資料載入處理中...
臺灣人文及社會科學引文索引資料庫系統
:::
網站導覽
國圖首頁
聯絡我們
操作說明
English
行動版
(18.118.119.229)
登入
字型:
**字體大小變更功能,需開啟瀏覽器的JAVASCRIPT,如您的瀏覽器不支援,
IE6請利用鍵盤按住ALT鍵 + V → X → (G)最大(L)較大(M)中(S)較小(A)小,來選擇適合您的文字大小,
如為IE7以上、Firefoxy或Chrome瀏覽器則可利用鍵盤 Ctrl + (+)放大 (-)縮小來改變字型大小。
來源文獻查詢
引文查詢
瀏覽查詢
作者權威檔
引用/點閱統計
我的研究室
資料庫說明
相關網站
來源文獻查詢
/
簡易查詢
/
查詢結果列表
/
詳目列表
:::
詳目顯示
第 1 筆 / 總合 1 筆
/1
頁
來源文獻資料
摘要
外文摘要
引文資料
題名:
A Lightweight Fine-grained Sensitive Data Access Control Model in a Cloud Computing Environment
書刊名:
國防管理學報
作者:
林忠毅
/
傅振華
/
葉彥利
作者(外文):
Lin, Chung-yi
/
Fu, Chen-hua
/
Yeh, Yen-li
出版日期:
2016
卷期:
37:1
頁次:
頁1-14
主題關鍵詞:
雲端運算
;
資料存取控制
;
資料安全
;
Cloud computing
;
Data access control
;
Data security
原始連結:
連回原系統網址
相關次數:
被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
排除自我引用:0
共同引用:0
點閱:3
「雲端運算」為新興的運算服務模式,然而,由於它的特殊性,衍生「安全」的議題,特別是機敏資料,再者「雲端運算」也必須考慮低運算能力設備的存取需求。因此,本研究整合「情境」和「屬性」的概念,規劃細粒度資料存取控制模式,在這模式中,以輕巧的密碼運算或少低運算能力設備的運算消耗及籍由誠信的資料控制伺服器代替資料擁有者進行授予及撤銷使用者存取權。
以文找文
Although cloud computing is an emerging computing service model, its unique features raise the issue of security, particularly with regard to the confidentiality of data. Moreover, the devices used with this approach often have relatively low computing power. This study integrates the concepts of both context and attributes to propose a fine-grained data access control model. To reduce the computational overhead, and thus raise efficiency while enabling devices with low computing power to operate properly, the proposed model employs lightweight cryptographic operations on the user side, and uses a trusted data control server to be responsible for granting and revocation of user privileges, instead of the data owner.
以文找文
期刊論文
1.
Zissis, D.、Lekkas, D.(2012)。Addressing cloud computing security issues。Future Generation Computer Systems,28(3),583-592。
2.
Rimal, Bhaskar Prasad、Jukan, A.、Katsaros, D.、Goeleven, Y.(2011)。Architectural Requirements for Cloud Computing Systems: An Enterprise Cloud Approach。Journal of Grid Computing,9(1),3-26。
3.
Weiss, A.(200712)。Computing in the Clouds。netWorker,11(4),16-25。
4.
Subashini, S.、Kavitha, V.(2011)。A survey on security issues in service delivery models of cloud computing。Journal of Network and Computer Applications,34(1),1-11。
5.
Marston, Sean、Li, Zhi、Bandyopadhyay, Subhajyoti、Zhang, Juheng、Ghalsasi, Anand(2011)。Cloud computing: The business perspective。Decision Support Systems,51(1),176-189。
6.
Xu, Xun(2012)。From cloud computing to cloud manufacturing。Robotics and Computer-Integrated Manufacturing,28(1),75-86。
7.
Sultan, Nabil(2010)。Cloud computing for education: A new dawn?。International Journal of Information Management,30(2),109-116。
8.
Wang, R. C.、Juang, W. S.、Lei, C. L.(2008)。A Web Metering Scheme for Fair Advertisement Transactions。International Journal of Security and its Applications,2(4),49-56。
9.
Buyya, Rajkumar、Yeo, Chee Shin、Venugopal, Srikumar、Broberg, James、Brandic, Ivona(2009)。Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility。Future Generation Computer Systems,25(6),599-616。
10.
Liao, Y. P.、Wang, S. S.(2009)。A secure dynamic ID based remote user authentication scheme for multi-server environment。Computer Standards & Interfaces,31(1),24-29。
11.
Chen, T. Z.、Lee, W. B.、Chen, H. B.(2008)。A round- and computation-efficient three-party authenticated key exchange protocol。The Journal of Systems and Software,81(9),1581-1590。
12.
Chung, Y. F.、Huang, K. H.、Lai, F.、Chen, T. S.(2007)。ID-based digital signature scheme on the elliptic curve cryptosystem。Computer Stands & Interfaces,29(6),601-604。
13.
Conti, M.(2012)。Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber-physical convergence。Journal of Pervasive and Mobile Computing,8(1),2-21。
14.
