[1] |
Bai Yong,Zhu Qingxin.The iSCSI—based IP SAN network storage technology and its security research[J].
|
|
Journal of Computer Research and Development,2009,46(z2):1217.(in Chinese)
|
[2] |
RFC3720[EB/OL].[20150513].ttps://tools.ietf.org/html/rfc3720.
|
[3] |
Huang Jianzhong,Xie Changsheng,Li Xu.iOBS3:An iSCSIbased object storage security system[C]∥Proc of International Conference on Computational Intelligence and Security,2006:14421445.
|
[4] |
Kang Zhengning. Research and implementation of IPSAN and its authentication system based on CHAP[D].Shanghai Jiao Tong University,2007.(in Chinese)
|
[5] |
He Jun,Dai Hao,Ma Linru.Research and implementation of secure iSCSI based on SSL[J].Computer Engineeing,2008,34(2):9799.(in Chinese)
|
[6] |
Ren Xing,Han Jun,Zhang Laishun.Design and implementation of iSCSIbased encryption storage area network model[J].Computer Engineering and Design,2009,30(4):876879.(in Chinese)
|
[7] |
iSCSI protocol ratified by IETF[EB/OL].[20150513].http://www.ietf.org.
|
[8] |
iSCSI technology white paper[EB/OL].[20150513].http://www.ietf.org.
|
[9] |
Niu Zhi.Study on performance of scheduling algorithms with iSCSI traffic [D].Hangzhou:Zhejiang University,2008.(in Chinese)
|
[10] |
CSDN[EB/OL].[20150513].http://blog.csdn.net/kidd_3/article/details/7670415.
|
[11] |
Zeng Dong,Zhou Jingli.Design and implementation of iSCSI target[J].Journal of Chinese Computer Systems,2005,26(4):582584.(in Chinese)
|
[12] |
Zhou Jingli,Zhang Wei,Yu Shengsheng.Design and implementation of storage manager in iSCSI SAN[J].Computer Engineering and Applications,2004,40(12):9699.(in Chinese)
|
[13] |
Pan Jiaming,Shu Jiwu,Zhang Suqin,et al.Design and implementation of SCSI target emulator[J].Tsinghua Science and Technology,2006,11(1):3843.
|
[14] |
Zha Qiwen,Zhang Wu,Zeng Xuewen.Research and implementation of iSCSI initiator on multicore network processor[J].Computer Engineering,2014,40(5):304308.(in Chinese)
|
[15] |
Ao Qingyun. Analysis on principle of storage technology:Based on Linux kernel 2.6[M].Beijing:Publishing House of Electronics Industry,2011.(in Chinese)
|
|
附中文参考文献:
|
[1] |
白勇,朱清新.基于iSCSI的IP SAN网络存储技术及其安全性研究[J].计算机研究与发展.2009,46(z2):1217.
|
[4] |
康正宁.基于CHAP协议的安全IP SAN系统的研究与实现[D].上海:上海交通大学,2007.
|
[5] |
何俊,戴浩,马琳茹.基于SSL的安全iSCSI技术研究与实现[J].计算机工程.2008,34(2):9799.
|
[6] |
任星,韩军,张来顺.基于iSCSI协议的加密存储区域网模型设计与实现[J].计算机工程与设计.2009,30(4):876879.
|
[9] |
牛智.针对iSCSI数据流的队列调度算法性能研究[D].杭州:浙江大学,2008.
|
[11] |
曾东,周敬利.iSCSI target的设计与实现[J].小型微型计算机系统,2005,26(4):582584.
|
[12] |
周敬利,张威,余胜声.iSCSI SAN中存储管理器的设计与实现[J].计算机工程与应用,2004,40(12):9699.
|
[14] |
查奇文,张武,曾学文.多核网络处理器iSCSI发起端研究与实现[J].计算机工程,2014,40(5):304308.
|
[15] |
敖青云.存储技术原理分析:基于Linux 2.6内核源代码[M].北京:电子工业出版社,2011.
|