14]邵应昭,丁跃利,张建华,等.面向应用的天基嵌入式云服务安全技术研究[J].计算机技术与发展,2020,30(08):109.[doi:10. 3969 / j. issn. 1673-629X. 2020. 08. 018]
 SHAO Ying-zhao,DING Yue-li,ZHANG Jian-hua,et al.Study on Cloud Service Security Technology of Space-based Embedded System Application[J].,2020,30(03):109.[doi:10. 3969 / j. issn. 1673-629X. 2020. 08. 018]

备注/Memo

备注/Memo:
国家电网公司科技项目(SG11075-1)黄秀丽(1979-),女,工程师,硕士,研究方向为信息安全
更新日期/Last Update: 1900-01-01