[1] |
中国电子技术标准化研究所.云计算标准研究报告[R]. 2010.
|
|
China Electronics Standardization Institute. Cloud computing standards research report[R]. 2010.
|
[2] |
王惠莅, 杨晨, 杨建军 . 云计算安全和标准研究[J]. 信息技术与标准化, 2012(5): 16-19.
|
|
WANG H L , YANG C , YANG J J . Information security and standard of cloud computing[J]. Information Technology & Standardization, 2012(5): 16-19.
|
[3] |
王惠莅, 罗锋盈, 杨建军 ,等. 云计算服务安全关键标准研究[J]. 信息技术与标准化, 2013.
|
|
WANG H L , LUO F Y , YANG J J . Research on key standards for the security of cloud computing services[J]. Information Technology & Standardization. 2013.
|
[4] |
CHEN C , MANIATIS P , PERRIG A . Towards verifiable resource accounting for outsourced computation[J]. ACM Sigplan Notices, 2013,48(7):167.
|
[5] |
邵政斌 . 流量伪装技术及其成本分析[D]. 长沙:湖南大学, 2007.
|
|
SHAO Z B . Traffic camouflaging technology and its cost analysis[D]. Changsha:Hunan University, 2007.
|
[6] |
LIU D X , CHI C H , LI M . Normalizing traffic pattern with anonymity for mission critical applications[C]// 37th Annual Simulation Symposium. 2004: 293-299.
|
[7] |
胡文心 . 网络流量规范化的流量伪装模型的研究[D]. 上海:华东师范大学, 2006.
|
|
HU W X . The model and implementation of normalizing network traffic pattern with anonymity for mission critical applications[D]. Shanghai:East China Normal University, 2006.
|
[8] |
FU X W , GRAHAM B , BETTATI R ,et al. On effectiveness of link padding for statistical traffic analysis attacks[C]// 23rd International Conference on Distributed Computing Systems. 2003: 45-52.
|
[9] |
胡文心, 蔡建华, 俞琨 . 网络流量规范化的流量伪装方法,CN101383831A[P].2009. 2009:
|
|
HU W X , CAI J H , YU K . Network traffic normalized traffic masquerading method,CN101383831A[P]. 2009:
|
[10] |
CAO N , WANG C , LI M ,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[C]// IEEE Infocom 2011. 2011: 10-15.
|
[11] |
LI J , WANG Q , WANG C ,et al. Fuzzy keyword search over encrypted data in cloud computing[C]// Infocom,Mini-Conference. 2010.
|
[12] |
XIN S , ZHAO Y , LI Y . Property-based remote attestation oriented to cloud computing[C]// 2011 Seventh International Conference on Computational Intelligence and Security. 2011: 1028-1032.
|
[13] |
KUWAITI M , KYRIAKOPOULOS N , HUSSEIN S . A comparative analysis of network dependability,fault-tolerance,reliability,security,and survivability[J]. Commun Surveys Tuts, 2009,(4): 106-124.
|
[14] |
ZHAO B , NI M T , FAN P R . Powermitter:data exfiltration from air-gapped computer through switching power supply[J]. China Communications, 2018,15(2): 170-189.
|
[15] |
樊佩茹, 赵波, 倪明涛 ,等. APM:适用于IaaS平台的agent保护机制[J]. 通信学报,39(4): 176-188.
|
|
FAN P R , ZHAO B , NI M T ,et al. APM:agent protection mechanism applied for IaaS platform[J]. Journal on Communications, 2018,39(4): 176-188.
|
[16] |
石源, 张焕国, 吴福生 . 一种可信虚拟机迁移模型构建方法[J]. 计算机研究与发展, 2017,54(10): 2284-2295.
|
|
SHI Y , ZHANG H G , WU F S . A method of constructing the model of trusted virtual machine migration[J]. Journal of Computer Research and Development, 2017,54(10): 2284-2295.
|
[17] |
严飞, 彭慧容, 何凡 ,等. HBROP:基于硬件性能计数器的函数级ROP检测[J]. 武汉大学学报(理学版), 2017,63(2): 109-116.
|
|
YAN F , PENG H R , HE F ,et al. HBROP:HPC-based function-level approach to detect ROP attack[J]. Journal of Wuhan University, 2017.
|
[18] |
ZHAN J , FAN X D , CAI L ,et al. TPTVer:A trusted third party based trusted verifier for multi-layered outsourced big data system in cloud environment[J]. China Communications, 2018,15(2): 122-137.
|
[19] |
詹静, 杨静 . 基于远程证明的可信Modbus/TCP协议研究[J]. 工程科学与技术, 2017,49(1).
|
|
ZHAN J , YANG J . Research on remote attestation-based trusted modbus/TCP protocol[J]. Advanced Engineering Sciences, 2017,49(1).
|
[20] |
詹静, 杨静, 马俊明 ,等. 一种基于共享内存摆渡的 Modbus/TCP安全通信方法[J]. 中国科技论文, 2017,12(2): 135-140.
|
|
ZHAN J , YANG J , MA J M ,et al. Modbus/TCP secure communication method based on shared memory ferry[J]. China Sciencepaper, 2017,12(2): 135-140.
|
[21] |
ZHANG L Q , YAN F , ZHAO B ,et al. Dependence-induced risk:security metrics and their measurement framework[J]. China Communications, 2016,13(11): 119-128.
|