원문정보
보안공학연구지원센터(IJSIA)
International Journal of Security and Its Applications
Vol.10 No.7
2016.07
pp.135-146
피인용수 : 0건 (자료제공 : 네이버학술정보)
목차
Abstract
1. Introduction
2. Related Works
2.1. The Basic Theory of Cloud Computing
2.2. Security Policy
3. Cloud Computing Security Analysis
3.1. Cloud Computing Security Risks
3.2. Cloud Computing Related Security Technology
4. Cloud Computing Research Data Security Module
4.1. The Construction of the Cloud Computing Platform
4.2. Key Generation and Information Encryption Module
4.3. The Message Identification Module
4.4. Cloud Computing Data Security Transmission Process Design
5. Conclusion
References
1. Introduction
2. Related Works
2.1. The Basic Theory of Cloud Computing
2.2. Security Policy
3. Cloud Computing Security Analysis
3.1. Cloud Computing Security Risks
3.2. Cloud Computing Related Security Technology
4. Cloud Computing Research Data Security Module
4.1. The Construction of the Cloud Computing Platform
4.2. Key Generation and Information Encryption Module
4.3. The Message Identification Module
4.4. Cloud Computing Data Security Transmission Process Design
5. Conclusion
References
저자정보
참고문헌
자료제공 : 네이버학술정보
