[1]
Feng Dengguo, Zhang Min, Zhang Yan, Xu Zhen. Study on Cloud Computing Security [J]. Journal of Software, 2011, 22 (1): 71-83(in Chinese)
Google Scholar
[2]
Feng Dengguo, QinYu, Wang Dan, Chu Xiaobo. Research on Trusted Computing Technology [J] Journal of Computer Research and Development 2011, 48(8): 1332-1349(in Chinese)
Google Scholar
[3]
QinYu, Feng Dengguo. Component Property Based on Remote Attestation [J]. Journal of Software, 2009, 20 (6): 1625-1641.(in Chinese)
DOI: 10.3724/sp.j.1001.2009.03343
Google Scholar
[4]
Feng Dengguo, QinYu. Trusted Computing Environment Attestation Method [J]. Chinese Journal of Computers, 2008, 31 (9): 1641-1652.(in Chinese)
Google Scholar
[5]
Li Xiaoyong, Zuo Xiaodong, Shen Changxiang. Trustworthiness Attestation for Computing Platform Based on System Behavior [J]. ACTA ELETRONICA SINICA 2007, 6 (7) : 1235-1239(in Chinese)
Google Scholar
[6]
Shi Guangyuan, Zhang Jianbiao. Research and Development of Trustworthiness Attestation in Trusted computing [J]. Application Research o f Computer, 2011, 28 (12): 4414-4419(in Chinese)
Google Scholar
[7]
Fang Jing, Wu Hao, Bai Songlin. Cloud computing the virtualization security [J]. Telecom science, 2012, 4: 135 -140(in Chinese)
Google Scholar
[8]
Yang Jian, Wang Haihang, Wang Jian, Yu Dingguo. Research Review of Cloud Computing Security Issues [J]. Chinese Computer Systems 2012, 33 (3): 472-479(in Chinese)
Google Scholar
[9]
Zhang Hui, Xing PeiZheng. Analysis of Information Security in Cloud Computing Environment. [J]. Computer Research and Development, 2011, 21(12): 164-166,171(in Chinese)
Google Scholar
[10]
Santos N, Gummadi KP, Rodrigues R. Towards trusted cloud computing. In: Sahu S, ed, USENIX Association Proc. of the Workshop on Hot Topics in Cloud Computing 2009. San Diego, 2009. http://www.usenix.org/events/hotcloud09/tech/full_papers/ santos.pdf
Google Scholar
[11]
Wu Jiyi, Shen Qianli, Zhang Jianlin, Shen Zhonghua, Ping Lingdi. Cloud Computing: from Cloud Security to Trustworthy Cloud [J]. Computer Research and Development, 2011, 48 (Supplement): 229-233(in Chinese)
Google Scholar
[12]
Chen Jianxun. Hou Fangyong. Li Lei. Research on Trusted Computing [J]. Computer Technology and Development, 2010, 20 (9): 1-4, 9(in Chinese)
Google Scholar
[13]
Yu Puyang. Kang Guosheng. Research and Development on Trusted Computing [J]. Computer Technology and Development, 2011, 21 (8): 233-236(in Chinese)
Google Scholar