共 27 条
[1]
TCG Architecture Overview.Specification,Revision 1.2. Trusted Computing Group. . 2004
[2]
Realizingproperty-based attestation and sealing with commonly availa-ble hard-and software. Khn Ulrich,Selhorst Marcel,Stueble Christian. Proceedings of the 2007 ACM Work-shop on Scalable Trusted Computing . 2007
[3]
Virtualization technology. Intel. http://www.intel.com/technology/computing/vptech/ . 2005
[4]
Secure data management intrusted computing. Khn Ulrich,Kursawe Klaus,Lucks Stefan,Sadeghi Ah-mad-Reza,Stble Christian. Proceedings of the Workshop on Crypto-graphic Hardware and Embedded Systems(CHES) . 2005
[5]
LaGrande technology architectural overview. Intel. http://download.intel.com/technology/security/downloads/LT_Arch_Overview.pdf .
[6]
TPM Main Part 1,Design Prin-ciples.Specification Version 1.2,Revision 62. Trusted Computing Group. . 2003
[7]
Design andi mplementation of a TCG-basedinteg-rity measurement architecture. Sailer Reiner,Zhang Xiao-Lan,Jaeger Trent,van DoornLeendert. Proceedings of the 13th Use-nix Security Symposium . 2004
[8]
The Transport Layer Security(TLS)Protocol Version 1.1. Dierks T,Rescorla E. RFC 4346 . 2006
[9]
Therole of TPMin enterprise security. Sailer Reiner,van Doorn Leendert,James P Ward. IBMResearch Report RC23368 . 2004
[10]
Property attestation—Scalable and priva-cy-friendly security assessment of peer computers. Poritz Jonathan,Schunter Matthias,van Herreweghen Els,Waidner Michael. IBM Re-search Report RZ 3548 . 2004