共 27 条
[21]
Xen and the art ofvirtualization. Barham P,Dragovic B,Fraser K et al. Proceedings of the 19th ACM SymposiumonOperating Systems Principles . 2003
[22]
Are vir-tual machine monitors microkernels done right. Hand Steven,Warfield Andrew,Fraser Keir et al. Proceedingsof the 10th Workshop on Hot Topics in Operating Systems(HotOS-X) . 2005
[23]
Apro-tocol for property-based attestation. Chen Li-Qun,Landfermann Rainer,L hr Hans et al. Proceedings of the 1stACM Workshop on Scalable Trusted Computing . 2006
[24]
Randomoracles are practical:Apar-adigmfor designing efficient protocols. Bellare M,Rogaway P. Proceedings of the1st Annual Conference on Computer and Communications Se-curity . 1993
[25]
TCG Infra-structure Workgroup Subject Key Attestation Evidence Ex-tension.Specification Version 1.0,Revision 7. TCG Infrastructure Working Group(I WG). . 2005
[26]
Microsoft. Microsoft NGSCB home page,http://www.microsoft.com/resources/ngscb . 2003
[27]
Linux security modules:Generalsecurity support for the Linux kernel. Chris Wright,Crispin Cowan,Stephen Smalley,James Mor-ris,Greg Kroah-Hart man. Proceedings of theUSENIX Security Symposium . 2002