[1] |
冯登国, 张敏, 张妍 ,等. 云计算安全研究[J]. 软件学报, 2011,22(1): 71-83. FENG D G , ZHANG M , ZHANG Y ,et al. Study on cloud computing security[J]. Journal of Software, 2011,22(1): 71-83.
|
[2] |
黄瑛, 石文昌 . 云基础设施安全性研究综述[J]. 计算机科学, 2011,38(7): 24-30. HUANG Y , SHI W C . Survey of research on cloud infrastructure security[J]. Computer Science, 2011,38(7): 24-30.
|
[3] |
SANTOS N , GUMMADI K P , RODRIGUES R . Towards trusted cloud computing[A]. Proc of the Workshop on Hot Topics in Cloud Computing[C]. 2009.
|
[4] |
Architecture for Managing Clouds[EB/OL]. .
|
[5] |
ABBADI I , RUAN A . Towards trustworthy resouce scheduling in clouds[J]. Information Forensics and Security,IEEE Transactions on, 2013,8(6): 973-984.
|
[6] |
JOSHUA S , THOMAS M , HAYAWARDH V ,et al. Seeding Clouds with Trust Anchors[R]. Network and Security Research Center, 2010.
|
[7] |
Trusted Computing Group-TCG Architecture Overview,Version 1.4[EB/OL]. .
|
[8] |
GARFINKEL T , PFAFF B , CHOW J ,et al. Terra:a virtual machine-based platform for trusted computing[J]. ACM SIGOPS Operating Systems Review, 2003,37(5): 193-206.
|
[9] |
怀进鹏, 李沁, 胡春明 . 基于虚拟机的虚拟计算环境研究与设计[J]. 软件学报, 2007,18(8): 2016-2026. HUAI J P , LI Q , HU C M . Research and design on hypervisor based virtual computing enviroment[J]. Journal of Software, 2007,18(8): 2016-2026.
|
[10] |
BERGER S , CACERES R , PENDARAKIS D E ,et al. TVDc:managing security in the trusted virtual datacenter[J]. Operating Systems Review, 2008,42(1): 40-47.
|
[11] |
KELLER E , SZEFER J , REXFORD J ,et al. NoHype:virtualized cloud infrastructure without the virtualization[A]. Proc of the 37th Annual International Symposium on Computer Architecture[C]. 2010.
|
[12] |
VMware GSX server[EB/OL]. .
|
[13] |
GRIFFIN J , JAEGER T , PEREZ R ,et al. Trusted virtual domains:toward secure distributed services[A]. Proc of the First Workshop on Hot Topics in Systems Dependability[C]. 2005.
|
[14] |
BUSSANI A , GRIFFIN J , JANSEN B ,et al. Trusted Virtual Domains:Secure Foundations for Business and It Services[R]. IBM Research, 2005.
|
[15] |
ABADI M , TUTTLE M R . A semantics for a logic of authentication[A]. Proc of the Tenth Annual ACM Symposium on Principles of Distributed Computing[C]. 1991.
|
[16] |
BARHAM P , DRAGOVIC B , FRASER K ,et al. Xen and the art of virtualization[A]. Proc of the Nineteenth ACM Symposium on Operating Systems Principles, 2003.
|
[17] |
ZHOU Z J , WU L F , HONG Z . Context-aware access control model for cloud computing[J]. Journal of Grid and Distributed Computing, 2013,6(6): 1-12.
|
[18] |
ZHOU Z J , WU L F , HONG Z ,et al. DTSTM:dynamic tree style trust measurement model for cloud computing[J]. KSII Transactions on Internet and Information Systems, 2014,8(1): 305-325.
|
[19] |
Openstack open source cloud computing software[EB/OL]. .
|
[20] |
KAUFMAN L M . Can public cloud security meet its unique challenges[J]. IEEE Security and Privacy, 2010,8(4): 55-57.
|
[21] |
Dm-crypt:a device-mapper crypto target[EB/OL]. .
|
[22] |
Help protect your files using Bitlocker drive encryption[EB/OL]. .
|