Cloud Computing Security

美 [klaʊd kəmˈpjuːtɪŋ sɪˈkjʊrəti]英 [klaʊd kəmˈpjuːtɪŋ sɪˈkjʊərəti]
  • 网络云计算安全
Cloud Computing SecurityCloud Computing Security
  1. Promote independent research into best practices for cloud computing security .

    促进云计算安全最佳实践的独立研究。

  2. Finally , testing and validating the cloud computing security transmission system .

    最后,测试并验证云计算安全传输系统。

  3. But the problem of cloud computing security is gradually revealed , attracting more and more attention of the industry .

    但是云计算的安全问题也逐渐暴露出来,引起了行业的重视。

  4. His research interests are cloud computing security and business adoption strate ­ gies .

    他的研究兴趣是云计算安全性和业务导入战略。

  5. At present , in solving cloud computing security issues , alot of methods and ideas has sprung up .

    目前,在解决云计算安全问题上,已经涌现出很多方法和思路。

  6. As the need for security increases daily with the unprecedented growth of platform sharing , we oriented our research to the cloud computing security .

    随着共享平台的空前增长,对安全需求也就日益增加,那么本文主要研究云计算的安全性。

  7. Therefore , it has attract more and more attentions on cloud computing security that help to promote the improvement of cloud computing security .

    因此关注云计算安全,增加云计算的安全性已经成为人们日益关注的问题。

  8. This paper describes the great requirements in Cloud Computing , security key technology , standard and regulation etc.

    提出云计算安全参考框架及该框架下的主要研究内容;

  9. The ministry pledged to enhance cloud computing network security and improve security regulation and relevant laws .

    该部门承诺加强云计算网络安全,并完善安全监管及相关法律。

  10. Mobile cloud computing and security threats

    移动云计算和安全威胁

  11. Then , according to the architecture of cloud computing has security problems faced by each layer , made the appropriate security mechanisms .

    接着,根据云计算的体系架构分析了各层所面临的安全问题,提出了相应的安全机制。

  12. The research of cloud computing utility security optimized model based on stochastic programming will expand the traditional theories and methods of distributed access control , and play a positive promoting role on solving many access control problems of distributed applications .

    基于随机规划的云计算效用安全优化模型研究将拓展传统的分布式访问控制理论和方法,对解决众多分布式应用的访问控制问题起到积极的推进作用。

  13. Reviews the basic content of cloud computing and its security issues in details .

    并详细介绍当今云计算的基本内容以及其中的安全问题。

  14. With the rapid development of Internet , especially the rapid development of cloud computing , network security issues has been growing concerned .

    随着互联网的快速发展,尤其是目前云计算的快速发展,网络安全问题已经被越来越多人所关注。

  15. Launch awareness campaigns and educational programs on the appropriate uses of cloud computing and cloud security solutions .

    发起恰当利用云计算和云安全解决方案的宣传活动和教育计划。

  16. Finally , I 'll look at what criteria you need to test how well SaaS is performing in cloud computing and some security issues with SaaS .

    最后介绍测试SaaS在云计算中的执行情况所需的条件,以及SaaS在安全性方面的问题。

  17. Then analyzed the security risks of the system from three aspects : security risks of the cloud computing platform , security risks of the customer relationship management systems and security risks of the data .

    接着从三个方面分析了基于云计算的客户关系管理系统的安全风险,分别是云计算平台自身的安全风险,客户关系管理系统的安全风险,数据的安全风险。

  18. With the promotion and large scale use of the cloud computing environment , security of the systems in the cloud computing environment is very important , secure issues are greatly need to be solved .

    随着云计算环境的推广和大规模应用,保护好云计算环境下系统的安全性非常重要,安全问题亟待解决,而为系统构建一个优秀的身份认证方案将会大大增强其安全性。

  19. However , the openness of distributed storage in cloud computing results in security risks and the data reliability is one of the constraints of cloud applications . Therefore , it is a significant problem that how to guarantee data security during the process of data reliability protection .

    但是由于云计算环境下分布式存储的开放性带来的安全隐患,以及其数据可靠性的制约,使如何实现在数据可容错的过程中保证数据的安全性成为亟待解决的问题。

  20. Some argue that clouds are more secure than many private networks , while others consider that cloud computing may open more security holes .

    有些人认为云比许多私有网络要安全,另一些人则认为云计算可能敞开了更多的安全漏洞。

  21. Promote a common level of understanding between the consumers and providers of cloud computing regarding the necessary security requirements and attestation of assurance .

    促进云计算消费者和供应商对必要的安全需求和保障承诺达成共识。

  22. In a word , this is a good quest for the principle of cloud computing ? and cloud security , and it provides basis to study principle and advanced application further .

    总之,以上工作对云计算和云安全的原理进行了有益的探索,为进一步研究云计算的原理以及高级应用提供了一定的依据。

  23. The main contents are : 1 . According to the characteristics of cloud computing environment , a security provenance model is established in order to ensure the confidentiality , integrity , availability of provenance .

    本文对云中数据起源安全进行研究,主要研究内容有:1.根据云计算环境的特点,同时为了达到起源信息机密性、完整性、可用性目标,搭建起云中数据的安全起源模型。

  24. But most companies hold a wait-and-see attitude to cloud computing . They have serious doubts about the cloud computing security .

    不过大多数企业对云计算还持有一个观望的态度,特别是对云计算的安全性有所怀疑。

  25. A great variety of cloud expressions came up suddenly , such as cloud storage , cloud computing , cloud security , cloud antivirus , cloud mailbox , and so on .

    云储存、云计算、云安全、云杀毒、云邮箱等等,一系列的和云有关的名词如雨后春笋般涌现。

  26. To achieve a well-founded understanding of the " delta " that cloud computing adds with respect to se ­ curity issues , we must analyze how cloud computing influences established security issues .

    为了更好地理解云计算在安全问题上所带来的新课题,我们必须分析云计算是如何影响了既有的安全问题。

  27. In recent years , cloud computing applications get further development by global efforts , but there exists a certain gap between a wide variety of cloud computing applications and the corresponding cloud computing security .

    近些年,云计算应用在全球推动下得到进一步的发展,但是种类繁多的云计算应用与对应的云计算安全之间却存在一定的鸿沟。