1Adams K,Agesen 0.A Comparison of Software and Hardware Techniques for x86 Vktualizafion[C].in:Proceedings of e 12th International Conference on Architectural Support for Programming Languages and Otxting Systems(ASPLOS 2006),New York,NY,USA,2006,2-13.
5Anbang Ruan,Qingni shen,Yuanyou Yin.A Generalized Trusted Virtualized Platform Architecture.In Proc.of the Young Computer Scientists,2008(1CYCS 2008).P:2340- 2346,Zhangjiajie,China,Nov.18-21,2008.
6GOLDMANKA,BERGER S.TPM main part 3 IBM commands [EB/OL].http://www.research.ibm. com/secure_systems_department/projects/vtpm/ mainP3IBMCommandsrev 10.pdf,2005-.
7PAUL E,JORK L.Para-virtualized TPM sharing[A]. Proceedings of the 1st International Conference on Trusted Computing and Trust in Information Technologies:Trusted Compufng-Challenges and Appfications(TRUST 200g)[C]. ViUach ,Aus tria,2008.119-13.
8STRASSER M,STAMER H.A software-based trusted platform module emulator[A].Proceedings of the 1st International Conference on Trusted Computing and Trust in Information Technologies:Trusted Computing-Challenges and Applications (YRUST 2008)[C].Villach,Austria,200.
9BERGER S,CACERES R,GOLDMAN K A,et al.vTPM:virtualizing the trusted platform module[A]. Proceedings of the 15th USENIX Security Symposium C0SENIX Secuty 2006)[q.Cmada,2006305-320.
10FREDERIC S,MICHAEL B,MARTIN H,et al.An approach to a trustworthy system architecture using virtualization[A].Proceedings of the 4th International Conference on Autonomic and Trusted Computing (ATC- 2007) [C].Hong Kong, China,2007.4610:191.