[1] |
SANTOS N , GUMMADI K P , RODRIGUES R . Towards trusted cloud computing[C]// Conference on Hot Topics in Cloud Computing. 2009: 1-5.
|
[2] |
刘川意, 方滨兴 . T-YUN:云提供商可信性审计与验证[J]. 信息网络安全, 2012,8: 97-100.
|
|
LIU C Y , FANG B X . T-YUN:trustworthiness audit and verification of the cloud[J]. Netinfo Security, 2012,8: 97-100.
|
[3] |
张焕国, 罗捷, 金刚 ,等. 可信计算研究进展[J]. 武汉大学学报(理学版), 2006,52(5): 513-518.
|
|
ZHANG H G , LUO J , JIN G ,et al. Research progress of trusted computing environment[J]. Journal of Wuhan University:Natural Science Edition, 2006,52(5): 513-518.
|
[4] |
SAILER R , ZHANG X , JAEGER T ,et al. Design and implementation of a TCG-based integrity measurement architecture[C]// USENIX Security Symposium. 2004: 223-238.
|
[5] |
徐梓耀, 贺也平, 邓灵莉 . 一种保护隐私的高效远程验证机制[J]. 软件学报, 2011,22(2): 339-352.
|
|
XU Z Y , HE Y P , DENG L L . Efficient remote attestation mechanism with privacy protection[J]. Journal of Software, 2011,22(2): 339-352.
|
[6] |
翁晓康, 张平, 王炜 ,等. 基于非平衡散列树的平台完整性远程验证机制[J]. 计算机应用, 2014,34(02): 433-437.
|
|
WENG X K , ZHANG P , WANG W ,et al. Remote attestation mechanism for platform integrity based on unbalanced-hash tree[J]. Journal of Computer Applications, 2014,34(2): 433-437.
|
[7] |
YAN J , ZHAO Y . Trusted attestation of behavior measurement based on Merkle hash tree[J]. Journal of Computational Information Systems, 2013,9(9): 3443-3451.
|
[8] |
朱毅, 李清宝, 钟春丽 ,等. 用于细粒度完整性度量的非平衡二叉散列树模型[J]. 小型微型计算机系统, 2014,35(7): 1604-1609.
|
|
ZHU Y , LI Q B , ZHONG C L ,et al. Non-balanced binary hash-tree model for fine-grained integrity measurement[J]. Journal of Chinese Computer Systems, 2014,35(7): 1604-1609.
|
[9] |
ENGLAND P , . Practical techniques for operating system attestation[C]// Trusted Computing Challenges and Applications,First International Conference on Trusted Computing and Trust in Information Technologies,Trust 2008. 2008: 1-13.
|