共 7 条
- [1] Shen C.-X., Zhang H.-G., Feng D.-G., Cao Z.-F., Huang J.-W., Survey of information security, Science in China Series F: Information Sciences, 50, 3, pp. 273-298, (2007)
- [2] Ahmad-Reza S., Marcel S., Christian S., Marcel W., TCG Inside? A note on TPM specification compliance, Proceedings of the 1st Benelux Workshop on Information and System Security, (2006)
- [3] Trent J., Reiner S., Umesh S., PRIMA: Policy-reduced integrity measurement architecture, Proceedings of the 11th ACM Symposium on Access Control Models and Technologies(SACMAT 2006), pp. 134-143, (2006)
- [4] Zhang X., Chen Y.-L., Shen C.-X., A non-interference trusted model based on processes, Journal on Communications, 30, 3, pp. 6-11, (2009)
- [5] Rushby J., Noninterference, transitivity and channel-control security policies, (1992)
- [6] Huang Q., Study about terminal security architecture based on trusted computing, (2007)
- [7] Garfinkel T., Pfaff B., Et al., Terra: A virtual machine-based platform for trusted computing, Proceedings of the SOSP03, pp. 193-206, (2003)