[1] |
陈康, 郑纬民 . 云计算:系统实例与研究现状[J]. 软件学报, 2009,20(5): 1337-1348.
|
|
CHEN K , ZHENG WM . Cloud computing:system instances and current research[J]. Journal of Software, 2009,20(5): 1337-1348.
|
[2] |
Common criteria for information technology security evaluation part 2:security functional requirement,version 2.2[S]. 2004.
|
[3] |
Common criteria for information technology security evaluation part 3:security assurance requirements; version 2.2[S]. 2004.
|
[4] |
NIELSEN F . Approaches to security metrics[C]//CSSPAB Work-shop on Approaches to Measuring Security. IEEE Security & Privacy, c2000.
|
[5] |
Cloud Security Alliance(CSA). Security guidance for critical areas of focus in cloud computing V3.0[EB/OL]. .
|
[6] |
AVI?IENIS A , LAPRIE J C , RANDELL B , et al. Basic concepts and taxonomy of dependable and secure computing[J]. IEEE Transactions on Dependable & Secure Computing, 2004,1(1): 11-33.
|
[7] |
TCG Group. TCG specification architecture overview[J]. TCG Specification Revision, 2007,1: 1-24.
|
[8] |
SAILER R , ZHANG X , JAEGER T , et al. Design and implementa-tion of a TCG-based integrity measurement architecture[C]//Usenix Security Symposium. IEEE Security & Privacy, c2004:16-16.
|
[9] |
JAEGER T , SAILER R , SHANKAR U . PRIMA:policy-reduced integrity measurement architecture[C]//The 11th ACM Symposium on Access Control Models and Technologies. c2006:19-28.
|
[10] |
LOSCOCCO P A , WILSON P W , PENDERGRASS J A , et al. Linux kernel integrity measurement using contextual inspection[C]//ACM Workshop on Scalable Trusted Computing. c2007:21-29.
|
[11] |
AZAB A M , NING P , SEZER E C , et al. HIMA:a hypervisor-based integrity measurement agent[C]// IEEE Computer Security Appli-cations Conference. c2009:461-470.
|
[12] |
AZAB A M , NING P , WANG Z , et al. HyperSentry:enabling stealthy in-context measurement of hypervisor integrity[C]//ACM Conference on Computer and Communications Security(CCS). c2010:38-49.
|
[13] |
刘孜文, 冯登国 . 基于可信计算的动态完整性度量架构[J]. 电子与信息学报, 2010,32(4): 875-879.
|
|
LIU Z W , FENG D G . TPM-based dynamic integrity measurement architecture[J]. Journal of Electronics and Information Technology, 2010,32(4): 875-879.
|
[14] |
冯登国, 秦宇, 汪丹, 等. 可信计算技术研究[J]. 计算机研究与发展, 2011,48(8): 1332-1349.
|
|
FENG D G , QIN Y , WANG D , et al. Research on trusted computing technology[J]. Journal of Computer Research and Development, 2011,48(8): 1332-1349.
|
[15] |
林闯, 苏文博, 孟坤, 等. 云计算安全:架构、机制与模型评价[J]. 计算机学报, 2013,36(9): 1765-1784.
|
|
LIN C , SU W B , MENG K , et al. Cloud computing security:archi-tecture,mechanism and modeling[J]. Chinese Journal of Computers, 2013,36(9): 1765-1784.
|
[16] |
周振吉, 吴礼发, 洪征, 等. 云计算环境下的虚拟机可信度量模型[J]. 南大学学报(自然科学版), 2014(1): 45-50.
|
|
ZHOU Z J , WU L F , HONG Z , et al. Trustworthiness measurement model of virtual machine for cloud computing[J]. Journal of Southeast University(Natural Science Edition), 2014(1): 45-50.
|