1 |
王古宣, 左琳琳 . 美军信息保障浅析. 现代军事, 2008(6):64~66 Wang G X , Zuo L L . Information assurance analysis of US army. Modern Military, 2008(6):64~66
|
2 |
张慧, 邢培振 . 云计算环境下信息安全分析. 计算机技术与发展, 2011,21(12):164~166 Zhang H , Xing P Z . Information security analysis in cloud computing environment. Computer Technology and Development, 2011,21(12):164~166
|
3 |
Dallas A P . The military applications of cloud computing technologies(master dissertation). Kansas: United States Army Command and General Staff College, 2013
|
4 |
郑全弟, 张文, 李成海 等. 云计算在美军事领域的应用与展望. 飞航导弹, 2013(1):53~56 Zheng Q D , Zhang W , Li C H , et al. Cloud computing applications and prospect in US army. Aerodynamic Missile Journal, 2013(1):53~56
|
5 |
韩星晔, 李新明 . 云计算军事应用研究. 备指挥技术学院学报, 2011,22(2):103~107 Han X Y , Li X M . Research on military application of cloud computing. Journal of the Academy of Equipment Command&Technology, 2011,22(2):103~107
|
6 |
HQMC C4 Strategy and Vision Division. Marine corps private cloud computing environment strategy. . pdf, 2012
|
7 |
Department of Defense Chief Information Officer. Cloud computing strategy, . pdf, 2014
|
8 |
李成, 李明桂, 向敏 . 联合信息环境JIE 及其安全研究. 通信技术, 2015,48(1):46~50 Li C , Li M G , Xiang M . Joint information environment and its security. Communications Technology, 2015,48(1):46~50
|
9 |
The Defense Science Board Cyber Security and Reliability in a Digital Cloud. Washington DC: Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics, 2013:29~40
|
10 |
任福乐, 朱志祥, 王雄 . 基于全同态加密的云计算数据安全方案. 西安邮电大学学报, 2013,18(3):92~95 Ren F L , Zhu Z X , Wang X . A cloud computing security solution based on fully homomorphic encryption. Journal of Xi'an University of Posts and Telecommunications, 2013,18(3):92~95
|
11 |
Noemi A . Optimizing security of cloud computing within the DOD(master dissertation). Monterey: Naval Postgraduate School, 2010
|
12 |
Kris E B , Jeffrey W H , Robert F M . A case for DoD application of public cloud computing services. Proceedings of the 2011 Military Communications Conference, Maryland, USA, 2011:1888~1893
|
13 |
Timothy K B . A strategic approach to network defense: framing the cloud. Parameters, 2011,(3):43~58
|
14 |
Kretzschmar M , Knuepfer M . Reference security management architecture-guiding governmental and military inter-cloud initiatives. Proceedings of 2011 Military Communications and Information Systems Conference, Canberra,Australia, 2011:391~397
|
15 |
冯登国, 张敏, 张妍 等. 云计算安全研究. 软件学报, 2011,22(1):71~83 Feng D G , Zhang M , Zhang Y , et al. Study on cloud computing security. Journal of Software, 2011,22(1):71~83
|
16 |
李美云, 李剑, 黄超 . 基于同态加密的可信云存储平台. 信息网络安全, 2012,12(9):35~40 Li M Y , Li J , Huang C . A credible cloud storage platform based on homomorphic encryption. Netinfo Security, 2012,12(9):35~40
|
17 |
孙晶晶, 蔡勉, 赵阳 . 基于可信计算的云用户安全模型. 计算机安全, 2012,12(4):19~24 Sun J J , Cai M , Zhao Y . Based on trusted computing user security model for cloud computing. Computer Security, 2012,12(4):19~24
|
18 |
房晶, 吴昊, 白松林 . 云计算的虚拟化安全问题. 电信科学, 2012,28(4):135~140 Fang J , Wu H , Bai S L . Virtualization security issues in cloud computing. Telecommunications Science, 2012,28(4):135~140
|
19 |
李明桂, 肖毅 陈剑锋 等. 基于大数据的安全事件挖掘框架. 通信技术, 2015,48(3):346~350 Li M G , Xiao Y , Chen J F , et al. Big data-based framework for security event mining. Communications Technology, 2015,48(3):346~350
|