[1] 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83. Feng D G,Zhang M,Zhang Y,et al.Study on cloud computing security[J].Journal of Software,2011,22(1):71-83.(in Chinese)
[2] 徐明迪,张焕国,张帆,等.可信系统信任链研究综述[J].电子学报,2014,42(10):2024-2031. Xu M D,Zhang H G,Zhang F,et al.Survey on chain of trust of trusted system[J].Acta Electronica Sinica,2014,42(10):2024-2031.(in Chinese)
[3] 马卓.无线网络可信接入理论及其应用研究[D].西安:西安电子科技大学,2010. Ma Z.Trusted Access in Wireless Networks Theory and Applications[D].Xi'an:Xidian University,2010.
[4] Goldman K,Perez R,Sailer R.Linking remote attestation to secure tunnel endpoints[A].Proceedings of the first ACM Workshop on Scalable Trusted Computing[C].New York:ACM Press,2006.21-24.
[5] Stumpf F,Tafreschi O,R der P,et al.A robust integrity reporting protocol for remote attestation[A].Proceedings of the Second Workshop on Advances in Trusted Computing[C].Berlin:Springer-Verlag Press,2006.25-36.
[6] Whitfield D,Martin H.New directions in cryptography[J].IEEE Transactions on Information Theory,1976,22(6):644-654.
[7] 徐明迪,张焕国,赵恒,等.可信计算平台信任链安全性分析[J].计算机学报,2010,33(7):1165-1176. Xu M D,Zhang H G,Zhao H,et al.Security analysis on trust chain of trusted computing platform[J].Chinese Journal of Computers,2010,33(7):1165-1176.(in Chinese)
[8] Zhang H G,Yan F,Fu J M,et al.Research on theory and key technology of trusted computing platform security testing and evaluation[J].Science China:Information Sciences,2010,53(3):434-453.
[9] Xu W J,Zhang X W,Hu H X,et al.Remote attestation with domain-based integrity model and policy analysis[J].IEEE Transactions on Dependable and Secure Computing,2012,9(3):429-442.
[10] Arapinis M,Ritter E,Ryan M.StatVerif:verification of stateful processes[A].Proceedings of the 24th IEEE Computer Security Foundations Symposium[C].Washington,DC:IEEE Press,2011.33-47.
[11] Datta A,Franklin J,Garg D,et al.A logic of secure systems and its application to trusted computing[A].Proceedings of the 30th IEEE Symposium on Security and Privacy[C].Washington,DC:IEEE Press,2009.221-236.
[12] Jain L,Vyas J.Security Analysis of Remote Attestation[R].Palo Alto:Stanford University,2008. |