1Avizienis a, Laprie j c, Randell b,et al. Basic Concepts and Taxonomy of Dependable and Secure Computing[J]. IEEE Transactions on Dependable and Secure Computing, 2004, 1 (1): 11-33.
8ZHANG HuanGuo1,2, YAN Fei1,2, FU JianMing1,2, XU MingDi1,2, YANG Yang1,2, HE Fan1,2 & ZHAN Jing1,2 1School of Computer, Wuhan University, Wuhan 430072, China,2Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Wuhan 430072, China.Research on theory and key technology of trusted computing platform security testing and evaluation[J].Science China(Information Sciences),2010,53(3):434-453. 被引量:11
6LI Jing1,2,ZHANG Huanguo1,2,ZHAO Bo1,2,FANG Lingling1,2 1.School of Computer,Wuhan University,Wuhan 430072,Hubei,China,2.Key Laboratory of Aerospace Information Security and Trust Computing,Ministry of Education,Wuhan 430072,Hubei,China.A Trusted Environment Construction Method for Security-Sensitive Software[J].Wuhan University Journal of Natural Sciences,2011,16(5):383-390.
4SHEN C X,ZHANG H G,WANG H M,et al. Researches on trus- ted computing and its developments [ J ~. science china.. Informa- tion Sciences,2010,53 ( 3 ) :405 - 433.
6ARBAUGH W A,FARBER D J,SMITH J M. A secure and reliable bootstrap architecture [ C ]. Proceedings of the 1997 IEEE Symposi- um on Security and Privacy,in Washington,DC ,USA: IEEE Com- puter Society Washington, 1997:65 - 71.
7SAILER R,ZHANG X L,JAEGER T,et al. Design and implemen- tation of a TCG-based integrity measurement architecture [ C ]. Cal- ifornia, USA : ACM Press,2004:223 - 238.