Computer Science ›› 2014, Vol. 41 ›› Issue (5): 155-163.doi: 10.11896/j.issn.1002-137X.2014.05.033
Previous Articles Next Articles
LIU Sha and TAN Liang
[1] 刘玮,王丽宏.云计算应用及其安全问题研究[J].计算机研究与发展,2012,49:186-191 [2] 云计算百科.什么是云计算平台?云计算平台有哪些?[EB/OL].http://www.cloudwhy.com/ mingci/2011/0317/128.html,2012-06-12 [3] 韩伟,张福生,胡志勇.基于Hadoop云计算平台下DDoS攻击防御研究[D].太原:太原科技大学,2011,7 [4] Hadoop.[EB/OL].http://hadoop.apache.org/,2012-06-12 [5] Nutch.[EB/OL].http://nutch.apache.org/,2012-06-12 [6] White T.Hadoop:The Definitive Guide(2ndedition)[M].2009-05 [7] it168.com.浅谈Hadoop系统架构与海量数据分析[EB/OL].http://wenku.it168.com/d_ 00076703.shtml,2012-06-12 [8] Becherer A.Attacking Kerberos and the New Hadoop Security Design[EB/OL].http://www.ipma-wa.com/prof_dev/2011/HadoopSecurityDesign_201104_AndrewBecherer.pdf,2012-06-13 [9] Yahoo.Scaling Hadoop to 4000nodes atYahoo! [EB/OL].http://developer.yahoo.com/blogs/hadoop/scaling-hadoop-4000-nodes-yahoo-410.html,2008-09-30 [10] O’Malley O,Zhang Kan,Radia S.Hadoop Security Design[EB/OL].http:/www.valleytalk.org/wp-content/uploads/2013/03/hadoop-security-design.pdf,2009-10 [11] Hadoop Releases[EB/OL].http://hadoop.apache.org/co-mmon/releases.html,2012-06-14 [12] Yahoo,Hadoop 0.20.S Virtual Machine Appliance[EB/OL].http://developer.yahoo.com/blogs/hadoop/hadoop-0-20-virtual-machine-appliance-460.html,2010-06-29 [13] Cloudera.CDH3 Security Guide[EB/OL].https://ccp.clou-dera.com/display/CDHDOC/CDH3+Security+Guide [14] Chang Bao-rong,Tsai H F.Access Security on Cloud Computing Implemented in Hadoop System[C]∥IEEE 2011Fifth International Conference on Genetic and Evolutionary Computing.2010,27:77-80 |
No related articles found! |
|