Computer Science ›› 2018, Vol. 45 ›› Issue (4): 148-151.doi: 10.11896/j.issn.1002-137X.2018.04.024
Previous Articles Next Articles
XIA Qing-xun and ZHUANG Yi
[1] Trusted Computing Group(TCG).http://www.trustedcomputinggroup.org. [2] ASOKAN N,EKBERG J E,KOSTIAINEN K,et al.MobileTrusted Computing[J].Proceedings of the IEEE,2014,102(8):1189-1206. [3] FUGINI M G,BREVEGLIERI L,PELOSI G,et al.TrustedComputing for Embedded Systems.http://rd.spring.com/content/pdf/bfm%3A978-3-319-09420-5%2F1.pdf. [4] MU Y.Zhong Guan Cun Trusted Computing Industry Alliancewas Established[J].Information Security and Communications Privacy,2014(5):16.(in Chinese) 木易.中关村可信计算产业联盟成立[J].信息安全与通信保密,2014(5):16. [5] SONG X L,ZHANG L H,CHEN D Y.Preventing Hypervisor-based Rootkit with Trusted Execution Technology[J].Information Security & Communications Privacy,2009,7:76-81. [6] YU A,ZHAO S.Enhancing Flexibility of TCG’s TNC through Layered Property Attestation[C]∥IEEE International Confe-rence on Trust,Security and Privacy in Computing and Communications.IEEE Computer Society,2011:751-756. [7] ARTHUR W,CHALLENER D,GOLDMAN K.Platform Configuration Registers[M]∥A Practical Guide to TPM 2.0.Apress,,Berkeley,CA,2015. [8] SAILER R,ZHANG X,JAEGER T,et al.Design and imple-mentation of a TCG-based integrity measurement architecture[C]∥Usenix Security Symposium.San Diego,CA,USA,2004:16-16. [9] JAEGER T,SAILER R,SHANKAR U.PRIMA:policy-reduced integrity measurement architecture[C]∥SACMAT 2006,ACM Symposium on Access Control MODELS and Technologies.Lake Tahoe,California,USA,2006:19-28. [10] CAMENISCH J,CHEN L,DrRJVERS M,et al.One TPM to Bind Them All:Fixing TPM 2.0 for Provably Secure Anonymous Attestation[C]∥Security and Privacy.IEEE,2017:901-920. [11] XU Z Y,HE Y P,DENG L L.Efficient Remote AttestationMechanism with Privacy Protection[J].Journal of Software,2011,22(2):339-352.(in Chinese) 徐梓耀,贺也平,邓灵莉.一种保护隐私的高效远程验证机制[J].软件学报,2011,22(2):339-352. [12] ZHU Y,LI Q B,ZHONG C L,et al.Non-balanced Binary Hash-tree Model for Fine-grained Integrity Measurement[J].Journal of Chinese Computer Systems,2014,35(7):1604-1609.(in Chinese) 朱毅,李清宝,钟春丽,等.用于细粒度完整性度量的非平衡二叉哈希树模型[J].小型微型计算机系统,2014,35(7):1604-1609. [13] FU D,PENG X,YANG Y.Unbalanced tree-formed verification data for trusted platforms[J].Security & Communication Networks,2016,9(7):622-633. [14] DENNING P J.The Locality Principle[J].Communications of the Acm,2005,48(7):19-24. |
No related articles found! |
|