[1] |
覃雄派,王会举,杜小勇,等. 大数据分析——RDBMS与MapReduce的竞争与共生[J]. 软件学报, 2012,23(1):32-45.
|
[2] |
Mell P, Grance T. The NIST Definition of Cloud Computing[R]. National Institute of Standards and
|
|
Technology, 2011.
|
[3] |
Shaftab Ahmed, Azween Abdullah. E-Healthcare and data management services in a cloud[C]// Proc. of High
|
|
Capacity Optical Networks and Enabling Technologies(HONET). 2011:248-252.
|
[4] |
Dean J, Ghemawat S. MapReduce: Simplified data processing on large clusters[C]// Proc. of the OSDI.
|
20 |
04:137-150.
|
[5] |
周品. Hadoop云计算实战[M]. 北京: 清华大学出版社, 2012.
|
[6] |
Chuck Lam. Hadoop in Action[M]. 韩冀中译. 北京: 人民邮电出版社, 2011.
|
[7] |
Tom White. Hadoop: The Definitive Guide[M]. 2nd ed O’Reilly Media, Inc., 2010.
|
[8] |
邹德清,金海,羌卫中,等. 云计算安全挑战与实践[J]. 中国计算机学会通讯, 2011,7(12):55-62.
|
[9] |
〖JP4〗Jason Shih.Hadoop Security Overview-From Security Infrastructure Deployment to High-level Services[
|
|
EB/OL]. http://hbtc2012.hadooper.cn/subject/keynotep8shihongliang.pdf, 2012-11-30.
|
[10] |
马媛. 基于Hadoop的云计算平台安全机制研究[J]. 信息安全与保密通信, 2012(6):89-92.
|
[11] |
The Apache Software Foundation. Service Level Authorization[EB/OL].
|
|
http://hadoop.apache.org/docs/r1.1.2/service_level_auth.pdf, 2013-08-04.
|
[12] |
Indrajit Roy, Srinath T V Setty, Ann Kilzer, et al. Airavat: Security and privacy for MapReduce [C]//
|
|
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation. San Jose, CA, USA: NSDI,
|
20 |
10:297-312.
|
[13] |
周天阳,朱俊虎,王清贤. 基于VMM的Rootkit及其监测技术研究[J]. 计算机科学, 2011,12(38):77-80.
|
[14] |
李虹,李昊. 可信云安全的关键技术与实现[M]. 北京:人民邮电出版社, 2010.
|
[15] |
梁元. 基于云计算环境下的可信平台设计[D]. 成都:电子科技大学, 2013.
|
[16] |
程戈. 基于虚拟机架构的可信计算环境构建机制研究[D]. 武汉:华中科技大学, 2010.
|
[17] |
Wright C, Cowan C, Morris J, et al. Linux security module framework[C]// Proc. of the 11th Ottawa Linux
|
|
Symposium. 2002:8032.
|