| ²é¿´: 490 | »Ø¸´: 6 | |||
| ±¾Ìû²úÉú 1 ¸ö £¬µã»÷ÕâÀï½øÐв鿴 | |||
| µ±Ç°Ö»ÏÔʾÂú×ãÖ¸¶¨Ìõ¼þµÄ»ØÌû£¬µã»÷ÕâÀï²é¿´±¾»°ÌâµÄËùÓлØÌû | |||
Q_2016½ð³æ (ÖøÃûдÊÖ)
|
[ÇóÖú]
Çó´óÏÀ°ïæ¿´ÏÂÎÒµÄÂÛÎÄEI¼ìË÷ÁËÂð£¿
|
||
| Research on Applied Technology for Computer Network Security Under Cloud Computing Environment |
» ²ÂÄãϲ»¶
272·Ö²ÄÁÏ×ÓÇóµ÷¼Á
ÒѾÓÐ47È˻ظ´
085404 293Çóµ÷¼Á
ÒѾÓÐ9È˻ظ´
һ־Ըн®´óѧ085401£¬314·Ö
ÒѾÓÐ4È˻ظ´
²ÄÁÏÓ뻯¹¤300Çóµ÷¼Á
ÒѾÓÐ43È˻ظ´
290Çóµ÷¼Á
ÒѾÓÐ6È˻ظ´
Çóµ÷¼Á£¬Ò»Ö¾Ô¸²ÄÁÏ¿ÆÑ§Ó빤³Ì985£¬365·Ö£¬
ÒѾÓÐ9È˻ظ´
ɽ¶«¸ßУ½Ìʦ¿¼ºË³¬¼¶ÎÞµ×Ïߣ¬Ô±¹¤¹ý²»ÏÂÈ¥À²
ÒѾÓÐ9È˻ظ´
085410 273Çóµ÷¼Á
ÒѾÓÐ9È˻ظ´
297Çóµ÷¼Á
ÒѾÓÐ16È˻ظ´
291Çóµ÷¼Á
ÒѾÓÐ11È˻ظ´

