首页 | 本学科首页   官方微博 | 高级检索  
     

云计算环境下的可信接入安全协议研究进展
引用本文:张志勇,常亚楠,王剑,向菲.云计算环境下的可信接入安全协议研究进展[J].网络安全技术与应用,2013(8):112-116.
作者姓名:张志勇  常亚楠  王剑  向菲
作者单位:河南科技大学信息工程学院 河南47102
基金项目:国家自然科学基金(No.61003234),河南省杰出青年基金(No.134100510006),河南省教育厅科学技术研究重点项目基础研究计划(No.13A520240).
摘    要:随着云计算的蓬勃发展,越来越多的用户在云端使用计算和存储资源,然而各种安全问题接踵而来.云计算和可信计算技术的融合研究将成为云安全领域的重要趋势,通过设计安全协议来保障整个云计算环境的安全性和可生存性.主要针对在云计算环境下的可信接入安全协议及其形式化证明,进行了归类综述和对比分析,最后指出可信云平台所面临的研究问题.

关 键 词:云计算安全  可信计算  可信接入  安全协议  形式化证明

Advance on Trusted Connection Security Protocols for Cloud Computing
Zhang Zhiyong , Chang Yanan , Wang Jian , Xiang Fei.Advance on Trusted Connection Security Protocols for Cloud Computing[J].Net Security Technologies and Application,2013(8):112-116.
Authors:Zhang Zhiyong  Chang Yanan  Wang Jian  Xiang Fei
Affiliation:( Information Engineering College, Henan University of Science and Technology, Henan, 471023)
Abstract:Along with the rapid development of cloud computing, more and more users access to computing and storage resources. However, a variety of security issues come being. The fusion of cloud computing and trusted computing technology will become an important trend in the field of cloud security, protecting the security and survivability of the cloud computing environment by using security protocols. The paper mainly made a classified survey, and comparison and analysis on trusted connection security protocols and their formalisms in the cloud computing environment, finally addressed research topics on the trusted cloud platform.
Keywords:Cloud Computing Security  Trusted Computing  Trusted Connection  Security Protocol  Formalism
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号