8Roger L Kay.How to Implement Trusted Computing,A Guide to Tighter Enterprise Security[OL].https://www.trustedcomputinggroup.org/news/Industry-Data/Implementing-Trusted-Computing-RK.pdf.
10R Sailer,X Zhang,T Jaeger,L van Doorn.Design and implementation of a TCG-based integrity measurement architecture[A].In Proceedings of USENIX Security Symposium[C].Lake Tahoe,California,USA:ACM Press,Aug.2004.223-238.