Cloud Security Threats Distribution Technology Research

Article Preview

Abstract:

Inprotection architecture of data center, Cloud security threat distributiontechnology through the analysis of various threats of Internet and risks,obtains the threatened distribution data that is associated with the zombienetwork with the technology of distributed computing.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

934-936

Citation:

Online since:

January 2015

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Chi Chen. Cloud computing security system. Science presses. In the 2014-6-1 s.

Google Scholar

[2] Hong Li, Hao Li. Trusted cloud security key technologies and implementation in China [D]. People's posts and telecommunications publishing house, 2010-06-01. In Chinese.

Google Scholar

[3] Ni Zhang. Cloud computing security technology and application. People's posts and telecommunications publishing house. In the 2014-05-01 s.

Google Scholar