[1] |
冯登国, 秦宇, 汪丹 ,等. 可信计算技术研究[J]. 计算机研究与发展, 2011,48(8): 1332-1349.
|
|
FENG D G , QIN Y , WANG D ,et al. Research on trusted computing technology[J]. Journal of Computer Research & Development, 2011,48(8): 1332-1349.
|
[2] |
SHEN C X , ZHANG H G , WANG H M ,et al. Research on trusted computing and its development[J]. Science in China Series F (Information Science), 2010,53(3): 405-433.
|
[3] |
ZHANG H G , LUO J G , JIN G ,et al. Development of trusted computing research[J]. Wuhan University Journal of Natural Sciences, 2006,11(6): 1407-1413.
|
[4] |
陈广勇, 祝国邦, 范春玲 . 《信息安全技术网络安全等级保护测评要求》(GB/T 28448-2019)标准解读[J]. 信息网络安全, 2019,19(7): 1-7.
|
|
CHEN G Y , ZHU G B , FAN C L . Information security technology—evaluation requirement for classified protection of cyber security(GB/T 28448-2019)standard interpretation[J]. Netinfo Security, 2019,19(7): 1-8.
|
[5] |
何欣枫, 田俊峰, 刘凡鸣 . 可信云平台技术综述[J]. 通信学报, 2019,40(2): 158-167.
|
|
HE X F , TIAN J F , LIU F M . Survey on trusted cloud platform technology[J]. Journal on Communications, 2019,40(2): 158-167.
|
[6] |
刘川意, 王国峰, 林杰 ,等. 可信的云计算运行环境构建和审计[J]. 计算机学报, 2016,39(2): 339-350.
|
|
LIU C Y , WANG G F , LIN J ,et al. Practical construction and audit for trusted cloud execution environment[J]. Chinese Journal of Computers, 2016,39(2): 339-350.
|
[7] |
BAI G , HAO J , WU J ,et al. TrustFound:towards a formal foundation for model checking trusted computing platforms[C]// International Symposium on Formal Methods. 2014.
|
[8] |
VON BOMHARD N , AHLBORN B , MASON C ,et al. The trusted server:a secure computational environment for privacy compliant evaluations on plain personal data[J]. Plos One, 2018,13(9): 1-19.
|
[9] |
吴奇烜, 马建峰, 孙聪 . 采用完整性威胁树的信息流完整性度量方法[J]. 网络与信息安全学报, 2019,5(2): 50-57.
|
|
WU Q X , MA J F , SUN C . Information flow integrity measurement method using integrity threat tree[J]. Chinese Journal of Network and Information Security, 2019,5(2): 50-57.
|
[10] |
胡浩, 刘玉岭, 张玉臣 ,等. 基于攻击图的网络安全度量研究综述[J]. 网络与信息安全学报, 2018,4(9): 1-16.
|
|
HU H , LIU Y L , ZHANG Y C ,et al. Survey of attack graph based network security metric[J]. Chinese Journal of Network and Information Security, 2018,4(9): 1-16.
|
[11] |
田俊峰, 常方舒 . 基于 TPM 联盟的可信云平台管理模型[J]. 通信学报, 2016,37(2): 1-10.
|
|
TIAN J F , CHANG F S . Trusted cloud platform management model based on TPM alliance[J]. Journal on Communications, 2016,37(2): 1-10.
|
[12] |
LI Y H , ZHANG Y D , LI P ,et al. An efficient trusted chain model for real-time embedded systems[C]// International Conference on Computational Intelligence & Security. 2016.
|
[13] |
CONG W N , CAO K . Enabling secure and efficient ranked keyword search over outsourced cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2012,23(23): 1467-1479.
|
[14] |
沈昌祥, 张大伟, 刘吉强 ,等. 可信 3.0 战略:可信计算的革命性演变[J]. 中国工程科学, 2016,18(6): 53-57.
|
|
SHEN C X , ZHANG D Q W , LIU J G ,et al. The strategy of TC 3.0:a revolutionary evolution in trusted computing[J]. Strategic Study of CAE, 2016,18(6): 53-57.
|
[15] |
张兴, 黄强, 沈昌祥 . 一种基于无干扰模型的信任链传递分析方法[J]. 计算机学报, 2010,33(1): 74-81.
|
|
ZHANG X , HUANG Q , SHEN C X ,et al. A formal method based on noninterference for analyzing trust chain of trusted computing platform[J]. Chinese Journal of Computers, 2010,33(1): 74-81.
|
[16] |
郭颖, 毛军捷, 张翀斌 ,等. 基于可信平台控制模块的主动度量方法[J]. 清华大学学报(自然科学版), 2012,52(10): 1465-1473.
|
|
GUO Y , MAO J J , ZHANG C B ,et al. Active measures based on a trusted platform control module[J]. Journal of Tsinghua University, 2012,52(10): 1465-1473.
|
[17] |
王勇, 许荣强, 任兴田 ,等. 可信计算中信任链建立的形式化验证[J]. 北京工业大学学报, 2016,42(3): 387-392.
|
|
WANG Y , XU R Q , REN X T ,et al. Formal verification of establishment of chain of trust in trusted computing[J]. Journal of Beijing University of Technology, 2016,42(3): 387-392.
|
[18] |
HUANG G , YANG B . Research and improvement on PXE security of dynamic distributed network of non-fixed disk[J]. Journal of Computers, 2012,7(7): 1681-1687.
|