Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Liaoning Teachers College(Natural Science Edition)》 2015-01
Add to Favorite Get Latest Update

Research into the architecture design of cloud-based software platform

CONG Ming;Fushun Teachers College;  
Software architecture can be seen as the backbone of the cloud computing.Present cloud computing uses the three-tier architecture model as its soft architecture.However,application of the three-tier architecture to the cloud computing gives rise to the failure of client data access and storage as well as the sync error.Considering this,a better designed and improved architecture is needed to support the development and application of the cloud computing.
【CateGory Index】: TP311.52
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 1 Hits
1 FENG Deng-Guo,ZHANG Min+,ZHANG Yan,XU Zhen(State Key Laboratory of Information Security,Institute of Software,The Chinese Academy of Sciences,Beijing 100190,China);Study on Cloud Computing Security[J];Journal of Software;2011-01
Chinese Journal Full-text Database 10 Hits
1 Guo Chen(The People's Bank of China Central Subbranch in Dalian Technology Statistics LiaoningDalian 116001);How to Resolve the Potential Risk of Cloud Computing[J];Information Security and Technology;2012-03
2 YANG Zheng-xiao1 YANG Yang2 (1.CHien-shiun Polytechnic,Taicang 215411 2.Nantong University,Nantong 226019,China);The Research and Development of Production and Teaching Platform Based on Cloud Computing[J];Journal of Changzhou Vocational College of Information Technology;2012-01
3 LI Wei (China Mobile Group Design Institute Co.,Ltd.,Beijing 100080,China);Study and exploration on cloud computing security[J];Telecom Engineering Technics and Standardization;2012-04
4 GENG Yan(Inventec(Tianjin) electronic technology limited company,Tianjin 300193);Cloud Database Security Problem Analysis[J];Computer Programming Skills & Maintenance;2012-08
5 HU Heng-wu,ZHANG Jun-lan,LI Min (1.School of Information Engineering,Guangdong Medical College,Dongguan 523808,China 2.Center of Network and Information,University of South China,Hengyang 421000,China);Research on Construction of Platform for Digital Experiment Teaching on Anatomy[J];Computer and Information Technology;2012-03
6 LIU Kai-hua,LI Xiong (Information Occupation Technique Institute of Hunan,Changsha 410001,China);Analyze the Security Model and Policy of Cloud Computing[J];Computer Knowledge and Technology;2011-08
7 LI Song-tao,HU Heng-wu(Guangdong Medical College,Zhanjiang 524023,China);Application of Intrusion tolerance PKI in Cloud Database[J];Computer Knowledge and Technology;2011-17
8 HUANG Hua(Qingyuan Polytechnic,Qingyuan 511500,China);Cloud Computing Security Key Technologies[J];Computer Knowledge and Technology;2011-23
9 HAN Zhi-hong,ZENG Qing-yan,DU Yan-tao,WANG Zi-hu,ZHANG Huan-le(Cloud Computing Institute,Yuzhou Academy of technology,Xinyu 338029,China);Economic Analysis on the Cloud Computing Terminal Architecture Model of E-reading Room and its Practice[J];Computer Knowledge and Technology;2012-03
10 LIU Chao1,2,SUN Fu-quan2,CHENG Xu2(1.School of Information Science and Technology,Dalian Maritime University,Dalian 116026,China;2.Neusoft Institute of Information,Dalian 116023,China);Security Research On Cloud-based Logistics Service Platform[J];Computer Knowledge and Technology;2012-09
China Proceedings of conference Full-text Database 9 Hits
1 ;Security Integration Scheme of Cloud Computing Infrastructure Based on Trust Computing Technology[A];[C];2012
2 ZHANG Da-jun~1,LI Yun-fa~2,ZHENG Zhou (1.Ningbo Public Security Bureau,Ningbo Zhejiang 315000,China; 2.School of Computer Science and Technology,Hangzhou Dianzi University,Hangzhou Zhejiang 310018,China);A Secure Sharing Mechanism for Data Resources in Cloud Computing[A];[C];2012
3 DUAN Yi-zhen~(1,2),WANG Xiao-cheng~1,LIU Zhong~2 (1.Institute 706 of Second Academy of China Aerospace Science and Industry Corporation,Beijing 100854,China; 2.Chengdu Institute of Computer Application Chinese Academy of Sciences,Chengdu Sichuan 610041,China);Cloud Computing Security:Concept,Status and Key Technologies[A];[C];2012
4 ZHONG Rui-ming~(1,2),LIU Chuan-yi~(2,3),FANG Bin-xing~(1,2),XIANG Fei~(1,2) (1.School of Computer Science,Beijing University of Posts and Telecommunications,Beijing,100876,China: 2.Key Laboratory ofTrustworthy Distributed Computing and Service of the Ministry of Education of China,Beijing University of Posts and Telecommunications,Beijing,100876,China; 3.School of Software Engineering,Beijing University of Posts and Telecommunications,Beijing,100876,China);A Cost-aware Data Reliability Provision Algorithm for the Cloud Providers[A];[C];2012
5 Zhou Zeyan 1 Ma Chaoqun 2 Fu Weilin 3 Zhang Yan 1 (1.Institute of Computing Technologies ChinaAcademy of Railway Sciences, Beijing, 100081; 2.Department of power supply of Beijing Railway Bureau, Beijing, 100860 3.Department of infrastructure woks of Beijing Railway Bureau, Tangshan, 06400);STUDY on RAILWAY TICKETING SYSTEM BASED on CLOUD COMPUTING and SECURITY STRATEGY[A];[C];2013
6 SONG Guo-feng~(1,2),LIANG Chang-yong~(1,2) (1.School of Management,Hefei University of Technology,Hefei 230009,China; 2.Key Laboratory of Process Optimization and Intelligent Decision - making,Ministry of Education,Hefei 230009,China);A Security Access Control Model Based on User Behavior Trust under Cloud Environment[A];[C];2013
7 ZHOU Yuguang;CHEN Zhenyi;SHENG ZhongHua;Department of Information Management,China Overseas Holdings Ltd.;;Explore the Utilization of cloud Computing Technology in Enterprise Informationization[A];[C];2014
8 WU Yu-xiang;LI Ning-bin;JIN Xin;LOU Ye;Chinese People's Public Security University;;Electronic Evidence and Forensic Analysis System Design of IaaS Cloud Service-oriented Infrastructure Preservation[A];[C];2014
9 XIONG Lizhi;XU Zhengquan;GU Xin;State Key Laboratory of Information Engineering in Surveying,Mapping and Remote Sensing,Wuhan University;;Trusted Secure Model for Data Services in Cloud Computing[A];[C];2013
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved