[1]
Li tao, introduction to network security [M]. Beijing. Electronic industry press, 2004: 1.
Google Scholar
[2]
Suzuki J, Suda T. Middleware Support for Disaster Response Infrastructure[c]. proceedings of the First IEEE Workshop on Disaster Recovery Networks, (2002).
Google Scholar
[3]
Lloyd Scott J, et al. ROBIB: An Economic and Efficien Solution for Real-time Online Remote Information Backup. Journal of Database Management[J], 2003, 14(3): 56-73.
DOI: 10.4018/jdm.2003070104
Google Scholar
[4]
shun jie , xiao-jie liu, li tao, etc. Based on the Internet different disaster recover system design and implementation of the [J]. Application research of Computers. 2007. 24(7): 171-172.
Google Scholar
[5]
Jin-chuan sha, xiao-jie liu, li tao, etc. Based on safety control of different ground disaster preparedness system design and implementation [J]. Application research of Computers. 2007. 24(8): 152-154.
Google Scholar
[6]
WANG Kun, ZHOU Lihua, CAI Zhen, et al A disaster recovery system model in an e-government system: proc of the 6th International Conference Parallel and Distributed Computing. Applications and Technologies[C], 2005: 247-250.
DOI: 10.1109/pdcat.2005.6
Google Scholar
[7]
SOURCE A. SANs sharing storage to infinity and beyond[J]. Electronic Design, 2004. 52(9): 50-59.
Google Scholar
[8]
LIU Lanjuan, SCM security solution based on SSL protocol, Service Operations and Logistics, and Informatics[C], 2006. SOLI '06. IEEE International Conference, 2006: 814-817.
DOI: 10.1109/soli.2006.235714
Google Scholar
[9]
Michener J. R, Acar T. Managing system and active-content integrity[J] Computer, 2000. 33(7): 108-110.
DOI: 10.1109/2.869389
Google Scholar