lazy½õϪ
°æÖ÷ (ÖªÃû×÷¼Ò)
- Ó¦Öú: 155 (¸ßÖÐÉú)
- ¹ó±ö: 2.371
- ½ð±Ò: 26118.4
- É¢½ð: 15360
- ºì»¨: 180
- ɳ·¢: 15
- Ìû×Ó: 5537
- ÔÚÏß: 1929.5Сʱ
- ³æºÅ: 2046157
- ×¢²á: 2012-10-06
- ÐÔ±ð: GG
- רҵ: ¹¦ÄÜÓëÖÇÄܸ߷Ö×Ó
- ¹ÜϽ: ¼ìË÷֪ʶ
¡¾´ð°¸¡¿Ó¦Öú»ØÌû
¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï
Q_2016: ½ð±Ò+20, ¡ï¡ï¡ï¡ï¡ï×î¼Ñ´ð°¸, ллÄúµÄ°ïÖú£¡ 2016-03-21 13:10:44
Ðľ²_ÒÀÈ»: LS-EPI+1, ¸ÐлӦÖú 2016-03-21 13:56:16
Q_2016: ½ð±Ò+20, ¡ï¡ï¡ï¡ï¡ï×î¼Ñ´ð°¸, ллÄúµÄ°ïÖú£¡ 2016-03-21 13:10:44
Ðľ²_ÒÀÈ»: LS-EPI+1, ¸ÐлӦÖú 2016-03-21 13:56:16
|
SCIÒѱ»¼ìË÷ EIδ¼ìË÷µ½ |
6Â¥2016-03-21 11:49:31
lazy½õϪ
°æÖ÷ (ÖªÃû×÷¼Ò)
- Ó¦Öú: 155 (¸ßÖÐÉú)
- ¹ó±ö: 2.371
- ½ð±Ò: 26118.4
- É¢½ð: 15360
- ºì»¨: 180
- ɳ·¢: 15
- Ìû×Ó: 5537
- ÔÚÏß: 1929.5Сʱ
- ³æºÅ: 2046157
- ×¢²á: 2012-10-06
- ÐÔ±ð: GG
- רҵ: ¹¦ÄÜÓëÖÇÄܸ߷Ö×Ó
- ¹ÜϽ: ¼ìË÷֪ʶ
¡¾´ð°¸¡¿Ó¦Öú»ØÌû
¸Ðл²ÎÓ룬ӦÖúÖ¸Êý +1
|
Research on Applied Technology for Computer Network Security Under Cloud Computing Environment ×÷Õß:Xu, HL (Xu, Haili) Êé¼®ÍÅÌå×÷Õß estech Publicati Inc4TH INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING FOR ADVANCED TECHNOLOGIES (ICMEAT 2015) Ò³: 529-532 ³ö°æÄê: 2015 »áÒéÃû³Æ »áÒé: 4th International Conference on Materials Engineering for Advanced Technologies (ICMEAT) »áÒ鵨µã: London, ENGLAND »áÒéÈÕÆÚ: JUN 27-28, 2015 ÕªÒª Cloud computing has brought us convenience to enjoy the sharing of resources in the network, but the potential network security risks should not be underestimated. This paper firstly analyzes the network security problems under cloud computing environment, and then discusses the information security technology in network. The measures for strengthening the security of computer networks are proposed finally. ¹Ø¼ü´Ê ×÷Õ߹ؼü´Ê:Cloud computing; Network security; Application technology ×÷ÕßÐÅÏ¢ ͨѶ×÷ÕßµØÖ·: Xu, HL (ͨѶ×÷Õß) [ÏÔʾÔöÇ¿×éÖ¯ÐÅÏ¢µÄÃû³Æ] Heilongjiang Univ Chinese Med, Jiamusi Coll, Jiamusi 154007, Peoples R China. µØÖ·: [ÏÔʾÔöÇ¿×éÖ¯ÐÅÏ¢µÄÃû³Æ] [ 1 ] Heilongjiang Univ Chinese Med, Jiamusi Coll, Jiamusi 154007, Peoples R China ³ö°æÉÌ DESTECH PUBLICATIONS, INC, 439 DUKE STREET, LANCASTER, PA 17602-4967 USA Àà±ð / ·ÖÀà Ñо¿·½Ïò:Materials Science Web of Science Àà±ð:Materials Science, Multidisciplinary ÎÄÏ×ÐÅÏ¢ ÎÄÏ×ÀàÐÍ roceedings PaperÓïÖÖ:English Èë²ØºÅ: WOS:000361105400116 ISBN:978-1-60595-242-0 ÆäËûÐÅÏ¢ IDS ºÅ: BD4TZ Web of Science ºËÐĺϼ¯ÖÐµÄ "ÒýÓõIJο¼ÎÄÏ×": 3 Web of Science ºËÐĺϼ¯ÖÐµÄ "±»ÒýƵ´Î": 0 |
2Â¥2016-03-20 23:45:38
lazy½õϪ
°æÖ÷ (ÖªÃû×÷¼Ò)
- Ó¦Öú: 155 (¸ßÖÐÉú)
- ¹ó±ö: 2.371
- ½ð±Ò: 26118.4
- É¢½ð: 15360
- ºì»¨: 180
- ɳ·¢: 15
- Ìû×Ó: 5537
- ÔÚÏß: 1929.5Сʱ
- ³æºÅ: 2046157
- ×¢²á: 2012-10-06
- ÐÔ±ð: GG
- רҵ: ¹¦ÄÜÓëÖÇÄܸ߷Ö×Ó
- ¹ÜϽ: ¼ìË÷֪ʶ
3Â¥2016-03-20 23:45:48
Q_2016
½ð³æ (ÖøÃûдÊÖ)
- Ó¦Öú: 4 (Ó×¶ùÔ°)
- ½ð±Ò: 2069.5
- ɳ·¢: 1
- Ìû×Ó: 1383
- ÔÚÏß: 31Сʱ
- ³æºÅ: 4497173
- ×¢²á: 2016-03-12
- ÐÔ±ð: GG
- רҵ: ¼ÆËã»úÍøÂç

4Â¥2016-03-21 09:34:17













»Ø¸´´ËÂ¥
estech Publicati Inc
roceedings Paper