[1] Trusted Computing Group. TPM main part 1, design principles specification, version 1.2 revision 62 (2003-10) https://www.trustedcomputinggroup.org/home.
[2] Trusted Computing Group. TCG software stack (TSS) specification, version 1.10 . (2003) https://www.trustedcomputinggroup.org.
[3] Trusted Computing Group. TCG trusted network connect, TNC architecture for interoperability specification version 1.0 revision 4,3 . (2005-05) https://www.trustedcomputinggroup.org/home.
[4] Danilo B, Lorenzo C, Andrea L, et al. Replay attack in TCG specification and solution //21st Annual Computer Security Applications Conference. 2005.
[5] Evan R S. A security assessment of trusted platform modules, TR2007-597 . Department of Computer Science, Dartmouth College, 2007.
[6] Safford D, Zohar M. A trusted linux client(TLC) . http://www.research.ibm.com/gsal/tcpa/tlc.pdf.
[7] Biba K J. Integrity considerations for secure computer systems, ESD-TR-76-372 . USAF Electronic Systems Division, Hanscom Air Force Base, Bedford, Massachusetts, 1977.
[8] Bell D E, LaPadula L J. Secure computer systems: A refinement of the mathematical model . Electronic Systems Division,Air Force Systems Command, Hanscom Aidr Force Base, Bedford, MA, 1974.
[9] Fraser T. LOMAC: low water-mark integrity protection for COTS environments // the 2000 IEEE Symposium on Security and Privacy. USA: Oakland, California, 2000.
[10] Jaeger T, Sailer R, Shankar U. PRIMA: policy-reduced integrity measurement architecture // ACM Symposium on Access Control Models and Technologies (SACMAT). California, 2006.
[11] Shankar U, Jaeger T, Sailer R. Toward automated information-flow integrity for security-critical applications // the 13th Annual Network and Distributed Systems Security Symposium. 2006.
[12] Huang Q, Shen C X, Chen Y L, et al. Secrecy/integrity union MLS policy based on trusting computing [J]. Computer Engineering and Applications, 2006, 42(10):15-18 (in Chinese). 黄强,沈昌祥,陈幼雷,等.基于可信计算的保密和完整性统一安全策略 [J].计算机工程与应用,2006,42(10):15-18.
[13] Sandhu R, Zhang X W. Access management for distributed systems: Peer-to-peer access control architecture using trusted computing technology //the 10th ACM Symposium on Access Control Models and Technologies. 2005.
[14] Berger S, Cáceres R, Goldman K A, et al. vTPM: virtualizing the trusted platform module, RC23879 . IBM Research Division Thomas J. Tech Rep: Watson Research Center, 2006.
[15] Sadeghi A, Stüble C, Winandy M. Property-based TPM virtualization // the 11th International Conference on information Security. Lecture Notes in Computer Science, 5222. Berlin, Heidelberg: Springer-Verlag, 1-16.
[16] England P, Loeser J. Para-virtualized TPM sharing //the 1st International Conference on Trusted Computing and Trust in Information Technologies: Trusted Computing-Challenges and Applications (Villach, Austria, March 11 - 12, 2008). Lecture Notes in Computer Science. Berlin, Heidelberg: Springer-Verlag, 2009,4968:119-132.
[17] Trusted Computing Group. TCG PC client specific implementation specification for conventional BIOS, version 1.2 final, revision 1.00 . July 2005, https://www.trustedcomputinggroup.org/home.
[18] Denning D E, A lattice model of secure information flow [J]. Communications of the ACM, 1976, 19(5): 236-243.
[19] Microsoft, Microsoft NGSCB home page . (2003) http://www.microsoft.com/resources/ngscb.
[20] Garfinkel T, Pfaff B, Chow J, et al. Terra: A virtual machine-based platform for trusted computing // the Symposium on Operating System Principles (SOSP). 2003.
[21] Barham P, Dragovic B, Fraser K, et al. Xen and the art of virtualization // the 19th ACM Symposium on Operating Systems Principles. Bolton Landing, NY, 2003.
|