2Smack in Embedded Computing[OL]. http://lwn.net/Articles/292142/ .
3.LINUX SECURITY MODULES[OL][]..
二级参考文献5
1Secure architecture in embedded systems: an overview[ EB/OL]. http://hal.archives-ouvertes.fr/docs/00/12/44/12/PDF/recosoc06. pdf.
2RAVI S, RAGHUNATHAN A, CHAKRADHAR S. Tamper resistance mechanisms for secure embedded systems [ C ] //Proc of the 17th International Conference on VLSI Design (VLSID'04). Mumba: [ s. n. ], 2004:605-611.
4PRESTI S L. Technologies and approaches related to trusted computing[EB/OL], http://www, isg. Rhul. ac. uk/ files/ IY5608 _-_ Lecture _9_ TC_ Related. pdf.
5HALLYN S E, KEARNS P. Domain and type enforcement for Linux [ C ] //Proc of the 4th Annual Linux Showcase and Conference. Atlanta : [ s. n. ] , 2000 : 247- 260.