WebSite Logo
  • Content
  • Similar Resources
  • Metadata
  • Cite This
  • Log-in
  • Fullscreen
Log-in
Do not have an account? Register Now
Forgot your password? Account recovery
  1. Science in China Series : Information Sciences
  2. Science in China Series : Information Sciences : Volume 59
  3. Science in China Series : Information Sciences : Volume 59, Issue 5, May 2016
  4. Theory and methodology of research on cloud security
Loading...

Please wait, while we are loading the content...

Science in China Series : Information Sciences : Volume 61
Science in China Series : Information Sciences : Volume 60
Science in China Series : Information Sciences : Volume 59
Science in China Series : Information Sciences : Volume 59, Issue 12, December 2016
Science in China Series : Information Sciences : Volume 59, Issue 11, November 2016
Science in China Series : Information Sciences : Volume 59, Issue 10, October 2016
Science in China Series : Information Sciences : Volume 59, Issue 9, September 2016
Science in China Series : Information Sciences : Volume 59, Issue 8, August 2016
Science in China Series : Information Sciences : Volume 59, Issue 7, July 2016
Science in China Series : Information Sciences : Volume 59, Issue 6, June 2016
Science in China Series : Information Sciences : Volume 59, Issue 5, May 2016
Solving Boolean equation systems and applications in cryptanalysis
Metamorphic testing as a test case selection strategy
Intelligent CPS: features and challenges
Theory and methodology of research on cloud security
Intelligent CPSS and its application to health care computing
New trends of information security —how to change people’s life style?
Towards a bisimulation theory for open synchronized networks of automata
Novel cover selection criterion for spatial steganography using linear pixel prediction error
Further results on constructions of generalized bent Boolean functions
Spherical torus-based video hashing for near-duplicate video detection
Growing construction and adaptive evolution of complex software systems
Semi-fragile watermarking for image authentication based on compressive sensing
A binocular vision-based UAVs autonomous aerial refueling platform
Robust mesh deformation with salient features preservation
Strategy for quantum image stabilization
Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem
Stable degree analysis for strategy profiles of evolutionary networked games
Rotated neighbor learning-based auto-configured evolutionary algorithm
Nonconvex plus quadratic penalized low-rank and sparse decomposition for noisy image alignment
A Physarum-inspired approach to supply chain network design
One-to-many authentication for access control in mobile pay-TV systems
Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack
Learning capability of the truncated greedy algorithm
Adaptive controller design for underwater snake robot with unmatched uncertainties
Characteristic model based adaptive controller design and analysis for a class of SISO systems
A new method to encode calling contexts with recursions
An accurate distributed scheme for detection of prefix interception
Iterative parameter estimate with batched binary-valued observations
Science in China Series : Information Sciences : Volume 59, Issue 4, April 2016
Science in China Series : Information Sciences : Volume 59, Issue 2, February 2016
Science in China Series : Information Sciences : Volume 59, Issue 1, January 2016
Science in China Series : Information Sciences : Volume 58
Science in China Series : Information Sciences : Volume 57
Science in China Series : Information Sciences : Volume 56
Science in China Series : Information Sciences : Volume 55
Science in China Series : Information Sciences : Volume 54
Science in China Series : Information Sciences : Volume 53
Science in China Series : Information Sciences : Volume 52
Science in China Series : Information Sciences : Volume 51
Science in China Series : Information Sciences : Volume 50
Science in China Series : Information Sciences : Volume 49
Science in China Series : Information Sciences : Volume 48
Science in China Series : Information Sciences : Volume 47
Science in China Series : Information Sciences : Volume 46
Science in China Series : Information Sciences : Volume 45
Science in China Series : Information Sciences : Volume 44

Similar Documents

...
Saudi cloud infrastructure: a security analysis

Article

...
Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing

Article

...
New trends of information security —how to change people’s life style?

