[1]
WANG Jiangshao, Yu Zong, LI Guang. Study of trusted chain technology of computing trusted [J] . Computer Engineering & Design, 2008, 29 ( 9 ) : 2195-2198.
Google Scholar
[2]
Dries Schellekens, Brecht Wyseur, Bart Preneel. Remote attestation on legacy operating systems with trusted platform modules [J] . Electronic Notes in Theoretical Computer Science, 2008, 197 ( 1) : 59-72.
DOI: 10.1016/j.entcs.2007.10.014
Google Scholar
[3]
Martin Pirker, Ronald Toegl, Daniel Hein and Peter Danner. A privacy for anonymity and trust [G] . LNCS 5471: Trusted Computing, 2009: 101-119.
DOI: 10.1007/978-3-642-00587-9_7
Google Scholar
[4]
CHEN L Q, LANDFERMANN R, LOHR H, et al. A protocol for property-based attestation [C] / / Proceedings of the first ACM work-shop on Scalable Trusted Computing. New York: ACM Press, 2006: 7-16.
DOI: 10.1145/1179474.1179479
Google Scholar
[5]
LI Shang-jie, HE Ye-ping. On privacy of property based remote attestation [J] . Journal on Communication, 2009, 30 ( 11 ) : 146-152.
Google Scholar
[6]
Chen L Q, Landfermann R, Lhr H, et al. A protocol for property-based attestation[A] . In: roc. of the 1st ACM Workshop on Scalable Trusted Computing[C] . Nova Scotia: ACM Press, 2006: 7 - 16.
DOI: 10.1145/1179474.1179479
Google Scholar
[7]
Holt J, Bradshaw R, Seamons K, Orman H. Hidden credentials[C]/Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society. Washington DC, 2008: 1-8.
DOI: 10.1145/1005140.1005142
Google Scholar
[8]
Bradshaw R, Holt J, Seamons K. Concealing complex policies with hidden credentials[C] /Proceedings of the 11th ACM Conference on Computer and Communications Security. Washington, DC, USA, 2004: 146-157.
DOI: 10.1145/1030083.1030104
Google Scholar
[9]
Winsborough W H, Li N. Protecting sensitive attributes inautomated trust negotiation/Proceedings of the ACM Work-shop on Privacy in the Electronic Society. Washington, DC, USA, 2002: 41-51.
DOI: 10.1145/644527.644532
Google Scholar
[10]
HU Jia-fu, Li Lixin, Zhou, Yanzhou, et, al. Dynamic remote attestation framework based on the strategy and virtual machine technology [J]. Wuhan University (Natural Science Edition) 1671-8836(2009)01-0045-04.
Google Scholar
[11]
Chang E, Thomson P, Dillon T, Hussain F. The Fuzzy and Dynamic Nature of Trust[J]. LNCS 3592. Berlin: Springer-Verlag, 2005. 161-174.
Google Scholar
[12]
Bei Gong, Trusted Network Architecture Supporting Trusted Group Establishment and Key Technologies Research[D], Beijing University of Technology, (2012).
Google Scholar