[1]
LIU Weipeng, HU Jun, FANG Yanxiang, SHEN Changxiang. Research and Development on the Secure Architecture of Terminal Based on Trusted Computing. Computer Science(2007), 34(10):257-263.
Google Scholar
[2]
ZHANG Huanguo, LUO Jie, JIN Gang, ZHU Zhiqiang. Development of Trusted Computing Research. Wuhan University Journal(2006), 52(5):513-518.
DOI: 10.1007/bf02831786
Google Scholar
[3]
Trusted Computing Group. TCG Specification Architecture Overview Revision1.4, http://www.trustedcomputinggroup.org (2007).
Google Scholar
[4]
TAN Liang, XU Zhiwei. Development of the Transitive Trusted Chain Based on TPM. Computer Science (2008), 35(10):15-18.
Google Scholar
[5]
ZHANG Liqiang, ZHANG huangguo, ZHANG Fan. Trusted Measurement Mechanism in Trusted Computing. Beijing Industry University Journal (2010),36(5):586-591.
Google Scholar
[6]
Xin CHEN, Zhigang SI. Research and Design of Dynamic Integrity Measurement in Trusted Computing. Proceedings of 2010 International Conference on Educational and Information Technology, (V3)193-196.
DOI: 10.1109/iceit.2010.5608393
Google Scholar
[7]
Reiner Sailer,Xiaolan Zhang,Trent Jaeger,Leendert van Doorn.Design and Implementation of a TCG-based Integrity Measurement Architecture.Proceedings of the 13th USENIX Security Symposium.USENIX,(2004), pp.223-238.
Google Scholar
[8]
Trent Jaeger,Reiner Sailer,Unesh Shankar.PRIMA:Policy-Reduced Integrity Measurement Architecture. Proceeding of the 11th ACM Symposium on Access Control Models and Technologies.ACM (2006), pp.19-28.
DOI: 10.1145/1133058.1133063
Google Scholar
[9]
Xinwen Zhang,Songqing Chen,Michael J.Covington,Ravi Sandhu.SecureBus:Towards Application-Transparent Trusted Computing with Mandatory Access Control.ASIACCS'07 (2007).
DOI: 10.1145/1229285.1229304
Google Scholar
[10]
GAO Li, QIN Xi, CHANG Chaowen, CHEN Xin. A Embedded System-based Computing Platform for Tolerating Untrusted Component. Wuhan University Journal (2010), 35(5):626-629.
Google Scholar
[11]
Shankar U,Jaeger T,Sailer R.Toward automated information-flow integrity for security-critical applications.Proceedings of the 13th Annual Network and Disributed Systems Security Symposiun. Internet Society (2006).
Google Scholar
[12]
Garlinkel T,Pfaff B,Chow J,Rosenblum M,Boneh D.Terra:a virtual machine-based platform for trusted computing.Proceeding of the 19th ACM Symposium on Operating systems principles.ACM (2003),pp.193-206.
DOI: 10.1145/945445.945464
Google Scholar
[13]
SHI Lei, ZOU Deqing, JIN Hai. Xen Virtualization Technique. Wuhan:HuaZhong Science and Technology University Publisher (2009).
Google Scholar
[14]
Mark Thober, J. Aaron Pendergrass, C. Durward McDonell. Improving Coherency Of Runtime Integrity Measurement. STC'08 (2008).
DOI: 10.1145/1456455.1456464
Google Scholar