[1] |
REINER S , XIAOLAN Z . Design and implementation of a TCG-based integrity measurement architecture[A]. Proc of the 13th USENIX Security Symposium[C]. Berkeley,USA, 2004. 223-238.
|
[2] |
BERGER S , CACERES R , GOLDMAN K A , et al . VTPM: virtualiz-ing the trusted platform module[A]. Proc of the 15th USENIX Security Symposium[C]. Berkeley,USA, 2006. 305-320.
|
[3] |
CHRIS I D , DAVID P , WOLFGANG W , et al . Trusted virtual platforms:a key enabler for converged client devices[A]. Proc of the ACM SIGOPS Operating Systems Review[C]. New York,USA, 2009. 36-43.
|
[4] |
BERGER S , RAMON C , DIMITRIOS P , et al . TVDc: managing security in the trusted virtual datacenter[A]. Proc of ACM SIGOPS Operating Systems Review[C]. New York,USA, 2008. 40-47.
|
[5] |
KRAUTHEIM F J , DHANANJAV S P , DIMITRIOS P , ALAN T S . Introducing the trusted virtual environment module: a new mechanism for rooting trust in cloud computing[A]. Proc of the 3rd International Conference on Trust and Trustworthy Computing[C]. 2010. 211-227.
|
[6] |
王丽娜, 高汉军, 余荣威 等 . 基于信任扩展的可信虚拟执行环境构建方法研究[J]. 通信学报, 2011,32(9):1-8.
|
[7] |
CHEN S Y , WEN Y Y , ZHAO H . Formal analysis of secure bootstrap in trusted computing[A].Proc of the 4th International Conference on Autonomic and Trusted Computing[C]. Berlin,Springer, 2007. 352-360.
|
[8] |
张兴, 黄强, 沈昌祥 . 一种基于无干扰模型的信任链传递分析方法[J]. 计算机学报, 2010,33(1):74-81.
|
[9] |
冯登国, 秦宇 . 可信计算环境证明方法研究[J]. 计算机学报, 2008,31(9):1640-1652. FENG D G . QIN Y . Research on attestation method for trust computing en-vironment[J]. Chinese Journal of Computers, 2008,31(9):1640-1652.
|
[10] |
冯登国, 秦宇 . 一种基于 TCM 的属性证明协议[J]. 中国科学, 2010,53(3):454-464.
|
[11] |
JONATHAN M M G , NING Q , LI Y L , et al . TrustVisor: efficient TCB reduction and attestation[A].Proc of the IEEE Symposium on Security and Privacy[C]. Oakland,USA, 2010. 143-158.
|
[12] |
BURROWS M , ABADI M , NEEDHAM M R . A logic of authentica-tion[A]. Proc of the Royal Society[C]. London,UK, 1989. 233-271.
|
[13] |
ABADI M , FOURNET C . Mobile values,new names,and secure communication[A].Proc of the 28th Symposium on Principles of Pro-gramming Languages[C]. London,ACM, 2001. 104-115.
|
[14] |
GILLES B , GUSTAVO B , JUAN D C , et al . Formally verifying isola-tion and availability in an idealized model of virtualization[A].Proc of the 17th International Conference on Formal Methods[C]. Berlin,Springer, 2011. 231-245.
|
[15] |
DATTA A , FRANKLIN J , GARG D , et al . A logic of secure systems and its application to trusted computing[A]. Proc of the 30th IEEE Symposium on Security and Privacy[C]. Los Alamitos,USA, 2009. 221-236.
|
[16] |
Trusted Computing Group.TCG infrastructure working group archi-tecture part II-integrity management version 1.0[EB/OL]. 2006.
|
[17] |
CABUK S , CHEN L Q , PLAQUIN D , et al . Trusted integrity meas-urement and reporting for virtualized platforms[A]. Proc of the Inter-national Conference on Trusted Systems[C]. Berlin,Springer, 2010. 180-196.
|
[18] |
CHANG D X , CHU X B , QIN Y , et al . TSD: a flexible root of trust for the cloud[A].Proc of the IEEE 11th International Conference on Trust,Security and Privacy in Computing and Communications[C].Liver-pool.Springer, 2012, 119-126.
|
[19] |
Trusted Computing Group.Virtualized trusted platform architecture specification version 1.0[EB/OL]. .
|