1ROBERT MORRIS,KEN THOMPSON. Password Security: a case history[ J]. Communications of ACM, ACM New York,1979, 22(11) : 594 -597.
2NEUMAN, B C, TS' O, T. Kerberos: an authentication service for computer networks[ J]. Communication Magazine, 1994,32(9) :33 -38.
3MATT BLAZE. A cryptographic file system for UNIX [ C ]. Conf. on Computer and Communications Security Proceedings of ACM, Fairfax, Virginia, US, 1993, 9 - 16.
4GIUSEPPE CATTANEO, LUIG1 CATUIGNO, A DEL SORBO, PINO PERSIANO. The Design and Implementation of a Transparent Cryptographic File System for UNIX[ C]. Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conf. Berkeley, CA, USA, 2001, 199-212.
5LEVINE, J, GRIZZARD, J, OWEN, H. A methodology to detect and characterize Kernel level rootkit exploits involving redirection of the system call table [ C ]. Information Assurance Workshop, 2004. Proceedings. Second IEEE International, Atlanta, GA , USA, 2004, 107- 125.
6ANNE ADAMS, MARTINA ANGELA SASSE. Users are not the enemy[ J ]. Communications of the ACM, 1999, 42 (12) : 40 -46.
7PETER SZOR. The Art of Computer Virus Research and Defense [ M ]. Addison-Wesley Professional, NJ, USA, 2005.
8MIKE BOND, GEORGE DANEZIS. A pact with the devil [ C ]. Proceedings of the 2006 workshop on New security paradigms, ACM New York, 2006, 77- 82.
9DARKO KIROVSKI, M. DRINIC, et al. Enabling trusted software integrity[ J]. ACM SIGPLAN Notices, ACM NY USA, Oct. 2002,37(10) : 108 - 120.
10LEE GARBER. EnCase: A Case Study in Computer-Forensic Technology[ J]. Computer Manazine, IEEE, 2001, 201-204.