[1] 覃雄派,王会举,杜小勇,等. 大数据分析——RDBMS与MapReduce的竞争与共生[J]. 软件学报, 2012,23(1):32-45.
[2] Mell P, Grance T. The NIST Definition of Cloud Computing[R]. National Institute of Standards and
Technology, 2011.
[3] Shaftab Ahmed, Azween Abdullah. E-Healthcare and data management services in a cloud[C]// Proc. of High
Capacity Optical Networks and Enabling Technologies(HONET). 2011:248-252.
[4] Dean J, Ghemawat S. MapReduce: Simplified data processing on large clusters[C]// Proc. of the OSDI.
2004:137-150.
[5] 周品. Hadoop云计算实战[M]. 北京: 清华大学出版社, 2012.
[6] Chuck Lam. Hadoop in Action[M]. 韩冀中译. 北京: 人民邮电出版社, 2011.
[7] Tom White. Hadoop: The Definitive Guide[M]. 2nd ed O’Reilly Media, Inc., 2010.
[8] 邹德清,金海,羌卫中,等. 云计算安全挑战与实践[J]. 中国计算机学会通讯, 2011,7(12):55-62.
[9] 〖JP4〗Jason Shih.Hadoop Security Overview-From Security Infrastructure Deployment to High-level Services[
EB/OL]. http://hbtc2012.hadooper.cn/subject/keynotep8shihongliang.pdf, 2012-11-30.
[10]马媛. 基于Hadoop的云计算平台安全机制研究[J]. 信息安全与保密通信, 2012(6):89-92.
[11]The Apache Software Foundation. Service Level Authorization[EB/OL].
http://hadoop.apache.org/docs/r1.1.2/service_level_auth.pdf, 2013-08-04.
[12]Indrajit Roy, Srinath T V Setty, Ann Kilzer, et al. Airavat: Security and privacy for MapReduce [C]//
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation. San Jose, CA, USA: NSDI,
2010:297-312.
[13]周天阳,朱俊虎,王清贤. 基于VMM的Rootkit及其监测技术研究[J]. 计算机科学, 2011,12(38):77-80.
[14]李虹,李昊. 可信云安全的关键技术与实现[M]. 北京:人民邮电出版社, 2010.
[15]梁元. 基于云计算环境下的可信平台设计[D]. 成都:电子科技大学, 2013.
[16]程戈. 基于虚拟机架构的可信计算环境构建机制研究[D]. 武汉:华中科技大学, 2010.
[17]Wright C, Cowan C, Morris J, et al. Linux security module framework[C]// Proc. of the 11th Ottawa Linux
Symposium. 2002:8032. |