Article

...
Transmission frequency-band hidden technology in physical layer security

Article

...
A Cloud-Based Authentication Protocol for RFID Supply Chain Systems

Article

...
Security-Preserving Live Migration of Virtual Machines in the Cloud

Article

...
Survey on cyberspace security

Article

...
Towards a bisimulation theory for open synchronized networks of automata

Article

...
Virtual network embedding for hybrid cloud rendering in optical and data center networks

Article

Theory and methodology of research on cloud security

Content Provider Springer Nature Link
Author Jin, Hai Dai, Weiqi Zou, Deqing
Copyright Year 2016
Abstract 1 提出可信执行环境构建机制, 通过将传统的动态可信度量根虚拟化, 同时为多个云服务虚拟机构建可信执行环境; 2 提出安全回滚机制, 保持云服务安全状态的一致性, 使得云租户不会因为云服务的回滚而导致安全状态丢失; 3 提出虚拟机组安全构建机制, 保持云服务安全状态的一致性, 使得云服务提供商不会因为虚拟机的加入、 退出和迁移而丢失对虚拟机安全状态的追踪; 4 提出栈数据立即更新机制和栈数据实时更新机制, 通过动态软件升级系统, 保证了服务在更新过程中的可靠性和持续性; 5 提出云平台中离线镜像更新机制, 通过镜像离线更新系统, 避免了离线镜像更新所产生的大部分开销。
Starting Page 1
Ending Page 3
Page Count 3
File Format PDF
ISSN 1674733X
Journal Science in China Series : Information Sciences
Volume Number 59
Issue Number 5
e-ISSN 18691919
Language Chinese
Publisher Science China Press
Publisher Date 2016-04-08
Publisher Place Beijing
Access Restriction One Nation One Subscription (ONOS)
Subject Keyword Information Systems and Communication Service
Content Type Text
Resource Type Article
Subject Computer Science
  • About
  • Disclaimer
  • Feedback
  • Sponsor
  • Contact
  • Chat with Us
About National Digital Library of India (NDLI)
NDLI logo

National Digital Library of India (NDLI) is a virtual repository of learning resources which is not just a repository with search/browse facilities but provides a host of services for the learner community. It is sponsored and mentored by Ministry of Education, Government of India, through its National Mission on Education through Information and Communication Technology (NMEICT). Filtered and federated searching is employed to facilitate focused searching so that learners can find the right resource with least effort and in minimum time. NDLI provides user group-specific services such as Examination Preparatory for School and College students and job aspirants. Services for Researchers and general learners are also provided. NDLI is designed to hold content of any language and provides interface support for 10 most widely used Indian languages. It is built to provide support for all academic levels including researchers and life-long learners, all disciplines, all popular forms of access devices and differently-abled learners. It is designed to enable people to learn and prepare from best practices from all over the world and to facilitate researchers to perform inter-linked exploration from multiple sources. It is developed, operated and maintained from Indian Institute of Technology Kharagpur.

Learn more about this project from here.

Disclaimer

NDLI is a conglomeration of freely available or institutionally contributed or donated or publisher managed contents. Almost all these contents are hosted and accessed from respective sources. The responsibility for authenticity, relevance, completeness, accuracy, reliability and suitability of these contents rests with the respective organization and NDLI has no responsibility or liability for these. Every effort is made to keep the NDLI portal up and running smoothly unless there are some unavoidable technical issues.

Feedback

Sponsor

Ministry of Education, through its National Mission on Education through Information and Communication Technology (NMEICT), has sponsored and funded the National Digital Library of India (NDLI) project.

Contact National Digital Library of India
Central Library (ISO-9001:2015 Certified)
Indian Institute of Technology Kharagpur
Kharagpur, West Bengal, India | PIN - 721302
See location in the Map
03222 282435
Mail: support@ndl.gov.in
Sl. Authority Responsibilities Communication Details
1 Ministry of Education (GoI),
Department of Higher Education
Sanctioning Authority https://www.education.gov.in/ict-initiatives
2 Indian Institute of Technology Kharagpur Host Institute of the Project: The host institute of the project is responsible for providing infrastructure support and hosting the project https://www.iitkgp.ac.in
3 National Digital Library of India Office, Indian Institute of Technology Kharagpur The administrative and infrastructural headquarters of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
4 Project PI / Joint PI Principal Investigator and Joint Principal Investigators of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
Prof. Saswat Chakrabarti  will be added soon
5 Website/Portal (Helpdesk) Queries regarding NDLI and its services support@ndl.gov.in
6 Contents and Copyright Issues Queries related to content curation and copyright issues content@ndl.gov.in
7 National Digital Library of India Club (NDLI Club) Queries related to NDLI Club formation, support, user awareness program, seminar/symposium, collaboration, social media, promotion, and outreach clubsupport@ndl.gov.in
8 Digital Preservation Centre (DPC) Assistance with digitizing and archiving copyright-free printed books dpc@ndl.gov.in
9 IDR Setup or Support Queries related to establishment and support of Institutional Digital Repository (IDR) and IDR workshops idr@ndl.gov.in
I will try my best to help you...
Cite this Content
Loading...