Key technologies and implementation methods of endogenous safety and security cloud data center based on mimic architecture
Cloud data center is the representative of the new generation of information infrastructure, and its security has become the focus of attention in recent years, which is of great significance.Based on the analysis of the current cloud security situation, the security architecture, key technologies,...
Saved in:
Main Authors: | Fan ZHANG, Guangwei XIE, Wei GUO, Hongchao HU, Ruyun ZHANG, Wenyan LIU |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2021-03-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2021056/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Endogenous security architecture of Ethernet switch based on mimic defense
by: Ke SONE, et al.
Published: (2020-05-01) -
Mimic cloud service architecture for cloud applications
by: Liming PU, et al.
Published: (2021-02-01) -
Mimic security scheduling algorithm for industrial control under limited heterogeneous resource constraints
by: Ruyun ZHANG, et al.
Published: (2021-03-01) -
Meaning and Vision of Mimic Computing and Mimic Security Defense
by: Jiangxing Wu
Published: (2014-07-01) -
Heterogeneous executor scheduling algorithm for mimic cloud service
by: Liming PU, et al.
Published: (2020-03-01)