浏览全部资源
扫码关注微信
1. 空军工程大学 西安710077
2. 宝鸡市公安局网络安全支队 宝鸡721000
[ "郭保平,男,空军工程大学博士生,主要研究方向为军事云计算及其安全问题。" ]
[ "程建,男,博士,空军工程大学教授、博士生导师,主要研究方向为信息化作战与建设。" ]
[ "刘维平,男,宝鸡市公安局网络安全支队高级工程师、四级警长,主要研究方向为网络安全。" ]
网络出版日期:2015-12,
纸质出版日期:2015-12-20
移动端阅览
郭保平, 程建, 刘维平. 军事云信息安全保障体系架构[J]. 电信科学, 2015,31(12):70-75.
Baoping Guo, Jian1 Cheng, Weiping2 Liu. Information Assurance Framework of Military Cloud[J]. Telecommunications science, 2015, 31(12): 70-75.
郭保平, 程建, 刘维平. 军事云信息安全保障体系架构[J]. 电信科学, 2015,31(12):70-75. DOI: 10.11959/j.issn.1000-0801.2015299.
Baoping Guo, Jian1 Cheng, Weiping2 Liu. Information Assurance Framework of Military Cloud[J]. Telecommunications science, 2015, 31(12): 70-75. DOI: 10.11959/j.issn.1000-0801.2015299.
云计算架构以其强大的信息处理能力、按需弹性的服务模式、增强的安全性等优势,已成为军事信息系统的发展方向。首先探讨了军事云计算安全的概念及特点,对军事云安全领域研究及应用的现状进行了分析。在此基础上,提出了军事云信息安全保障体系构建的目标,构建了军事云信息安全保障体系架构,并对其包含的主要模块进行了深入分析,最后给出了需要解决的关键技术问题。
Due to the powerful capacity of information processing
on-demand and elastic service model
and enhanced security
cloud computing has become the future of military information system. At first
the conception and feature of cloud computing security was discussed. The current situation of research and application in military cloud security was analyzed. The objective of information assurance with military cloud was proposed on this foundation
then the architecture of information assurance with military cloud was structured
and the main modules of this architecture were analyzed in-depth. Lastly some key research opportunities were listed.
王古宣 , 左琳琳 . 美军信息保障浅析 . 现代军事 , 2008 ( 6 ): 64 ~ 66
Wang G X , Zuo L L . Information assurance analysis of US army . Modern Military , 2008 ( 6 ): 64 ~ 66
张慧 , 邢培振 . 云计算环境下信息安全分析 . 计算机技术与发展 , 2011 , 21 ( 12 ): 164 ~ 166
Zhang H , Xing P Z . Information security analysis in cloud computing environment . Computer Technology and Development , 2011 , 21 ( 12 ): 164 ~ 166
Dallas A P . The military applications of cloud computing technologies(master dissertation) . Kansas: United States Army Command and General Staff College , 2013
郑全弟 , 张文 , 李成海 等 . 云计算在美军事领域的应用与展望 . 飞航导弹 , 2013 ( 1 ): 53 ~ 56
Zheng Q D , Zhang W , Li C H , et al . Cloud computing applications and prospect in US army . Aerodynamic Missile Journal , 2013 ( 1 ): 53 ~ 56
韩星晔 , 李新明 . 云计算军事应用研究 . 备指挥技术学院学报 , 2011 , 22 ( 2 ): 103 ~ 107
Han X Y , Li X M . Research on military application of cloud computing . Journal of the Academy of Equipment Command&Technology , 2011 , 22 ( 2 ): 103 ~ 107
HQMC C4 Strategy and Vision Division . Marine corps private cloud computing environment strategy . http://www.defense.gov/news/Marine-Corps-PrivateCloud http://www.defense.gov/news/Marine-Corps-PrivateCloud . pdf , 2012
Department of Defense Chief Information Officer . Cloud computing strategy , http://www.defense.gov/news/DoDCloudComputingS-trategy http://www.defense.gov/news/DoDCloudComputingS-trategy . pdf , 2014
李成 , 李明桂 , 向敏 . 联合信息环境JIE 及其安全研究 . 通信技术 , 2015 , 48 ( 1 ): 46 ~ 50
Li C , Li M G , Xiang M . Joint information environment and its security . Communications Technology , 2015 , 48 ( 1 ): 46 ~ 50
The Defense Science Board Cyber Security and Reliability in a Digital Cloud . Washington DC: Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics , 2013 : 29 ~ 40
任福乐 , 朱志祥 , 王雄 . 基于全同态加密的云计算数据安全方案 . 西安邮电大学学报 , 2013 , 18 ( 3 ): 92 ~ 95
Ren F L , Zhu Z X , Wang X . A cloud computing security solution based on fully homomorphic encryption . Journal of Xi'an University of Posts and Telecommunications , 2013 , 18 ( 3 ): 92 ~ 95
Noemi A . Optimizing security of cloud computing within the DOD(master dissertation) . Monterey: Naval Postgraduate School , 2010
Kris E B , Jeffrey W H , Robert F M . A case for DoD application of public cloud computing services . Proceedings of the 2011 Military Communications Conference , Maryland, USA , 2011 : 1888 ~ 1893
Timothy K B . A strategic approach to network defense: framing the cloud . Parameters , 2011 ,( 3 ): 43 ~ 58
Kretzschmar M , Knuepfer M . Reference security management architecture-guiding governmental and military inter-cloud initiatives . Proceedings of 2011 Military Communications and Information Systems Conference , Canberra,Australia , 2011 : 391 ~ 397
冯登国 , 张敏 , 张妍 等 . 云计算安全研究 . 软件学报 , 2011 , 22 ( 1 ): 71 ~ 83
Feng D G , Zhang M , Zhang Y , et al . Study on cloud computing security . Journal of Software , 2011 , 22 ( 1 ): 71 ~ 83
李美云 , 李剑 , 黄超 . 基于同态加密的可信云存储平台 . 信息网络安全 , 2012 , 12 ( 9 ): 35 ~ 40
Li M Y , Li J , Huang C . A credible cloud storage platform based on homomorphic encryption . Netinfo Security , 2012 , 12 ( 9 ): 35 ~ 40
孙晶晶 , 蔡勉 , 赵阳 . 基于可信计算的云用户安全模型 . 计算机安全 , 2012 , 12 ( 4 ): 19 ~ 24
Sun J J , Cai M , Zhao Y . Based on trusted computing user security model for cloud computing . Computer Security , 2012 , 12 ( 4 ): 19 ~ 24
房晶 , 吴昊 , 白松林 . 云计算的虚拟化安全问题 . 电信科学 , 2012 , 28 ( 4 ): 135 ~ 140
Fang J , Wu H , Bai S L . Virtualization security issues in cloud computing . Telecommunications Science , 2012 , 28 ( 4 ): 135 ~ 140
李明桂 , 肖毅 陈剑锋 等 . 基于大数据的安全事件挖掘框架 . 通信技术 , 2015 , 48 ( 3 ): 346 ~ 350
Li M G , Xiao Y , Chen J F , et al . Big data-based framework for security event mining . Communications Technology , 2015 , 48 ( 3 ): 346 ~ 350
0
浏览量
1660
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构