:::

詳目顯示

回上一頁
題名:統一威脅管理機制運用於雲端運算環境之創新設計
書刊名:創新與管理
作者:陳昱仁廖耕億 引用關係張鉦堅
作者(外文):Chen, Yu-jenLiao, Gen-yihChang, Cheng-chien
出版日期:2017
卷期:13:2
頁次:頁21-45
主題關鍵詞:雲端運算資訊安全統一威脅管理入侵防禦系統雲端防火牆Cloud computingInformation securityUnified threat managementUTMIntrusion prevention systemIPSCloud firewall
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:4
期刊論文
1.敦陽科技(2006)。多功能資安管理系統--UTM。敦陽資安電子報,2006(Oct.)。  延伸查詢new window
2.Berger, S.、Ca'ceres, R.、Goldman, K.、Pendarakis, D.、Perez, R.、Rao, J. R.、Rom, E.、Sailer, R.、Schildhauer, W.、Srinivasan, D.、Tal, S.、Valdez, E.(2008)。Security for the cloud infrastructure: Trusted virtual data center implementation。IBM Journal of Research and Development,53,1-12。  new window
3.Grobauer, B.、Walloschek, T.、Stocker, E.(2010)。Understanding cloud-computing vulnerabilities。IEEE Security and Privacy,9,1-14。  new window
4.Subashini, S.、Kavitha, V.(2011)。A Survey on Security Issues in Service Delivery Models of Cloud Computing。Journal of Network and Computer Applications,34,1-11。  new window
會議論文
1.Aman, B.、Yogesh, B.(2010)。Securing cloud from DDoS attacks using intrusion detection system in virtual machine。International Conference on Communication Software and Networks,260-264。  new window
2.Dastjerdi, A. V.、Bakar, K. A.、Tabatabaei, S. G. H.(2009)。Distributed intrusion detection in clouds using mobile agents。International Conference on Advanced Engineering Computing and Applications in Sciences,175-180。  new window
3.Huang, W.、Yang, J.(2010)。New network security based on cloud computing。International Workshop on Education Technology and Computer Science,604-609。  new window
4.Jensen, M.、Schwenk, J.、Gruschka, N.、Iacono, L. L.(2009)。On technical security issues in cloud computing。IEEE International Conference on Cloud Computing,109-116。  new window
5.Jia, T.、Wang, X.(2009)。The construction and realization of the intelligent NIPS based on the cloud security。International Conference on Information Science and Engineering,1885-1888。  new window
6.Roschke, S.、Cheng, F.、Meinel, C.(2009)。Intrusion detection in the cloud。IEEE International Conference on Dependable, Autonomic and Secure Computing,729-734。  new window
其他
1.陳培德(2001)。入侵偵測系統簡介。  延伸查詢new window
2.Cloud Computing Use Case Discussion Group(2010)。Cloud computing use cases white paper version 4.0,http://www.cloud-council.org/Cloud_Computing_Use_Cases_Whitepaper-4_0.pdf。  new window
3.Cloud Security Alliance(2009)。Security guidance for critical area of focus in cloud computing v2.1,https://cloudsecurityalliance.org/csaguide.pdf。  new window
4.Cloud Security Alliance(2010)。Top threats to cloud computing,https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf。  new window
5.Trend Micro(2009)。The future of threats and threat technologies,https://www.trendmicro.de/cloud-content/us/pdfs/security-intelligence/white-papers/wp_trend_micro_2010_future_threat_report_final.pdf。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關書籍
 
無相關著作
 
QR Code
QRCODE