[1] |
ALI M , KHAN S U , VASILAKOS A V . Security in cloud computing:opportunities and challenges[J]. Information Sciences, 2015,305: 357-383.
|
[2] |
ABDELBAKI N , RADWAN T , AZER M A . Cloud computing security:challenges and future trends[J]. International Journal of Computer Applications in Technology, 2017,55(2):158.
|
[3] |
KO R K L , JAGADPRAMANA P , MOWBRAY M ,et al. TrustCloud:a framework for accountability and trust in cloud computing[C]// IEEE World Congress on Services. 2011: 584-588.
|
[4] |
KHALIL I , KHREISHAH A , AZEEM M . Cloud computing security:a survey[J]. Computers, 2014,3(1): 1-35.
|
[5] |
KATZ G , ELOVICI Y , SHAPIRA B . CoBAn:a context based model for data leakage prevention[J]. Information Sciences, 2014,262(3): 137-158.
|
[6] |
JANSEN W , GRANCE T . Guidelines on security and privacy in public cloud computing[J]. Journal of E-Governance, 2011,34(3): 149-151.
|
[7] |
赵新泉, 彭勇行 . 管理决策分析[M]. 北京: 科学出版社, 2008.
|
|
ZHANG X Q , PENG Y X . Management decision analysis[M]. Beijing: Science PressPress, 2008.
|
[8] |
MICHAEL J B . Trusted computing:an elusive goal[J]. Computer, 2015,48(3): 99-101.
|
[9] |
BERGER S , GOLDMAN K A , PEREZ R ,et al. vTPM:virtualizing the trusted platform module[C]// Conference on Usenix Security Symposium. 2006:21.
|
[10] |
刘川意, 王国峰, 林杰 ,等. 可信的云计算运行环境构建和审计[J]. 计算机学报, 2016,39(2): 339-350.
|
|
LIU C Y , WANG G F , LIN J ,et al. Practical construction and audit for trusted cloud execution environment[J]. Chinese Journal of Computers, 2016,39(2): 339-350.
|
[11] |
KURSAWE K , SCHELLEKENS D . Flexible muTPMs through disembedding[C]// ACM Symposium on Information,Computer and Communications Security. 2009: 116-124.
|
[12] |
STUMPF F , ECKERT C . Enhancing trusted platform modules with hardware-based virtualization techniques[C]// Second International Conference on Emerging Security Information,Systems and Technologies. 2008: 1-9.
|
[13] |
ENGLAND P , LOESER J . Para-virtualized TPM sharing[C]// International Conference on Trusted Computing and Trust in Information Technologies:Trusted Computing-Challenges and Applications. 2008: 119-132.
|
[14] |
林杰, 刘川意, 方滨兴 . IVirt:基于虚拟机自省的运行环境完整性度量机制[J]. 计算机学报, 2015,38(1): 191-203.
|
|
LIN J , LIU C Y , FANG B X . IVirt:runtime environment integrity measurement mechanism based on virtual machine introspection[J]. Chinese Journal of Computers, 2015,38(1): 191-203.
|
[15] |
SAILER R , ZHANG X , JAEGER T ,et al. Design and implementation of a TCG-based integrity measurement architecture[C]// Conference on Usenix Security Symposium. 2004:16.
|
[16] |
杜瑞忠, 王少泫, 田俊峰 . 基于封闭环境加密的云存储方案[J]. 通信学报, 2017,38(7): 1-10.
|
|
DU R Z , WANG S X , TIAN J F . Cloud storage scheme based on closed-box encryption[J]. Journal on Communications, 2017,38(7): 1-10.
|
[17] |
郭晓勇, 付安民, 况博裕 ,等. 基于收敛加密的云安全去重与完整性审计系统[J]. 通信学报, 2017,38(S2): 156-163.
|
|
GUO X Y , FU A M , KUANG B Y ,et al. Secure deduplication and integrity audit system based on convergent encryption for cloud storage[J]. Journal on Communications, 2017,38(S2): 156-163.
|
[18] |
王惠峰, 李战怀, 张晓 ,等. 云存储中数据完整性自适应审计方法[J]. 计算机研究与发展, 2017,54(1): 172-183.
|
|
WANG H F , LI Z H , ZHANG X ,et al. A self-adaptive audit method of data integrity in the cloud storage[J]. Journal of Computer Research and Development, 2017,54(1): 172-183.
|
[19] |
KOLHAR M ABU-ALHAJ M M EL-ATTY S M A . Cloud data auditing techniques with a focus on privacy and security[J]. IEEE Security & Privacy, 2017,15(1): 42-51.
|
[20] |
RODRIGUEZ A , ORTEGA P , CONCEPCION R . An intuitionistic method for the selection of a risk management approach to information technology projects[J]. Information Sciences, 2017,375: 202-218.
|
[21] |
张玉清, 王晓菲, 刘雪峰 . 云计算环境安全综述[J]. 软件学报, 2016,27(6): 1328-1348.
|
|
ZHANG Y Q , WANG X F , LIU X F . Survey on cloud computing security[J]. Journal of Software, 2016,27(6): 1328-1348.
|
[22] |
叶厚元 . 统计学原理与分析[M]. 武汉: 武汉理工大学出版社, 2012.
|
|
YE H Y . Statistical principle and analysis[M]. Wuhan: University of Technology PressPress, 2012.
|
[23] |
李保珲, 徐克付, 张鹏 . 虚拟机自省技术研究与应用进展[J]. 软件学报, 2016,27(6): 1384-1401.
|
|
LI B H , XU K F , ZHANG P . Research and application progress of virtual machine introspection technology[J]. Journal of Software, 2016,27(6): 1384-1401.
|
[24] |
YU P , XIA M , LIN Q ,et al. Real-time enhancement for Xen hypervisor[C]// IEEE. 2010.
|
[25] |
HOLIK F , HORALEK J , MARIK O ,et al. Effective penetration testing with metasploit framework and methodologies[C]// IEEE,International Symposium on Computational Intelligence and Informatics. 2015: 237-242.
|
[26] |
ABBOTT M L , FISHER M T . The art of scalability:scalable Web architecture,processes,and organizations for the modern enterprise[M]. Addison-Wesley Professional. 2009.
|