How to Design the E-Government Secure Cloud

Article Preview

Abstract:

Nowadays, cloud computing is the innovative product of the upgraded of information science technology. It is another great change following the transition from large scale computer to client-server in the last century. The concepts, such as cloud security, cloud storage, secure cloud, cloud hosting and cloud input, appeared after cloud computing. E-Government Information Security plays an important role in the development and establishment of E-Government. It is an important component part to use cloud security technology to establish our country’s E-Government secure cloud in current E-Government construction.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

6215-6218

Citation:

Online since:

May 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Yu Juanjuan. A brief discussion of cloud security, technology. Computer Security, 2011(9): 39-44.

Google Scholar

[2] Fang Jie. A brief introduction of cloud security. Information System Engineering, 2009(8): 58-61.

Google Scholar

[3] National computer virus emergency response center. Viral forecasting. the 482th (2012. 5. 28-6. 3)http: /www. antivirus-china. org. cn/head/yubao/yubao_482. htm.

Google Scholar

[4] Pei Xiaoyan, Zhang Ni. A brief discussion of cloud computing security. Information and Communication Technology, 2012(1): 24-28.

Google Scholar

[5] Zhang Wei. View Chinese E-government security challenges from internet environment. E-government, 2012(Z1).

Google Scholar

[6] Chen Lisong. The study of Chinese E-government's development status and trends. Information System Engineering, 2011(3).

Google Scholar

[7] He Zhen, Cao Dan. The problem and strategy of information security in the E-government's construction. Xiangtan University journal (philosophy and social sciences), 2009(3).

Google Scholar

[8] Xu Xuelong. Web secure cloud era. China Information World, 2008-09-22(012).

Google Scholar

[9] Tang Tao. cloud computing "services + "cloud security"="cloud development,. Computer Knowledge and Technology, 2011(30).

Google Scholar