On access to trusted virtual group under cloud computing
There is no appropriate internal isolation mechanism for important production information system based on cloud computing. Here the main access control technologies were compared thoroughly and then two-layer key manage-ment scheme was put forward. In terms of the first layer, access control polynom...
Saved in:
Main Authors: | Peng LIANG, Chang-xiang SHEN, Zhen-hu NING |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2013-08-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.z1.027/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Achieving efficient dynamic cryptographic access control in cloud storage
by: HONG Cheng, et al.
Published: (2011-01-01) -
Trusted virtual machine management model for cloud computing
by: Zhen-ji ZHOU, et al.
Published: (2014-11-01) -
Research progress of trusted sensor-cloud based on fog computing
by: Tian WANG, et al.
Published: (2019-03-01) -
Cryptographic service optimization scheduling algorithm for collaborative jobs in cloud environment
by: CAO Xiaogang, et al.
Published: (2024-07-01) -
Heterogeneous Cloud Radio Access Networks:Principle,Architecture,Techniques and Challenges
by: Mugen Peng, et al.
Published: (2015-05-01)