Henricksen, K.、Indulska, J.(2006)。Developing context-aware pervasive computing applications: Models and approach。Journal of Pervasive and Mobile Computing,2(1),37-64。
15.
Hong, J. Y.、Suh, E. H.、Kim, S. J.(2009)。Context-aware systems: A literature review and classification。Expert Systems with Applications,36(4),8509-8522。
16.
Al-Muhtadi, J.、Hill, R.、Al-Rwais, S.(2011)。Access control using threshold cryptography for ubiquitous computing environments。Journal of King Saud University-Computer and Information Science,23,71-78。
17.
Munoz, M. A.、Rodriguez, M.、Favela, J.、Gonzalez, V.、Martinez-Garcia, A.、González, V. M.(2003)。Context-aware Mobile Communication in Hospitals。IEEE Computer Society,36(8),60-67。
18.
Shi, Q.、Zhang, N.、Jones, D. L.(2012)。Efficient autonomous signature exchange on ubiquitous networks。Journal of Network and Computer Applications,35(6),1793-1806。
19.
Sun, D.、Chang, G.、Sun, L.、Wang, X.(2011)。Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments。Procedia Engineering,15,2852-2856。
會議論文
1.
Schnorr, C. P.(1990)。Efficient identification and signatures for smart Cards。Lecture Notes in Computer Science。Springer-Verlag。239-252。
2.
Goyal, V.、Pandey, O.、Sahai, A.(2006)。Attribute-based encryption for fine-grained access control of encrypted data。The 13th ACM conference on Computer and communications security。ACM。89-98。
3.
Li, J.、Zhao, G.、Chen, X.、Xie, D.、Rong, C.、Li, W.、Tang, L.、Tang, Y.(2010)。Fine-grained data access control systems with user accountability in cloud computing89-96。
4.
Jih, W. R.、Cheng, S. Y.、Hsu, Y. J.、Tasi, T. M.(2005)。Context-aware Access Control in Pervasive Healthcare21-28。
5.
Yu, S.、Wang, C.、Ren, K.、Lou, W.(2010)。Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing534-542。
6.
Zhou, M.、Mu, Y.、Susilo, W.、Au, M. H.、Yan, J.(2011)。Privacy-Preserved Access Control for Cloud Computing83-90。
研究報告
1.
Mell, P.、Grance, T.(2009)。The NIST Definition of Cloud Computing。National Institute of Standards and Technology, Information Technology Laboratory。
圖書
1.
Cloud Security Alliance(2011)。SECURITY GUIDANCE FOR CRITICAL AREAS OF FOCUS IN CLOUD COMPUTING。
2.
Hogan, M.、Liu, F.、Sokol, A.、Tong, J.(2011)。NIST Cloud Computing Standards Roadmap。Special Publisher。
其他
1.
Cloud Security Alliance(2010)。Top threats to cloud computing,https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf。
2.
Hickey, A. R.(2010)。IDC: Challenges Still Loom Over Cloud Services,http://www.crn.com/news/applications-os/222200360/idc-challenges-still-loom-over-cloud-services.htm。
3.
Louw, I.。The Challenges & Benefits of Cloud Services-Survey Findings 2009,http://www.ebizq.net/blogs/bpm_insights/2010/01/following-their-prediction-that-cloud.php。
推文
當script無法執行時可按︰
推文
推薦
當script無法執行時可按︰
推薦
引用網址
當script無法執行時可按︰
引用網址
引用嵌入語法
當script無法執行時可按︰
引用嵌入語法
轉寄
當script無法執行時可按︰
轉寄
top
:::
相關期刊
相關論文
相關專書
相關著作
熱門點閱
1.
應用於雲端運算之可驗證門檻式雲端儲存系統
無相關博士論文
無相關書籍
無相關著作
1.
A Win-win Collaboration between Universities and Industry on Audit Data Analytics
2.
隱私資訊管理系統標準ISO27701於GDPR適用性評估
3.
Shodan為基礎的IoT安全等級與防護機制
4.
Study of CIM and IoT--Simulation for Cost Performance Analysis (Cost Management)
5.
從實質課稅原則探討人壽保險與遺贈稅實務
6.
綜合所得稅扣除額使用對租稅公平影響之探討
7.
我國出口領先廠商對整體經濟影響及稅收貢獻之分析
8.
OECD財稅大數據之分析與應用初探
9.
財稅大數據的應用
10.
嚴重特殊傳染性肺炎疫情對我國金融業之衝擊與機會
11.
以圖型理論(Graph Theory)為基礎評估學習內容內在認知負荷(Intrinsic Cognitive Load)的分析式方法
12.
長期照顧服務管理系統使用滿意度之研究
13.
利用灰色理論探討企業業績之影響因子--以某壽險公司為例
14.
應用模糊決策實驗室法探索車燈售服市場產業之決定性因素
15.
Predicting Future Performance Using Fair Value versus Historical Cost: Evidence from Investment Property
QR Code