[1] MITCHELL C J. Trusted Computing?[M/OL]. IET Digital Library, 2005:11-27[2015-05-22]. http://digital-library.theiet.org/content/books/10.1049/pbpc006e_ch1. [2] GARFINKEL T, PFAFF B, CHOW J, et al. Terra:a virtual machine-based platform for trusted computing[J]. ACM SIGOPS Operating Systems Review, 2003, 37(5):193-206. [3] SANTOS N, GUMMADI K P, RODRIGUES R. Towards trusted cloud computing[C]//HotCloud'09:Proceedings of the 2009 Conference on Hot Topics in Cloud Computing. Berkeley, CA:USENIX Association, 2009:Article No. 3. [4] 施光源,张建标.可信计算领域中可信证明的研究与进展[J].计算机应用研究,2011,28(12):4414-4419. (SHI G Y, ZHANG J B. Research and development of trustworthiness attestation in trusted computing[J]. Application Research of Computers, 2011, 28(12):4414-4419.). [5] BRICKELLl E, CHEN L, LI J.A new direct anonymous attestation scheme from bilinear maps[C]//Proceedings of the First International Conference on Trusted Computing and Trust in Information Technologies, LNCS 4968. Berlin:Springer-Verlag, 2008:166-178. [6] BENDER A, KATZ J, MOSSELLI R. Ring signatures:stronger definitions, and constructions without random oracles[J]. Journal of Cryptology, 2008, 22(1):114-138. [7] BONEH D, GENTRY C, LYNN B, et al. Aggregate and verifiably encrypted signatures from bilinear maps[C]//EUROCRYPT'03:Proceedings of the 22nd International Conference on Theory and Applications of Cryptographic Techniques, LNCS 2656. Berlin:Springer-Verlag, 2003:416-432. [8] LIU J, ZHAO J, HAN Z. A remote anonymous attestation protocol in trusted computing[C]//IPDPS 2008:Proceedings of the 2008 IEEE International Symposium on Parallel and Distributed Processing. Piscataway, NJ:IEEE, 2008:1-6. [9] 杨绍禹,王世卿,郭晓峰.一种基于环签名的跨域云服务资源远程证明方法[J].小型微型计算机系统,2014,35(2):324-328. (YANG S Y, WANG S Q, GUO X F. Ring-signature based remote attestation for cross-realm resources in cloud computing[J]. Journal of Chinese Computer Systems, 2014, 35(2):324-328.). [10] NING Z-H, JIANG W, ZHAN J, et al. Property-based anonymous attestation in trusted cloud computing[J]. Journal of Electrical and Computer Engineering, 2014, 2014:Article ID 687158. [11] BERGER S, CÁCERES R, GOLDMAN K A, et al. vTPM:virtualizing the trusted platform module[C]//USENIX-SS'06:Proceedings of the 15th Conference on USENIX Security Symposium. Berkeley, CA:USENIX Association, 2006, 15:Article No. 21. [12] STUMPF F, BENZ M, HERMANOWSKI M, et al. An approach to a trustworthy system architecture using virtualization[C]//ATC'07:Proceedings of the 4th International Conference on Autonomic and Trusted Computing, LNCS 4610. Berlin:Springer-Verlag, 2007:191-202. [13] 王丽娜,高汉军,余荣威,等.基于信任扩展的可信虚拟执行环境构建方法研究[J].通信学报, 2011,32(9):1-8. (WANG L N, GAO H J, YU R W, et al. Research of constructing trusted virtual execution environment based on trust extension[J]. Journal on Communications, 2011, 32(9):1-8.). [14] 刘金成.无证书数字签名方案的研究[D].西安:西安理工大学,2009:42-48. (LIU J C. Reasearch on certificateless signature schemes[D]. Xi'an:Xi'an University of Technology, 2009:42-48.) |